Networking and Wireless Networking Flashcards

1
Q

Devices (wireless networking architecture)

A

An STA (station) is any device that is able to use the 802.11 protocol to communicate on a wireless network. Devices on a wireless network include:

  • A wireless NIC for sending and receiving signals.
  • A wireless access point (AP) is a lot like a hub. It receives wireless signals from several nodes and retransmits them to the rest of the network.
  • A wireless bridge connects two wireless APs into a single network or connects your wireless AP to a wired network. Most APs today include bridging features.

Many wireless access points include ports (i.e., switches or routers) to connect the wireless network to the wired portion of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Connection Method (wireless networking architecture): Explain the 2 types

A

Ad hoc

An ad hoc network works in peer-to-peer mode. The wireless NICs in each host communicate directly with one another. An ad hoc network is difficult to maintain for a large number of hosts because connections must be created between a host and every other host, and special configurations are required to reach wired networks. You will typically use an ad hoc network only to create a direct, temporary connection between two hosts.

Infrastructure

An infrastructure wireless network employs an access point that functions like a hub on an Ethernet network. With an infrastructure network, you can easily add hosts without increasing administrative efforts (scalable), and the access point can be easily connected to a wired network, allowing clients to access both wired and wireless hosts.

You should implement an infrastructure network for all but the smallest of wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.11 Specification Standards

A

The original 802.11 specification operated in the 2.4 GHz range and provided up to 2 Mbps. Additional IEEE subcommittees have further refined wireless networking, resulting in the following standards:

Specification

Standard

802.11a

802.11b

802.11g

802.11n

802.11ac

Frequency

5 GHz
(U-NII)

  1. 4 GHz (ISM)
  2. 4 GHz (ISM)

2.4 GHz (ISM) or 5 GHz
(U-NII)

5 GHz (U-NII)

Maximum speed

54 Mbps

11 Mbps

54 Mbps

600 Mbps

1.3 Gbps

Maximum distance

100 ft.

150 ft.

150 ft.

300 ft.

150 ft.

Channels
(non-overlapped)

23 (12)

11 (3)

11 (3)

2.4 GHz: 11 (3 or 1)
5 GHz: 23 (12 or 6)

Depends on configuration

Modulation technique

OFDM

DSSS, CCK, DQPSK, DBPSK

DSSS (and others) at lower data rates;
OFDM, QPSK, BPSK at higher data rates

OFDM (and others, depending on implementation)

OFDM

Backwards compatibility

N/A

None

  1. 11b
  2. 11a/b/g, depending on implementation
  3. 11b/g/n
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Multiple-Input, Multiple-Output (MIMO) (802.11n Technologies)

A

MIMO increases bandwidth by using multiple antennas for both the transmitter and receiver.

A system is described by the number of sending and receiving antennas. The 802.11n specifications allow up to four sending and four receiving antennas. The benefit of adding additional antennas declines as the number increases; going above 3x3 provides a negligible performance increase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Channel Bonding (802.11n Technologies)

A

Channel bonding combines two, non-overlapping 20 MHz channels into a single 40 MHz channel, resulting in slightly more than double the bandwidth.

  • The 5 GHz range has a total of 23 channels, with 12 non-overlapping. This allows for a maximum of 6 non-overlapping bonded (combined) channels.
  • The 2.4 GHz range has a total of 11 channels, with 3 non-overlapping. This allows for a maximum of 1 non-overlapping bonded channel. For this reason, channel bonding is typically not practical for the 2.4 GHz range
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multi-User MIMO (MU-MIMO) (802.11ac Technologies)

A

MU-MIMO is an enhancement to MIMO that allows multiple users to use the same channel.

In addition to adding MU-MIMO, 802.11ac doubled the number of MIMO radio streams from four to eight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the wireless network authentication methods?

A

Method

Description

Open

Open authentication requires that clients provide a MAC address in order to connect to the wireless network.

  • You can use open authentication to allow any wireless client to connect to the AP. Open authentication is typically used on public networks.
  • You can implement MAC address filtering to restrict access to the AP to only known (or allowed) MAC addresses.

Because MAC addresses are easily spoofed, this provides little practical security.

Shared Key

With shared key authentication, clients and APs are configured with a shared key (called a secret or a passphrase). Only devices with the correct shared key can connect to the wireless network.

  • All APs and all clients use the same authentication key.
  • Shared key authentication should be used only on small, private networks.
  • Shared key authentication is relatively insecure, as hashing methods used to protect the key can be easily broken.
  1. 1x
  2. 1x authentication uses usernames and passwords, certificates, or devices such as smart cards to authenticate wireless clients. Originally designed for Ethernet networks, the 802.1x standards have been adapted for use in wireless networks to provide secure authentication. 802.1x authentication requires the following components:
  • A RADIUS or TACACS+ server to centralize user account and authentication information. A centralized database for user authentication is required to allow wireless clients to roam between cells but authenticate using the same account information
  • A PKI for issuing certificates. At a minimum, the RADIUS server must have a server certificate. To support mutual authentication, each client must also have a certificate

Use 802.1x authentication on large, private networks. Users authenticate with unique usernames and passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wired Equivalent Privacy (WEP)

A

WEP is an optional component of the 802.11 specifications that were deployed in 1997. WEP has the following weaknesses:

  • A static pre-shared key (PSK) is configured on the AP and the client. It cannot be dynamically changed or exchanged without administration. As a result, every host on large networks usually uses the same key.
  • Because key values are short and don’t change, the key can be captured and easily broken.

Because of the inherent security flaws, avoid using WEP whenever possible. If using WEP cannot be avoided, implement it only using open authentication. Shared key authentication with WEP uses the same key for both encryption and authentication, exposing the key to additional attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Wi-Fi Protected Access (WPA)

A

WPA is the implementation name for wireless security based on initial 802.11i drafts that was deployed in 2003. It was intended to be an intermediate measure to take the place of WEP while a fully secured system (802.11i) was prepared. WPA:

  • Uses Temporal Key Integrity Protocol (TKIP) for encryption
  • Supports both pre-shared key (WPA-PSK or WPA Personal) and 802.1x (WPA Enterprise) authentication
  • Can use dynamic keys or pre-shared keys
  • Can typically be implemented in WEP-capable devices through a software/firmware update

WPA keys can also be predicted by reconstructing the Message Integrity Check (MIC) of an intercepted packet, sending the packet to an AP, and observing whether the packet is accepted by the AP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Wi-Fi Protected Access 2 (WPA2) or 802.11i

A

WPA2 is the implementation name for wireless security that adheres to the 802.11i specifications. It was deployed in 2005. It is built upon the idea of Robust Secure Networks (RSN). Like WPA, it resolves the weaknesses inherent in WEP. It is intended to eventually replace both WEP and WPA. WPA2:

  • Uses Advanced Encryption Standard (AES) as the encryption method
  • Supports both pre-shared key (WPA2-PSK or WPA2 Personal) and 802.1x (WPA2 Enterprise) authentication

Can use dynamic keys or pre-shared keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wi-Fi Protected Access 3 (WPA3)

A

WPA3 is a new authentication launched in 2018. It is a more resilient version of WPA2. WPA3:

  • Uses password-based authentication
  • Provides better protection against password guessing attempts by using Simultaneous Authentication of Equals (SAE)

Offers 192-bit cryptographic strength, giving additional protection for networks dealing with sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Infrared (IR) connection method

A

Infrared uses invisible light waves for communication. Infrared:

  • Is a line-of-sight medium. Objects cannot be in the path of communications.
  • Communicates at 9600 bps up to 4 Mbps and uses the resources of a COM port.
  • Works best for devices within 1 meter, but can operate up to 30 meters in areas without ambient light interference.
  • Offers no security for transmissions.

Infrared is typically used for remote control devices or for sending data between two devices. Most smart phones have integrated IR capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bluetooth connection method

A

Bluetooth uses radio waves in the 2.4 GHz frequency range for communication.

  • Bluetooth uses ad hoc connections between devices to create personal area networks called piconets. A piconet can have up to 7 devices, and each device can participate in multiple piconets at the same time.
  • By using adaptive frequency hopping (AFH), Bluetooth is able to automatically detect other devices in the area and avoid the frequencies used by those devices. It can switch between 79 channels to avoid interference.
  • A 128-bit proprietary encryption mechanism is used to encrypt signals.
  • Transmission speeds and max distance depends on the version and device class:

Version

Speed

1.2

1 Mbps

2.0

3 Mbps

3.0

24 Mbps

  1. 0
    *

Class

Distance

1

100 m

2

10 m

3

1 m

  • Common applications for Bluetooth include the following:
    • Connecting peripheral devices (e.g., keyboard and mouse)
    • Wireless headphones and smart phone headsets
    • Peer-to-Peer communications (e.g., sharing data between a smart phone, notebook, and tablet)

Bluetooth is also able to transmit audio and video data signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Near Field Communication (NFC)

A

NFC enables communication between two devices that are in very close proximity with each other.

  • NFC operates in the 13.56 MHz frequency and has a maximum transmission speed of 424 Kbps.
  • Special chips called NFC chips are used to send, receive, and store data.
  • Devices using NFC operate in one of three modes:
    • Reader/writer mode is used to read information stored on an NFC chip.
    • Peer-to-Peer mode enables two devices to communicate and exchange information.
    • Card Emulation mode emulates the functionality of a smart card in order to perform contactless payment or ticketing (this mode is typically used by smart phones).
  • In order to communicate, devices must be within 2 inches of each other.
  • Data transmissions can be secured by using encryption algorithms.
  • NFC has seen widespread use in the following areas:
    • Contactless payment (e.g., using a smart phone as a payment method)
    • Identification (e.g., passports that contain an NFC chip)
    • Video gaming

Even though NFC has slower transmission speeds than Bluetooth, it consumes much less power and sets up connections much faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SOHO Characteristics

A

Most SOHO networks have the following characteristics:

  • Supports between 1–10 connected hosts (computers, mobile devices, or printers)
  • Uses Ethernet or 802.11 wireless networking (or both) as the network medium
  • Uses a single internet connection that is shared among all hosts
  • Uses a single subnet
  • Employs a workgroup networking model (i.e., there are no dedicated servers and a domain is not used)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A typical SOHO network uses what devices?

A

A typical SOHO network uses the following devices:

  • A modem or router connects the location to the internet. This connection provides a single IP address for connecting to the internet.
  • A router connects the private network to the internet connection. This router is typically a multifunction device, which includes a four port switch, wireless access point, and firewall functionality.
  • Additional wired connections can be provided by connecting additional switches to the router.

A SOHO network uses multiple devices that share a single internet connection. The connection to the internet is typically through an access point or router that includes switch ports and/or a wireless access point to connect devices to the local area network and the internet. The type of device you use depends on the internet connection type (DSL, cable, fiber, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What re the general steps you would take to configure a SOHO router and set up the network

A

Action

Description

Configure the Internet Connection

Begin by connecting the router to the internet connection using the device’s WAN port.

  • For a DSL or ISDN router, connect the device directly to the DSL/ISDN line.
  • For a cable, fiber optic, or satellite connection, connect the router to the Ethernet port on the modem or connection device.

Many routers will automatically detect and configure the internet connection. If not, follow the ISP instructions for setting up the connection. This could include:

  • Configuring the internet connection with a static IP address assigned by the ISP or configuring the device to use DHCP for addressing
  • Configuring the protocol used for the connection. This will often be PPPoE for an always-on internet connection
  • Configuring logon information (username and password) to access the internet
  • Configuring a default gateway and DNS server addresses that the router will use in order to access the internet

Configure the Router

Before setting up the network, some basic settings on the router need to be configured. Most important is to change the default administrator username and password. Default usernames and passwords are easily guessed or discovered by checking the device documentation. By changing the password, you protect the system from unauthorized access.

Enable NAT

Small networks use a single public IP address to connect to the internet. This IP address is shared by all devices on the private network. Network address translation (NAT) is a protocol that allows multiple computers to share a single public IP address used on the internet.

  • The internet is classified as a public network. All devices on the public network must have a registered IP address. This address is assigned by the ISP.
  • The SOHO network is classified as a private network. All devices on the private network use private IP addresses internally, but share the public IP address when accessing the internet.
  • A NAT router associates a port number with each private IP address. Communications with the private hosts from the internet are sent to the public IP address and the associated port number. Port assignments are made automatically by the NAT router.
  • The private network can use addresses in the following ranges that have been reserved for private use (i.e., they will not be used by hosts on the internet):
    • 10.0.0.0 to 10.255.255.255
    • 172.16.0.0 to 172.31.255.255
    • 192.168.0.0 to 192.168.255.255

Secure the SOHO Network

Although the router should now be configured to connect hosts to the private network and provide internet access, the following steps should be taken to properly secure the network from external threats:

  • Configure the firewall on the device. Enabling the basic firewall on the router provides an additional level of security for the private network. If necessary, configure exceptions on the firewall to allow specific traffic through the firewall.
  • Configure content filtering and parental controls. Most SOHO routers provide content filtering and parental controls that prevent hosts from accessing specific websites or using a specific internet service, such as chat, torrent, or gaming applications.
  • Physically secure the router. Anyone with physical access to the router can make configuration changes and gain access to the network. To prevent this, limit physical access to the router. For example, place the router and other networking equipment in a locked closet.

Create a Whitelist and Blacklist

When securing devices or navigation access, there are two options to create lists that either allow or deny access through the Firewall security:

  • Whitelisting means that only the devices on the list are allowed access. Basically, everyone is blocked access except for the devices on the whitelist.
  • Blacklisting means all devices are allowed access except for the ones on the blacklist. It’s just the opposite of Whitelisting.

Configure for a Network Environment

Depending on the implementation, it may be necessary to take the following steps in order to configure the SOHO router for a particular network environment:

  • Enable and configure a DMZ (demilitarized zone) host. Configuring a DMZ on a SOHO router causes all incoming port traffic to be forwarded to the specified DMZ host. Because this can open up the network to a variety of external threats, configure a DMZ only if you understand all the implications associated with it.
  • Configure quality of service (QoS) settings. Most SOHO routers provide basic QoS functionality. When enabled, QoS prioritizes certain network communications over others. For example, VoIP network traffic would be given higher priority and more bandwidth than HTTP (web browser) traffic.
  • Enable the Universal Plug and Play (UPnP) networking protocol. UPnP is a networking protocol that allows UPnP enabled devices to easily discover each other on the network and share data and media content.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

If the SOHO router includes a wireless access point, or if a standalone wireless access point is being used, what are the configuration steps to configure and secure the wireless network?

A

Action

Description

Change the Default SSID

Many manufacturers use a default SSID that contains identifying information (such as device manufacturer and model number), so it is important to change the device’s SSID from the default. In addition to changing the default SSID, it is also possible to disable the SSID broadcast. This is known as SSID suppression or cloaking. With broadcasting disabled, the SSID needs to be manually entered into devices for them to connect to the network (the SSID will not show up in the list of available networks).

Even with the broadcast disabled, it’s relatively easy to identify the SSID of a network by using readily available applications. Because of this, SSID suppression should not be the only form of protection.

Configure the Wireless Protocol

If your access point supports multiple wireless protocols, select the protocols to support, such as 802.11n only or mixed mode (both 802.11n and 802.11g). Be aware that when using mixed mode, most access points will throttle all clients to the slowest connected protocol speeds (i.e. if a 802.11g client connects to the network, 802.11n clients will operate at 802.11g speeds).

Configure the Channel

The channel identifies the portion of the wireless frequency used by the access point and connected devices.

  • You should use a channel that does not overlap or conflict with other access points in the area. A simple rule to minimize conflicts is to remember that the frequencies used by channels 2–5 compete with the frequencies used by channels 1 and 6, while the frequencies used by channels 7–10 compete with the frequencies used by channels 6 and 11.
  • Many access points have an automatic channel feature that detects other access points and automatically selects the channel with the least amount of traffic.

Configure Encryption and Authentication

Add authentication to allow only authorized devices to connect. Use encryption to protect wireless communications from eavesdropping.

  • Always use WPA2 when possible. If WPA2 isn’t available, use WPA.
  • Use pre-shared key (PSK) authentication with either AES (more secure) or TKIP (less secure) encryption for a SOHO network without a domain,
  • Configure the shared secret (passphrase) value used with WPA2 or WPA. Each client needs to be configured with same secret value.

Because WEP has several known security vulnerabilities and can be easily cracked, it should be used only as a last resort. When using WEP, never use shared key authentication; use only open authentication.

Enable MAC Address Filtering

By specifying which MAC addresses are allowed to connect to your network, you can prevent unauthorized devices from connecting to the access point. MAC address filtering can be implemented in one of two ways:

  • All MAC addresses are allowed to connect to the network, except for those specified in the deny list.
  • All MAC addresses are denied access, except for those specified in the allow list.

MAC address filtering is considered a cumbersome and weak form of security. Permitted MAC addresses can be very easily captured and spoofed by even casual attackers.

Disable DHCP for Wireless Clients

Disabling DHCP on the wireless access points allows only users with a valid, static IP address in the range to connect. An attacker would have to be able to discover or detect the IP address range, subnet mask, and default gateway information to connect to the access point.

Determine Best Access Point Placement

The location of the access point can affect signal strength and network access. Keep in mind the following recommendations:

  • Place access points in central locations. Radio waves are broadcast in each direction, so the access point should be located in the middle of the area that needs network access.
  • Place access point to take advantage of the fact that devices often get better reception from access points that are above or below.
  • In general, place access points higher up to avoid interference problems caused by going through building foundations.
  • For security reasons, do not place access points near outside walls. The signal will extend outside beyond the walls. Placing the access point in the center of the building decreases the range of the signals available outside of the building.
  • Do not place the access point next to sources of interference, such as other wireless transmitting devices (cordless phones or microwaves) or other sources of interference (motors or generators).

Configure Wi-Fi Protected Setup (WPS)

The WPS security protocol makes it easier for WPS-enabled devices (e.g., a wireless printer) to connect to the wireless network. WPS can use several methods for connecting devices, including the PIN method and the push button method. The method used to connect devices must be supported by both the access point and the wireless device.

Because of the inherent security vulnerabilities with WPS, it is best to disable this feature on the access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Describe each network location profile and the situations in which they should be selected

A

Location

Description

Home Network

The Home network location is designed for use on networks where you know and trust each device on the network. With the Home network location:

  • Network discovery is enabled. This means other computers and devices on the network are able to see and connect to each other.
  • Connected devices are able to join the network homegroup.
  • The Windows firewall configuration is changed to allow certain types of network communication through.

Because this network location is the least secure, select this location only if you know all the devices and people that are connected to the network.

Work Network

The Work network location is designed to be used in a SOHO environment or other small business network. With the Work network location:

  • Network discovery is enabled; however, the computer is unable to create or join a homegroup.
  • The Windows firewall configuration is changed to allow certain types of network communication.

Public Network

The Public network location is designed for use on unknown or public networks (e.g., a coffee shop or other public Wi-Fi network). With the Public network location:

  • Network discovery is disabled. This means other computers on the network cannot see you and you cannot see them.
  • Network sharing, such as printers and scanners, is disabled.
  • The Windows firewall configuration is changed to block almost all inbound and most outbound communications. For applications to be able to communicate, they need to be manually allowed through the firewall.

The Public network profile should be used when connecting to any unknown network location, such as a hotel’s Wi-Fi network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Network

A

A network is a group of computers that can share information through their connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A network is made up of what components?

A

A network is made up of the following components:

  • Computers (often called nodes or hosts).
  • Transmission media, which provide a path for electrical signals between devices.
  • Network interfaces, devices that send and receive electrical signals.

Protocols, rules or standards that describe how hosts communicate and exchange data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What do networks allow them to do that saves organizations money?

A

Despite the costs of implementation and maintenance, networks actually save organizations money by allowing them to:

  • Consolidate (centralize) data storage.
  • Share peripheral devices, like printers.
  • Increase internal and external communications.

Increase productivity and collaboration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Name 4 different network types and describe the classifications that fall under each.

A

Type

Classification

Description

Host Role

Peer-to-Peer

In a peer-to-peer network, each host can provide network resources to other hosts or access resources located on other hosts. Each host is in charge of controlling access to those resources. Advantages of peer-to-peer networks include the following:

  • Easy implementation
  • Inexpensive

Disadvantages of peer-to-peer networks include the following:

  • Difficult to expand (not scalable)
  • Difficult to support
  • Lack centralized control
  • No centralized storage

Client-Server

In a client-server network, hosts have specific roles. For example, some hosts are assigned server roles, which allow them to provide network resources to other hosts. Other hosts are assigned client roles, which allow them to consume network resources. Advantages of client-server networks include the following:

  • Easy to expand (scalable)
  • Easy to support
  • Centralized services
  • Easy to back up

Disadvantages of client-server networks include the following:

  • Expensive server operating systems
  • Extensive advanced planning required

Geography

Personal Area Network (PAN)

A personal area network is a very small network used for communication between personal devices. For example, a PAN may include a notebook computer, a wireless headset, a wireless printer, and a smartphone. A PAN is limited to a few feet in range. A PAN is typically created using Bluetooth wireless technologies.

Local Area Network (LAN)

A local area network is a network in a small geographic area, like an office. A LAN typically uses wires to connect systems together.

Wireless Local Area Network (WLAN)

A wireless LAN covers an area that is roughly the same size as a standard LAN. It uses radio signals to connect systems instead of wires.

Metropolitan Area Network (MAN)

A metropolitan area network is a network that covers an area as small as a few city blocks to as large as an entire metropolitan city. MANs are typically owned and managed by a city as a public utility. Be aware that many IT professionals do not differentiate between a wide area network and a MAN, as they use essentially the same network technologies.

Wide Area Network (WAN)

A wide area network is a group of LANs that are geographically isolated, but are connected to form a large internetwork.

Wireless Mesh Network (WMN)

A wireless mesh network (WMN) is a group of wireless mesh nodes that communicate with one another to share the network connection across a large area. They provide the ability to stream voice, data, and video between arbitrary pairs of devices. Each device in the WMN uses the others as relays to avoid the need for infrastructure.

Wireless Wide Area Network (WWAN)

A wireless wide area network (WWAN) covers a large geographical area by connecting separate areas wirelessly. WLAN and WWAN both connect to the internet wirelessly, but they use different technologies to do it. WWANs are often referred to as 3G, 4G, or LTE networks because they usually use cellular network technologies as connection types.

Management

Network

The term network often describes a computer system controlled by a single organization. This could be a local area network at a single location or a wide area network used by a single business or organization. If two companies connected their internal networks to share data, you could call it one network. In reality, however, it is two networks, because each network is managed by a different company.

Subnet

A subnet is a portion of a network with a common network address.

  • All devices on the subnet share the same network address, but they have unique host addresses.
  • Each subnet in a larger network has a unique subnet address.
  • Devices connected through hubs or switches are on the same subnet. Routers are used to connect multiple subnets.

Internetwork

A network with geographically dispersed WAN connections that connect multiple LANs is often called an internetwork. Additionally, connecting two networks under different management is a form of internetworking because data must travel between two networks.

Participation

Internet

The internet is a large, world-wide, public network. The network is public because virtually anyone can connect to it, and users or organizations make services freely available on the internet.

  • Users and organizations connect to the internet through an internet service provider (ISP).
  • The internet uses a set of communication protocols (TCP/IP) for providing services.
  • Individuals and organizations can make services (such as a website) available to other users on the internet.

Intranet

An intranet is a private network that uses internet technologies. Services on an intranet are only available to hosts that are connected to the private network. For example, your company might have a website that only employees can access.

Extranet

An extranet is a private network that uses internet technologies, but its resources are made available to external trusted users. For example, you might create a website on a private network that only users from a partner company can access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Network-Attached Storage (NAS)

A

A NAS is a device that is optimized to provide a single service: file sharing. NAS devices range in price from several hundred to several thousand dollars. A NAS can be connected to a network and configured very easily. This makes them a great choice for most networks needing a file sharing service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Internet Appliance

A

An internet appliance is a specialized device that performs a specific network role. The following are some common internet appliances:

  • Web proxy
  • Content filter
  • Malware scanner

Internet appliances are typically more expensive than configuring a server to perform the same task. However, internet appliances perform much better and have more features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

VoIP

A

VoIP devices provide voice communication over a packet-switched network (an IP network). The most common VoIP device is an IP phone. Instead of using the standard public switched telephone network, IP phones connect to an Ethernet network using an RJ45 connection. Basic VoIP services include Skype or Google Voice.

Businesses that use VoIP typically hire a third-party entity (such as Vonage or Jive) to set up the service and configure devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Server

A

Networks contain two types of hosts, hosts that consume a service, and hosts that provide a service. Hosts that provide a service are called servers. The following are some of the more common types of servers:

  • File and Print Server - Provides file sharing and print sharing services.
  • Application Server - Provides access to a shared network application (a database server that contains customer information).
  • Directory Server - Handles user authentication. Also stores user credentials, permissions, and settings.
  • Remote Access Server - Provides remote access to network resources.
  • Web Server - Serves web pages and web content via HTTP.
  • DNS Server - Uses the domain name service to map IP addresses to domain names.
  • DHCP Server - Automatically configures network hosts with an IP address, subnet mask, DNS server, and default gateway
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Bridge

A

A bridge connects two segments within the same subnet. Bridges learn which side a host resides on by copying the MAC address of the source device and placing it into the MAC address table. The port number the frame entered is also recorded in the table and associated with the source MAC address.

Another functionality of a bridge is to convert one type of transmission medium into another. A common example of this is a wireless bridge, which converts wired transmissions into wireless transmissions and vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Router

A

A router connects two network segments that have different subnet addresses.

  • A router has multiple network connections, and each connection is on a different subnet.
  • Routers use the IP address within a packet to move packets between networks.
  • Routers maintain a list of known networks and the next router in the path to reach the destination network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Switch

A

A switch provides a central connection for multiple media segments on the same subnet. A switch receives a signal on one port and forwards that signal only to the port where the destination device is connected.

Switches learn where a device is connected by copying the MAC address of the source device and placing it into the MAC address table. The port number the frame entered is also recorded in the table and associated with the source MAC address. If the switch doesn’t know which port a destination device is connected to, it will send the frame in question to all ports.

  • Switches use the MAC address to send frames to the destination device.
  • Switches can operate in full-duplex mode, where a device uses a different channel for sending and receiving and where the transmission paths are dedicated to only the communicating devices.
  • You should use a switch instead of a hub in every situation.
  • Many switches allow you to configure Quality of Service (QoS) settings, which prioritize certain types of network traffic over others. For example, if your network includes Voice over IP (VoIP) telephones, you could increase the priority of VoIP traffic on the switch to increase call quality.
  • You must configure a switch before you implement it. An unmanaged switch is a low-end switch that you plug it into a power outlet and connect your network devices with UTP cables. While unmanaged switches are convenient and easy to implement, they lack many of the advanced management and security features available. It is preferable to use a managed switch instead. A managed switch is a switch that must be configured before you can use it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Hub

A

A hub provides a central connecting point for multiple media segments on the same subnet. When a hub receives a signal, it is sent out to all the ports on the hub. Hubs operate in half-duplex mode because the path between devices is shared, meaning that devices can only send when no other devices are sending data.

Hubs are a legacy network device and are rarely used because they lack features and perform poorly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Network Adapter

A

A network adapter is responsible for creating and receiving transmission signals that are sent along the networking medium.

  • A network interface card (NIC) uses a cable medium (such as twisted pair or fiber optic cables).
  • A wireless network adapter transmits radio waves
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Media

A

The networking medium provides the path for signals to pass between devices.

  • Copper cables use electrical signals.
  • Fiber optic cables use light pulses.
  • Wireless networks use radio waves or infrared waves.

Networking media that use cables are considered bounded, because the transmission signals are contained within the wire. Networks that use wireless communications are considered unbounded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Describe how devices communicate

A

Devices use the MAC address to send frames to other devices on the same subnet.

Before two devices can communicate, they must know the MAC address of the receiving device. They do this by using the Address Resolution Protocol (ARP):

  1. The sending device sends out a broadcast frame:
    • The destination MAC address is all Fs (FFFF:FFFF:FFFF).
    • The sending MAC address is its own MAC address.
    • The destination IP address is the known IP address of the destination host.
    • The sending IP address is its own IP address.
  2. All hosts on the subnet process the broadcast frame and look at the destination IP address of the packet.
  3. If the destination IP address matches its own address, the host responds with a frame that includes its own MAC address as the sending MAC address.
  4. The original sender then reads the MAC address from the frame and associates the IP address with the MAC address, saving it in cache.

When the sender knows the MAC address of the receiver, it sends data in frames addressed to the destination device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

MAC Address

A

The MAC address is a unique hexadecimal identifier burned into the ROM of every NIC.

The MAC address is a 12-digit (48-bit) hexadecimal number. Each number ranges between 0–9 or A–F. The numbers in a MAC address can be divided by dashes (00-B0-D0-06-BC-AC), periods (00B0.D006.BCAC), or colons (00:B0:D0:06:BC:AC).

The MAC address is guaranteed unique through design. The first half (first six digits) of the MAC address is assigned to each manufacturer. The manufacturer determines the rest of the address, assigning a unique value which identifies the host address. A manufacturer that uses all the addresses in the original assignment can apply for a new MAC address assignment.

Some network cards allow you to change the MAC address through jumpers, switches, or software. However, there is little practical reason for doing so.

  • The MAC address is a unique hexadecimal identifier burned into the ROM (physically assigned address) of every network interface.
  • The MAC address is a 48-bit, 12-digit hexadecimal number (each number ranges from 0–9 or A–F).
  • The address is often written as 00-B0-D0-06-BC-AC or 00B0.D006.BCAC (although dashes, periods, and colons can also be used to divide the MAC address segments).
  • The MAC address is guaranteed unique through design.
    • The first half (first 6 digits) of the MAC address is assigned to each manufacturer.
    • The manufacturer determines the rest of the address, assigning a unique value which identifies the host address.

A manufacturer that uses all of the addresses in the original assignment can apply for a new MAC address assignment.

  • Although some network cards allow you to change the MAC address (or specify one of your own choice), this is rarely done in practice.
  • When you change the network card, the host will have a new physical device address.
  • When you move a device to another network, the physical address remains the same (as long as the network card has not been changed).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Function of a network adapter

A

The network adapter is responsible for converting binary data into a format to be sent on the network medium. A transceiver is responsible for converting digital data into digital signals to be sent on the medium. The type of signal the transceiver sends depends on the type of network. A fiber optic NIC sends light signals, an Ethernet NIC sends electronic signals on a wire, and a wireless NIC sends radio signals. To receive signals, the transceiver converts digital signals from the network to digital data for the PC.

A modem converts binary data to analog waves (modulation) on the sending end and then converts the analog waves back to binary data (demodulation) on the receiving end.

Most desktop computers have motherboards with built-in network adapters. Practically all mobile devices (i.e., smart phones, tablets, laptops, etc.) have a built-in wireless NIC.

Network adapters must match the network medium of the network.

Ethernet network adapters that are connected to a switch will operate in full-duplex mode. This allows the adapter to send and receive at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is this cable? Describe the components

A

Coaxial cable is primarily used to carry broadband internet signals.

Coaxial cable is built with the following components:

  • The inner conductor carries data signals and is made of solid copper or tin.
  • The insulator surrounds the inner conductor and keeps the signal separated from the mesh conductor. It is made of PVC plastic.
  • The braided mesh conductor is a second physical channel and also functions as a ground. It is made of aluminum or copper-coated tin.
  • The sheath is made of PVC plastic and encases the cable, protecting it from external elements.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is this cable? Describe the components

A

Coaxial cable is primarily used to carry broadband internet signals.

Coaxial cable is built with the following components:

  • The inner conductor carries data signals and is made of solid copper or tin.
  • The insulator surrounds the inner conductor and keeps the signal separated from the mesh conductor. It is made of PVC plastic.
  • The braided mesh conductor is a second physical channel and also functions as a ground. It is made of aluminum or copper-coated tin.
  • The sheath is made of PVC plastic and encases the cable, protecting it from external elements.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Describe the different coaxial cable grades

A

Because RG-6 is able to carry a higher-quality signal with much lower signal loss than RG-59, RG-6 cabling should always be used for any coaxial cable implementation

Type

Uses

Resistance Rating

RG-59

CCTV video systems; short cable lengths (less than 3 meters) are sometimes used for cable TV

75 ohms

RG-6

Cable TV, satellite TV, and broadband cable internet

75 ohms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

describes the most common type of connector used with coaxial cable

A
  • Molded onto the cable
  • Used in legacy 10Base2 Ethernet networks
  • Used in specialized industries
  • Used to connect composite video displays on commercial video devices.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is this cable? Describe the components

A
  • Four pairs of copper wires carry the data signals (one wire in the pair carries a positive signal, the other carries a negative signal). Wires are twisted into pairs to reduce the effects of electromagnetic interference and crosstalk.
  • PVC plastic insulation surrounds each copper wire.
  • An outer plastic sheath bundles the wires together and protects them.
    • Unshielded twisted pair (UTP) has only an outer plastic sheath. UTP cables are easier to work with and are less expensive than shielded cables.
    • Shielded twisted pair (STP) has a grounded outer copper shield around the entire wire bundle or around each wire pair. STP provides additional EMI protection, but costs considerably more than UTP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Twisted pair cable advantages and disadvantages

A

Advantages

Disadvantages

  • Inexpensive compared to other media types
  • Easy to install and manage
  • Very common (media and tools are easy to obtain)
  • The most common (and most supported) network medium
  • Very susceptible to EMI
  • Cables are easily damaged
  • Vulnerable to eavesdropping
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Describe the different unshielded twisted pair (UTP) cable categories

A

Category

Connector

Speed

Frequency

Description

Phone cable

RJ11

10 Mbps

N/A

Used to connect a modem to a phone jack in a wall outlet to establish a dial-up internet connection
Has two pairs of cable (a total of 4 wires).

Cat 5

RJ45

100 Mbps

100 MHz

Supports up to 100 Mbps Ethernet.

Cat 5e

RJ45

1000 Mbps

100 MHz

Similar to Cat 5 but provides better EMI protection. Supports gigabit Ethernet (gigabit connections require the use of all four twisted pairs)

Cat 6

RJ45

10 Gbps

250 MHz

10 Gbps speeds are limited to cable lengths less than 55 meters.

Cat 6a

RJ45

10 Gbps

500 MHz

10 Gbps speeds are limited to cable lengths less than 100 meters. Provides additional shielding and tighter cable twists than standard Cat 6, which reduces (alien) crosstalk and makes it less susceptible to EMI.

Cat 7

RJ45

10 Gbps

600 MHz

Has the strictest specifications for crosstalk and noise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Describe the two types of connectors used with twisted pair cables

A

Connector

Description

RJ11

  • Has 4 or 6 connectors
  • The RJ-11 wiring standard supports up to 2 pairs of wires (one phone and one power)
  • Uses a locking tab to keep a connector secure in an outlet
  • Used primarily for telephone wiring
  • The RJ-14 and RJ-25 wiring standard support additional phone lines using the same jack

RJ45

  • Has 8 connectors
  • Supports up to 4 pairs of wires
  • Uses a locking tab to keep a connector secure in an outlet
  • Used for Ethernet networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Be aware of what when making cables for Ethernet?

A
  • Use a crimping tool designed for RJ45 connectors to attach connectors to UTP cable. Most crimping tools include an integrated wire stripper that you can use to remove the outer sheath from the cable so you can access the individual wires.
  • Cat 5/5e/6/6a cables come with wires that have solid cores or stranded cores. Use solid core cables for longer runs inside walls or the ceiling; use stranded wires for drop cables where flexibility and frequent movement occurs.
  • There are different connectors rated for solid or stranded core wires; be sure to use the correct connector type.
  • To reduce crosstalk, keep the pairs twisted as much as possible right up to the connector.
  • Making Cat 6 compliant cables is difficult; if you do not add the connectors exactly right, the cable will be capable of only 100 Mbps speeds. In most cases, it would be easier to buy cables of the correct length than to try and make your own.
  • Be sure you use the appropriate punch-down tool when connecting UTP cabling to a punch-down block. To use a punch-down tool, position the UTP wire into a slotted post in the punch-down block. Then press down on the top of the wire over the post with the punch-down tool
46
Q

Ethernet specifications use what pins for communication?

A
  • Cat 5 Ethernet (100BASE-T) and below (Tx is a pin used for transmitting and Rx is a pin used for receiving):
    • Pin 1: Tx+
    • Pin 2: Tx-
    • Pin 3: Rx+
    • Pin 4: Unused
    • Pin 5: Unused
    • Pin 6: Rx-
    • Pin 7: Unused
    • Pin 8: Unused
  • Cat 5e (1000BASE-T) and above (Bi indicates the pin is used for both transmitting and receiving):
    • Pin 1: Bi+ D0
    • Pin 2: Bi- D0
    • Pin 3: Bi+ D1
    • Pin 4: Bi+ D2
    • Pin 5: Bi- D2
    • Pin 6: Bi- D1
    • Pin 7: Bi+ D3
    • Pin 8: Bi- D3
47
Q

Name and describe this cable configuration

A

Computers connect to the network through a hub or switch with a patch cable. Patch cables use the same wire configuration on each connector end. The following are the two most commonly used wiring configurations:

  • T568A Wires are arranged from pins 1 to 8 in each connector in the following order: GW, G, OW, B, BW, O, BrW, Br.
  • T568B Wires are arranged from pins 1 to 8 in each connector in the following order: OW, O, GW, B, BW, G, BrW, Br.

It doesn’t matter which standard is used as long as all cables use the same standard. This helps prevent confusion during troubleshooting

48
Q

Name and describe this cable configuration

A

Computers can connect directly to one another using a crossover cable. The easiest way to create a crossover cable is to arrange the wires in the first connector using the T568A standard and arrange the wires in the second connector using the T568B standard.

49
Q

Name this cable and describe its components

A
  • The central core carries the signal. It is made of plastic or glass.
  • The cladding maintains the signal in the center of the core as the cable bends.
  • The protective layer provides a stiff structure to prevent the cladding and central core from breaking.
  • The plastic sheath encases everything and protects the cable.
50
Q

Fiber optic cabling offers what advantages and disadvantages

A

Advantages

Disadvantages

  • Completely immune to EMI
  • Highly resistant to eavesdropping
  • Fastest available transmission rates
  • Greater cable distances without a repeater
  • Very expensive
  • Difficult to work with
  • Special training required to attach connectors to cables
51
Q

Single-mode fiber optic cables

A
  • Transfers data through the core using a single light ray (the ray is also called a mode)
  • Has a core diameter of around 10 microns
  • Supports a large amount of data
  • Allows cable lengths to extend a great distance
52
Q

Multi-mode fiber optic cables

A
  • Transfers data through the core using multiple light rays
  • Has a core diameter of around 50 to 100 microns
  • Limits the distance of cable lengths
53
Q

Name this fiber optic cabling connector

A

ST Connector

  • Used with single mode and multi-mode cabling
  • Keyed, bayonet-type connector
  • Also called a push in and twist connector
  • Each wire has a separate connector
  • Nickel plated with a ceramic ferrule to ensure proper core alignment and prevent light ray deflection
  • As part of the assembly process, it is necessary to polish the exposed fiber tip to ensure that light is passed on from one cable to the next with no dispersion
54
Q

Name this fiber optic cabling connector

A

SC Connector

  • Used with single mode and multi-mode cabling
  • Push on, pull off connector type that uses a locking tab to maintain connection
  • Each wire has a separate connector
  • Uses a ceramic ferrule to ensure proper core alignment and prevent light ray deflection
  • As part of the assembly process, it is necessary to polish the exposed fiber tip
55
Q

Name this fiber optic cabling connector

A

LC Connector

  • Used with single mode and multi-mode cabling
  • Composed of a plastic connector with a locking tab, similar to an RJ45 connector
  • A single connector with two ends keeps the two cables in place
  • Uses a ceramic ferrule to ensure proper core alignment and prevent light ray deflection
  • Half the size of other fiber optic connectors
56
Q

Name this fiber optic cabling connector

A

MT-RJ Connector

  • Used with single mode and multi-mode cabling
  • Composed of a plastic connector with a locking tab
  • Uses metal guide pins to ensure it is properly aligned
  • A single connector with one end holds both cables
  • Uses a ceramic ferrule to ensure proper core alignment and prevent light ray deflection
57
Q

Describe the various components that compose an Ethernet network

A

Component

Description

Network Interface Card

A network interface card (NIC) creates the signals that are sent along the networking medium.

  • A transceiver built into the network adapter formats the binary data for transmission on the network medium.
  • Ethernet devices are identified using the MAC address, which is burned into the network interface card.

Networking Media

Ethernet supports the following cable types:

  • Unshielded twisted-pair cables (UTP) with RJ45 connectors. This is the most common transmission medium used for Ethernet.
  • Fiber optic cables, which are used in high-speed applications (such as servers or streaming media).
  • Coaxial cable with F-type connectors for cable internet services. Coaxial cable is also used for older Ethernet implementations ( which are often called thinnet or thicknet networks).

Connectivity Devices

Ethernet uses the following connectivity devices:

  • A hub provides a central connection for multiple media segments on the same subnet. When a hub receives a signal, it is repeated out to all other ports. Hubs operate in half-duplex mode, meaning devices can either send or receive data at any given time.

Hubs are rarely used in networking environments. You should avoid them if possible.

  • A switch provides a central connection for multiple media segments on the same subnet. When a switch receives a signal, it forwards that signal only to the port where the destination device is connected.
    • Switches use the MAC address to send frames to the destination device.
    • Switches operate in full-duplex mode, meaning devices can send and receive data at the same time because transmission paths are dedicated to only the communicating devices.
    • When possible, use switches instead of hubs.
  • A router connects two network segments that have different subnet addresses.
    • A router has multiple network connections. Each connection is on a different subnet.
    • Routers use the IP address within a packet to move packets between networks.
  • A bridge connects two segments within the same subnet that use different media types. For example, you can use a bridge to connect wireless clients to wired clients on the same network.
  • A patch panel is a device that is commonly used to connect individual stranded wires into female RJ45 connectors. For example, you might connect four pairs of wires from a punchdown block to a port on the patch panel. On the patch panel, you then connect drop cables (cables with RJ45 connectors) to the patch panel on one end and a computer on the other end.
  • An Ethernet over power device allows network communications to be transmitted over existing AC power lines. An Ethernet over power device is plugged in to one AC power outlet, and a second Ethernet over power device is connected to the same AC circuit. These devices multiplex the AC copper power lines to transmit digital network signals at a frequency higher than the AC electrical power already on the circuit.

Standards

Ethernet standards identify the transmission speed and the cable type. Data transfer rates range from 10 Mbps (very old Ethernet networks) up to 10 Gbps. Between 100 and 1000 Mbps are the most common speeds for most networks.

Distance

Ethernet standards define the maximum distance for cable lengths between two devices.

  • The maximum cable length for UTP Ethernet “T” implementations is 100 meters for all standards.
  • The length for fiber optic cables varies depending on the cable type and specification, but typically ranges from 100 meters to 40 kilometers.

Power over Ethernet

Power over Ethernet (PoE) technology is used to distribute electrical power along with network data on twisted-pair Ethernet cabling (CAT 5 or higher). Power is usually supplied by a PoE-enabled Ethernet switch. PoE is commonly used to power network devices that are located where physical access to a power outlet may not be available. For example, a PoE-enabled surveillance camera mounted on a tall pole can be powered via its Ethernet cabling.

You can use a Power over Ethernet (PoE) injector to add PoE capability to regular non-PoE network links. PoE injectors can be used to upgrade existing LAN installations to PoE and provide a solution where fewer PoE ports are required. To upgrade a network connection to PoE, patch it through the PoE injector. Power injection is controlled and automatic.

58
Q

Compare the characteristics of the various Ethernet

A

Category

Standard

Bandwidth

Cable Type

Maximum Segment Length

Ethernet

10BaseT

10 Mbps (half-duplex)
 20 Mbps (full-duplex)

Twisted pair (Cat 4 or 5)

100 meters

10BaseFL

10 Mbps (multimode cable)

Fiber optic

1,000 to 2,000 meters

Fast Ethernet

100BaseTX

100 Mbps (half-duplex)
 200 Mbps (full-duplex)

Twisted pair (Cat5 or higher) Uses 2 pairs of wires

100 meters

100BaseFX

100 Mbps (multimode cable)

Fiber optic

412 meters

Gigabit Ethernet

1000BaseT

1,000 Mbps (half-duplex)
2,000 Mbps (full-duplex)

Twisted pair (Cat5 or higher)

100 meters

1000BaseCX (short copper)

Special copper (150 ohm)

25 meters, used within wiring closets

1000BaseSX (short)

Fiber optic

220 to 550 meters depending on cable quality

1000BaseLX (long)

550 meters (multimode)
 10 kilometers (single-mode)

10 Gigabit Ethernet

10GBaseT

10 Gbps (full-duplex only)

Twisted pair (Cat6, or 7)

100 meters

10GBaseSR/10GBaseSW

Multimode fiber optic

300 meters

10GBaseLR/10GBaseLW

Single-mode fiber optic

10 kilometers

10GBaseER/10GBaseEW

Single-mode fiber optic

40 kilometers

59
Q

IP address

A
  • Is a 32-bit binary number represented as four octets (four 8-bit numbers). Each octet is separated by a period.
  • Can be represented in one of two ways:
    • Decimal (e.g., 131.107.2.200). In decimal notation, each octet must be between 0 and 255.
    • Binary (e.g., 10000011.01101011.00000010.11001000). In binary notation, each octet is an 8-digit number.
  • Includes both the network address and the host address.
  • Uses a subnet mask to differentiate the network and host addresses.
  • The IP address identifies both the logical host and the logical network addresses.
  • Each host on the entire network must have a unique IP address.
  • Two devices on the same subnet must have IP addresses with the same network portion of the address.
  • Two devices on the same subnet must have unique host portions of the IP address.
  • Do not use the first or the last host address on a subnet address range.
60
Q

Study this card

A

Another way to differentiate the network and host addresses is by using CIDR block notation. With CIDR, the network address is specified by appending a slash (/) followed by the number of bits that are part of the network address. For example, the subnet mask 255.255.0.0 is written as /16 in CIDR notation (the network address consists of the first two octets, or the first 16 bits).

IP addresses use default classes that includes a default subnet mask value. The class defines the default network address portion of the IP address.

Address Range

Class

Default Subnet Mask

CIDR

1.0.0.0 to 126.255.255.255

A

255.0.0.0

/8

128.0.0.0 to 191.255.255.255

B

255.255.0.0

/16

192.0.0.0 to 223.255.255.255

C

255.255.255.0

/24

224.0.0.0 to 239.255.255.255

D

N/A

N/A

240.0.0.0 to 255.255.255.255

E

N/A

N/A

The IP address 192.168.6.11 is an example of a Class C address, which uses a default mask of 255.255.255.0. With this address, the network address is 192.168.6.0, and the host address is 11. Know that the address range from 0.0.0.0 to 0.255.255.255 is reserved for broadcast messages to the current network. The address range from 127.0.0.0 to 127.255.255.255 is reserved for loopback addresses to the local host.

Instead of using the default subnet mask, it is possible to use custom subnet masks to define different network addresses. This process is called subnetting and typically uses CIDR notation

61
Q

Protocol

A

A protocol is a rule that identifies some aspect of how computers communicate on a network. For two computers to communicate, they must be using the same protocols. Protocols are grouped into protocol suites, or sets of related protocols, that are meant to be used together

62
Q

TCP/IP

A

TCP/IP is the protocol suite used on the internet and on most networks. Nearly all computers today use TCP/IP for communication. The Internet Protocol (IP) is a key component of the TCP/IP protocol suite. The IP protocol is responsible for determining how to deliver data from the sending host to the destination host. However, it does not provide a mechanism for segmenting and sequencing packets in a communication. To accomplish this, IP is used in conjunction with another transport protocol:

  • Transmission Control Protocol (TCP) - TCP is a connection-oriented protocol. To ensure reliable delivery of data, TCP requires the recipient of a network transmission to send an acknowledgement of each and every IP packet it receives to the sender. Packets that don’t make it are retransmitted. This ensures that the data is delivered reliably.

User Datagram Protocol (UDP) - UDP is a connectionless protocol. Unlike TCP, UDP does not require acknowledgements. One of the key drawbacks of using TCP is the fact that its reliability introduces latency. For small data transmissions, such as sending an email, moderate latency is not a problem. However, for large data transmissions, such as video or audio streaming, the latency associated with TCP is unacceptable. By using UDP instead, the latency of the transmission is significantly reduced, with the assumption that an occasional lost packet won’t be detrimental.

63
Q

NetBIOS

A

NetBIOS is the term used to describe the combination of two protocols: NetBEUI and NetBIOS. NetBIOS was used in early Windows networks. Because NetBIOS is a non-routable protocol, it was often combined with IP to enable internetwork communications.

NetBIOS over TCP/IP, or NetBT, is used to allow older computers and applications that rely on NetBIOS to communicate on a TCP/IP network.

64
Q

Hypertext Transfer Protocol (HTTP)

A

Default port 80

HTTP is used by web browsers and web servers to exchange files (such as web pages) through the World Wide Web and intranets. HTTP can be described as an information requesting and responding protocol. It is typically used to request and send web documents, but is also used as the protocol for communication between agents using different IP protocols.

65
Q

Hypertext Transfer Protocol over Secure Socket Layer or HTTP over SSL (HTTPS)

A

Default port 443

HTTPS is a secure form of HTTP that uses SSL as a sublayer for security. SSL secures messages being transmitted on the internet. It uses RSA for authentication and encryption. Web browsers use SSL (Secure Sockets Layer) to ensure safe web transactions. URLs that begin with https:// trigger your web browser to use SSL.

66
Q

File Transfer Protocol (FTP)

A

Default port: 20, 21

FTP provides a generic method of transferring files. It can include file security through usernames and passwords, and it allows file transfer between dissimilar computer systems. FTP can transfer both binary and text files, including HTML, to another host. FTP URLs are preceded by ftp:// followed by the DNS name of the FTP server. To log into an FTP server, use: ftp://username@servername.

67
Q

Simple Mail Transfer Protocol (SMTP)

A

Default port: 25

SMTP is used to route electronic mail through the internetwork. Email applications provide the interface to communicate with SMTP or mail servers.

68
Q

Internet Message Access Protocol (IMAP)

A

Default port: 143

IMAP is an email retrieval protocol designed to enable users to access their email from various locations without the need to transfer messages or files back and forth between computers. Messages remain on the remote mail server and are not automatically downloaded to a client system.

69
Q

Post Office Protocol 3 (POP3)

A

Default port: 110

POP3 is part of the IP protocol suite and used to retrieve email from a remote server to a local client over an IP connection. With POP3, email messages are downloaded to the client.

70
Q

Remote Terminal Emulation (Telnet)

A

Default port: 23

Telnet allows an attached computer to act as a dumb terminal, with data processing taking place on the IP host computer. It is still widely used to provide connectivity between dissimilar systems. Telnet can also be used to test a service by the use of HTTP commands. You should avoid using Telnet as it transmits all data (e.g., usernames and passwords) clear text

71
Q

Secure Shell (SSH)

A

Default port: 22

SSH allows for secure interactive control of remote systems. SSH is a much more secure alternative to Telnet.

72
Q

Secure FTP (SFTP)

A

Default Port: 22

SFTP addresses one of the key weaknesses of FTP; namely, FTP doesn’t use encryption. All data, including usernames and passwords, is sent clear text. SFTP provides the same functionality as FTP, but secures the data transmissions using the SSH protocol

73
Q

Domain Name System (DNS)

A

Default port: 53

DNS is a system that is distributed throughout the internetwork to provide address/name resolution. For example, the name www.mydomain.com would be identified with a specific IP address

74
Q

Remote Desktop Protocol (RDP)

A

Default Port: 3389

RDP allows you to view and use the graphical desktop of a remote computer system as if you were sitting in front of it

75
Q

Dynamic Host Configuration Protocol (DHCP)

A

Default Port: 67, 68

DHCP is used to dynamically assign IP addressing information to network hosts when they come online. The client system, when it connects to the network, broadcasts a DHCPDISCOVER message on the network, looking for a DHCP server. The DHCP server responds with a DHCPOFFER message containing proposed IP addressing configuration information. The client then responds with a DHCPREQUEST message to the DHCP server indicating it wants to use the proposed configuration. The DHCP server makes the assignment with a DHCPACK message.

76
Q

Lightweight Directory Access Protocol (LDAP)

A

Default Port: 389, 636

LDAP is a protocol used to access information about network resources stored by a directory service, such as Active Directory or eDirectory. LDAP uses port 389 for clear text transmissions and port 636 for secure transmissions.

77
Q

Simple Network Management Protocol (SNMP)

A

Default Port: 161, 162

SNMP is used to monitor and manage network devices. SNMP agents can be installed on network devices such as PCs, switches, and routers. These agents send data to an SNMP manager application running on an administrative workstation, which aggregates the information and displays an overview of the current network status. Thresholds can be configured which trigger alerts if exceeded.

78
Q

Server Message Block (SMB)

A

Default Port: 445

SMB enables the sharing of folders and printers on the network. Using SMB, remote users can access files in a shared folder on a server or workstation. Likewise, a remote user can send print jobs to a shared printer. SMB is also known as Common Internet File System (CIFS).

SMB running directly over TCP uses port 445.
SMB running on “NetBIOS over TCP/IP” uses UDP ports 137 & 138 and TCP ports 137 & 139.

79
Q

Service Location Protocol (SLP)

A

Default Port: 427

SLP is a protocol that is able to organize and locate various network devices and services, such as printers, shared disk drives, directories, etc.

80
Q

Apple Filing Protocol (AFP)

A

Default Port: 548

AFP is the protocol used by systems running Mac OS X or newer to support file sharing on the network. AFP replaced AppleTalk and has gone through several revisions.

81
Q

Subnet Mask

A

The subnet mask identifies which portion of the IP address is the network address and which portion is the host address. Two devices on the same subnet must be configured with the same subnet mask.

82
Q

Default Gateway

A

The default gateway identifies the router to which communications for remote networks are sent. The default gateway address is the IP address of the router interface on the same subnet as the local host. Without a default gateway set, most clients will be unable to communicate with hosts outside of the local subnet.

83
Q

DNS Server

A

The DNS server address identifies the DNS server that is used to resolve host names to IP addresses.

84
Q

Hostname

A

The DNS server address identifies the DNS server that is used to resolve host names to IP addresses

85
Q

Hostname

A

The hostname identifies the logical name of the local system

86
Q

Static method to configure TCP/IP parameters

A

With static addressing, you manually assign all configuration values. Static addressing is prone to error and should be used only under the following conditions:

  • The network has a small number of hosts.
  • The network will not change or grow.
  • You have some hosts that must have the same address each time.
87
Q

Dynamic Host Configuration Protocol (DHCP) method to configure TCP/IP parameters

A

On a network configured with DHCP, IP hosts contact a DHCP server for IP addressing and other configuration information. This ensures error-free host configuration. With DHCP:

  • The host uses broadcast messages to locate a DHCP server when it boots.
  • The DHCP server assigns IP address and mask values to the host (called an address lease).
  • The DHCP server ensures that no two hosts are assigned the same IP address.
  • You can configure the DHCP server to deliver default gateway, DNS server, and other configuration information to hosts.

DHCP requires a special DHCP server, which is built-in to most SOHO routers

88
Q

Automatic Private IP Addressing (APIPA) method to configure TCP/IP parameters

A

If a Windows client is configured to receive an IP address from a DHCP server, but cannot contact a DHCP server, it will automatically assign itself an IP address within the following range:

169.254.0.1 to 169.254.255.254 with the subnet mask 255.255.0.0

With APIPA:

  • The host is configured to obtain IP information from a DHCP server (this is the default configuration).
  • If a DHCP server cannot be contacted, the host uses APIPA to assign itself an IP address.
  • The host configures only the IP address and mask. It does not assign itself the default gateway and DNS server addresses. For this reason, APIPA can be used only on a single subnet.

You can use APIPA instead of a DHCP server, but it should be used only on a small network that does not need default gateway or DNS server settings configured.

APIPA is the term used by Microsoft Windows. On other systems (e.g., Linux), this functionality is known as link-local addressing.

89
Q

Alternate IP Configuration method to configure TCP/IP parameters

A

With an alternate IP configuration, the system attempts to use DHCP for TCP/IP configuration information. If a DHCP server cannot be contacted, the static configuration values are used. When you configure an alternate IP address, APIPA is no longer used. Use an alternate configuration:

  • If you have a computer (e.g., a laptop) that connects to two networks (i.e., one with a DHCP server and another without a DHCP server).
  • If you want to provide values to properly configure the computer in case the DHCP server is unavailable.
90
Q

Facts about IP address assignments

A
  • By default, all Windows computers try to use DHCP for TCP/IP configuration information.
  • If your computer has used APIPA because the DHCP server is unavailable, it will have an IP address in the 169.254.x.x range. The workstation will be able to communicate with other hosts that have addresses in this range, but will not be able to communicate with hosts on other networks.
  • When you configure a static IP address, you disable DHCP and APIPA.
  • If you use a DHCP server for IP address configuration, you can still manually configure DNS server addresses.
  • By default, a Windows workstation will use the hosts file to resolve hostnames into IP addresses first. If a match can’t be found for the hostname to be resolved in the hosts file, the workstation will contact the DNS server it has been configured to use.
91
Q

The features of an IPv6 address

A

IP version 6 (IPv6) was developed to address the fact that IPv4 addresses have been exhausted. The IPv6 address is a 128-bit binary number. The following list describes the features of an IPv6 address:

  • The address is made up of 32 hexadecimal numbers organized into 8 quartets (for example, 35BC:FA77:4898:DAFC:200C:FBBC:A007:8973).
  • The quartets are separated by colons.
  • Each quartet is represented as a hexadecimal number between 0 and FFFF. Each quartet represents 16 bits of data (FFFF = 1111 1111 1111 1111).
  • Leading zeros can be omitted in each section. For example, the quartet 0284 could also be represented by 284.
  • Addresses with consecutive zeros can be expressed more concisely by substituting a two colons for the group of zeros. For example:
    • FEC0:0:0:0:78CD:1283:F398:23AB
    • FEC0::78CD:1283:F398:23AB (concise form)
  • If an address has more than one consecutive location where one or more quartets are all zeros, only one location can be abbreviated. For example, FEC2:0:0:0:78CA:0:0:23AB could be abbreviated as: FEC2::78CA:0:0:23AB or FEC2:0:0:0:78CA::23AB, but not FEC2::78CA::23AB
92
Q

The 128-bit address contains the following two parts…

A

Component

Description

Prefix

The first 64 bits are known as the prefix.

  • The 64-bit prefix can be divided into various parts and each part has a specific meaning. Parts in the prefix can identify the geographic region, the ISP, the network, and the subnet.
  • The prefix length identifies the number of bits in the relevant portion of the prefix. To indicate the prefix length, add a slash (/) followed by the prefix length number. Full quartets with trailing 0s in the prefix address can be omitted (for example, 2001:0DB8:4898:DAFC::/64).
  • Because addresses are allocated based on physical location, the prefix generally identifies the location of the host. The 64-bit prefix is often referred to as the global routing prefix.

Interface ID

The last 64 bits are the interface ID. This is the unique address assigned to an interface.

  • Addresses are assigned to interfaces (network connections), not to the host. Technically, the interface ID is not a host address.
  • In most cases, individual interface IDs are not assigned by ISPs, but are rather generated automatically or managed by site administrators.
  • Interface IDs must be unique within a subnet, but can be the same if the interface is on different subnets.
  • On Ethernet networks, the interface ID can be automatically derived from the MAC address. Using the automatic host ID simplifies administration.
93
Q

Dial-Up

A

A dial-up connection uses a modem connected to the phone line to connect to the internet.

  • Dial-up connections use the public switched telephone network (PSTN). Phone lines are sometimes referred to as POTS (plain old telephone service).
  • Multiple standards define how to send digital data over the analog phone lines at various speeds and compression ratios.
  • Dial-up connections are available anywhere a telephone line exists.
  • Data transfer rates include 28.8 Kbps, 33.3 Kbps, and 56 Kbps.
  • Dial-up connections cannot be used for both voice (phone calls) and data at the same time.
94
Q

Digital Subscriber Line (DSL)

A

DSL provides broadband digital data transmission over existing telephone lines.

  • DSL divides the telephone line into multiple channels. One channel is used for analog voice, while the remaining channels are used for digital data.
  • Filters are used to separate the analog voice data from digital data.
  • Several DSL standards exist, including ADSL, SDSL, and HDSL (collectively referred to as xDSL).
  • Depending on the type of DSL used, you can use the same line for simultaneous voice and data.
  • DSL is not available in all areas; the service location must be within a fixed distance of telephone switching equipment.
95
Q

Integrated Services Digital Network (ISDN)

A

ISDN is a digital service, running over a switched network.

  • There are two versions of ISDN:
    • ISDN BRI divides the regular copper telephone line into three channels:
      • 2 64-Kbps bearer (B) channels can transfer data up to 128 Kbps (data compression increases the data transfer rate). Only one B channel is used during phone use reducing maximum speed to 64 Kbps.
      • 1 16-Kbps delta (D) channel for connection control.
    • ISDN PRI requires different cables to be installed rather than the regular phone lines. The cable is divided into 24 channels:
      • 23 B channels (each at 64 Kbps) for data transmission.
      • 1 D channel (at 64 Kbps) for connection control.
  • ISDN is not available in all areas; subscribers are required to be within a certain proximity of telephone company equipment.
  • ISDN is more common in Europe than in the United States.
96
Q

Cable

A

Cable networking uses a cable TV connection to create a wide area connection to the internet.

  • A cable modem (router) connects the computer to the cable network for sending networking signals.
  • The same cable line is used to carry networking and cable TV signals, although in some cases a separate line is installed for internet access.
  • Cable networking requires the installation of a cable TV line to your location if one does not exist.
97
Q

Cellular

A

Cellular networking uses the cellular phone infrastructure for internet access.

  • Mobile phones with digital data plans use cellular signals to connect to the internet.
  • Devices can connect to a cellular internet connection in a variety of ways:
    • Many smart phones use a technique known as tethering to provide cellular internet to another device. Tethering typically requires the smart phone to be connected via a USB cable.
    • A mobile hotspot is a cellular device that provides internet access by creating a small Wi-Fi network to which multiple devices can connect. Most smart phones have built-in mobile hotspot functionality.
    • Some mobile devices (e.g., notebook computers and tablets) have integrated cellular antennas.
    • USB cellular adapters can be connected to most mobile devices to provide cellular access.
  • Cellular networking is a truly mobile solution. You can often be moving and still have internet access without manually having to reconnect.
  • Internet access is limited to areas with cell phone coverage. Coverage will be dictated by the service provider’s network.

Cellular networks used for voice and data include the following types:

  • 2G (second generation) networks were the first to offer digital data services. 2G data speeds are slow (14.4 Kbps) and were used mainly for text messaging and not internet connectivity.
    • 2.5G was an evolution that supported speeds up to 144 Kbps.
    • EDGE (also called 2.75G) networks are an intermediary between 2G and 3G networks. EDGE is the first cellular technology to be truly internet compatible, with speeds between 400 and 1,000 Kbps.
  • 3G (third generation) offers simultaneous voice and data. The minimum speed for stationary users is quoted at 2 Mbps or higher.
  • 4G (fourth generation) offers minimum speeds of around 38 Mbps, with up to 100 Mbps possible
98
Q

Satellite

A

Satellite networking uses radio signals sent and received from a satellite. Satellite networking is divided into two categories, Geostationary Satellites (GEOs) and Low Earth Orbit Satellites (LEOs). Geostationary Satellite (GEO):

  • Uses a transmitter with an antenna (dish) directed skywards to a satellite
  • Requires line-of-sight to the satellite (dish placement is crucial)
  • Is affected by mild atmospheric and weather conditions (fog, rain, or snow can disrupt service)
  • May have a long delay time (latency) between requests and downloads
  • Can be a portable solution for cars or trucks with an attached satellite dish
  • Provides nearly 100% global coverage

Low Earth Orbit Satellite (LEO):

  • Closer to the Earth than GEOs
  • Orbits at a distance of about 1200 miles above the Earth
  • Simpler and cheaper to make than GEOs
  • Fast, accurate communication and service
  • Coverage area is limited; needs more satellites to cover a bigger area

Some satellite internet access solutions are limited to download only. Another solution, such as dial-up, is required to provide upload capabilities

99
Q

Line of Site

A

Line of site internet access (also called fixed wireless broadband) is similar to satellite internet; however, instead of antennas being directed to a satellite in orbit, they are pointed at a large antenna on land. The antennas use radio signals–typically microwaves–to transmit and receive data. Line of site internet:

  • Requires a direct line of site between two fixed antennas. A single, large antenna provides connections for all subscribers in an area
  • Provides internet access without needing to run cables or lines to each subscriber’s premise
  • Can provide internet to remote areas by installing a single antenna
  • Ss affected by weather conditions, similar to satellite networking
  • Offers speeds of up to 1520 Mbps
100
Q

Voice over IP (VoIP)

A

Voice over IP (VoIP) sends voice phone calls using the TCP/IP protocol over digital data lines.

  • With VoIP, phone calls are made through your internet connection, not through a phone line.
  • When you make a phone call, the call is converted into digital data and sent through the internet.
  • VoIP is provided by many ISPs to replace existing analog telephone lines (even using the same phone number).
  • Desktop computers can be used to make VoIP calls by using VoIP software and the computer’s microphone and speakers. The most common example of this is the VoIP application Skype
101
Q

ipconfig

(Windows OS)

A

ipconfig displays IP configuration information for network adapters. Use the ipconfig command as follows:

  • Use ipconfig to view IP address, subnet mask, and default gateway configuration.
  • Use ipconfig /all to view detailed configuration information, including the MAC address and the DHCP server used for configuration.
  • Use ipconfig /release to release the IP configuration information obtained from the DHCP server.
  • Use ipconfig /renew to request new IP configuration information from the DHCP server.
  • Use ipconfig /displaydns and ipconfig /flushdns to view and manage the local DNS cache. The first command displays the contents of the local DNS cache that Windows maintains and updates every 24 hours. The second option flushes (or removes) all the entries in the current DNS cache. If the IP address of a network server is changed, your local cache will contain the old IP address until the cache is updated or the flushdns option is used.
102
Q

ifconfig

(Linux/macOS)

A

ifconfig is used on Linux and macOS systems and displays the installed network interfaces and the current configuration settings for each interface, including the MAC address, IP address, broadcast address, and subnet address. Use the ifconfig command as follows:

  • Use ifconfig [interface_name] down to disable the specified network interface.
  • Use ifconfig [interface_name] up to enable the specified network interface.

Use the following utilities to display additional networking information not provided by ifconfig:

  • The hostname command displays the system’s hostname.
  • The route command displays the default gateway configuration settings.

On Linux systems, the iwconfig command is used to display information about wireless network interfaces

103
Q

ping

A

ping sends an ICMP echo request/reply packet to a remote host. A response from the remote host indicates that both hosts are correctly configured and a connection exists between them.

You can ping a host by IP address or use the DNS name. When the DNS name is used, the computer must look up the corresponding IP address before performing the ping test.

  • -a looks up the hostname from a given IP address.
  • -t performs a continuous ping test (press Ctrl + C to stop sending the ping tests).

-l [size] specifies the packet payload size (in bytes) to use in the test. This can help determine whether packets above a certain size are being lost

104
Q

tracert,
traceroute

A

tracert is similar to the ping utility because it tests connectivity between devices; however, tracert also shows the path between the two devices. Responses from each hop on the route are measured three times to accurately report how long the packet takes to reach the specific host and then return.

  • On a Windows system, use the tracert command.
  • On Linux and macOS systems, use the traceroute command
105
Q

nslookup

A

nslookup resolves (looks up) the IP address of the specified hostname. It also displays additional name resolution information, such as the DNS server used for the lookup request

106
Q

netstat

A

netstat displays the following IP-related statistics:

  • Current connections
  • Incoming and outgoing connections
  • Active sessions, ports, and sockets
  • The local routing table
107
Q

nbtstat

A

nbtstat is used to diagnose issues regarding NetBIOS over TCP/IP. You can use the following options with nbtstat:

  • -c displays the NetBIOS cache of remote machine names and their IP addresses.
  • -n displays NetBIOS names that have been registered on the local system.
  • -r displays names resolved by broadcast and via WINS.
  • -R clears and then reloads the remote cache name table.
  • -S displays current NETBIOS sessions with the destination IP addresses.
  • -s displays current NETBIOS sessions by NETBIOS names
108
Q

Telnet

A

The Telnet utility is used for remote server management.

  • The Telnet protocol must be running and configured on the remote server in order for a Telnet session to be established.
  • By default, Telnet does not encrypt transmissions (they are sent as clear text).
  • Telnet is mostly used by specialized industrial and scientific devices.

In addition to sending transmissions in clear text, there are several well-known vulnerabilities in the Telnet protocol. Because of this, Telnet should not be used when sending sensitive information

109
Q

SSH

A

Like Telnet, the SSH utility is used for remote server management; however, SSH encrypts all communications and is much more secure.

  • SSH can be used to remotely log onto a server and complete configuration tasks.
  • In order to establish an SSH session, the server must have the SSH process running and configured to allow remote connections.
  • Use the following syntax to establishing an SSH connection:

  ssh [username]@[server_address]

110
Q

You should be able to perform some basic troubleshooting steps for network connections. Even if you are unable to fix the problem, taking these steps will at least help you identify the scope of the problem, which will help you know who to contact for additional help.

A

Step

Description

Verify the network adapter

Verify that your computer has detected and properly configured the network adapter card.

  • To view a list of available network connections, do one of the following:
    • In the notification area, right-click the Network icon and select Open Network & Internet settings. Select Change adapter options.
    • In Windows 8 and Windows 10, right-click Start and select Network Connections.
  • If the network interface card is detected and configured, you should see an Ethernet or Wi-Fi icon in the Network Connections window. Make sure that the connection is enabled.
  • If there is no icon, check Device Manager to make sure that the device is detected, has the appropriate drivers, and is enabled. If there is no network device, then the hardware could not be detected.

Verify physical connectivity

If you have a network connection in Windows, verify that the adapter can establish a physical connection to the network.

  • For wired connections:
    • The notification area includes a Network icon that indicates the physical status of the connection. If the cable is unplugged or the NIC cannot find a connected device, the Network icon will have an X on it.
    • Check the status lights on the back of the NIC to verify the physical status. There should be a link light that is green. An unlit link light or one that is another color (like red or yellow) indicates a physical connectivity problem.
  • For wireless connections:
    • The notification area includes a Wireless Network icon that indicates the connection status. If the computer is not connected to any wireless network, the icon will have an X on it.
    • Make sure the wireless NIC is installed properly and, if applicable, has any necessary antennae installed.

If you suspect a problem with the physical connection, try the following:

  • For wired connections:
    • Use a different network cable that you know works. You can use a cable tester or cable certifier to test the network cabling behind the wall between the wall jack and the punch-down panel. You can also use a tone generator (sometimes called a toner) and probe to trace the location of cables through the wall and ceiling.
    • Connect the cable to a different hub or switch port and check the status lights on the port.
    • Try installing a different network adapter, such as an external adapter that connects through a USB port.
  • For wireless connections:
    • Verify that the SSID settings are correct. If the SSID is hidden, make sure the manually entered SSID has been entered correctly.
    • Make sure both the authentication type and passphrase are correct.
    • If MAC address filtering is being used, ensure the device has been properly configured on the access point.
    • If the SSID is hidden, make sure the manually entered SSID has been entered correctly.
    • Use a wireless analyzer, which can be installed on a smart phone or tablet, to do the following:
      • Locate wireless networks.
      • Identify crowded channels or sources of interference.
      • Find locations with poor wireless coverage.
      • Detect rogue access points.

Verify the IP configuration

If the network adapter has a physical connection, verify the IP configuration for the connection.

  • Use ipconfig to view the IP address, subnet mask, and default gateway configured for the system.
  • Use ipconfig /all to view additional information including the MAC address of the network adapter and the DNS server addresses.
  • Verify that all configuration values are correct.
  • If the computer is using DHCP and if you see an IP address beginning with 169.254.x.x and a mask of 255.255.0.0, the computer was not able to contact the DHCP server and used the APIPA feature to configure the address automatically. In this case, verify that the DHCP server is connected to the network and properly configured.

Verify network communication

If the computer has a valid network connection and IP configuration values are correctly set, you can use the ping command to test connectivity with other network hosts. Ping sends out a request that is answered by the destination device.

  • If the ping test succeeds, the destination device is working. If you are still having problems, check issues with logon, resource sharing, permissions, or services.
  • If the ping test fails only to that device, then the device might not be properly configured.
  • If a ping test fails to any network device, check routers and other devices.
  • You can use the host name with the ping command. If you can ping the device by the IP address but not the host name, then the problem is likely with the DNS configuration.

Be aware that many devices are now configured not to respond to ping requests. A failed ping test might not give you reliable information about the status of network devices.