Networking and Wireless Networking Flashcards
Devices (wireless networking architecture)
An STA (station) is any device that is able to use the 802.11 protocol to communicate on a wireless network. Devices on a wireless network include:
- A wireless NIC for sending and receiving signals.
- A wireless access point (AP) is a lot like a hub. It receives wireless signals from several nodes and retransmits them to the rest of the network.
- A wireless bridge connects two wireless APs into a single network or connects your wireless AP to a wired network. Most APs today include bridging features.
Many wireless access points include ports (i.e., switches or routers) to connect the wireless network to the wired portion of the network.
Connection Method (wireless networking architecture): Explain the 2 types
Ad hoc
An ad hoc network works in peer-to-peer mode. The wireless NICs in each host communicate directly with one another. An ad hoc network is difficult to maintain for a large number of hosts because connections must be created between a host and every other host, and special configurations are required to reach wired networks. You will typically use an ad hoc network only to create a direct, temporary connection between two hosts.
Infrastructure
An infrastructure wireless network employs an access point that functions like a hub on an Ethernet network. With an infrastructure network, you can easily add hosts without increasing administrative efforts (scalable), and the access point can be easily connected to a wired network, allowing clients to access both wired and wireless hosts.
You should implement an infrastructure network for all but the smallest of wireless networks.
802.11 Specification Standards
The original 802.11 specification operated in the 2.4 GHz range and provided up to 2 Mbps. Additional IEEE subcommittees have further refined wireless networking, resulting in the following standards:
Specification
Standard
802.11a
802.11b
802.11g
802.11n
802.11ac
Frequency
5 GHz
(U-NII)
- 4 GHz (ISM)
- 4 GHz (ISM)
2.4 GHz (ISM) or 5 GHz
(U-NII)
5 GHz (U-NII)
Maximum speed
54 Mbps
11 Mbps
54 Mbps
600 Mbps
1.3 Gbps
Maximum distance
100 ft.
150 ft.
150 ft.
300 ft.
150 ft.
Channels
(non-overlapped)
23 (12)
11 (3)
11 (3)
2.4 GHz: 11 (3 or 1)
5 GHz: 23 (12 or 6)
Depends on configuration
Modulation technique
OFDM
DSSS, CCK, DQPSK, DBPSK
DSSS (and others) at lower data rates;
OFDM, QPSK, BPSK at higher data rates
OFDM (and others, depending on implementation)
OFDM
Backwards compatibility
N/A
None
- 11b
- 11a/b/g, depending on implementation
- 11b/g/n
Multiple-Input, Multiple-Output (MIMO) (802.11n Technologies)
MIMO increases bandwidth by using multiple antennas for both the transmitter and receiver.
A system is described by the number of sending and receiving antennas. The 802.11n specifications allow up to four sending and four receiving antennas. The benefit of adding additional antennas declines as the number increases; going above 3x3 provides a negligible performance increase.
Channel Bonding (802.11n Technologies)
Channel bonding combines two, non-overlapping 20 MHz channels into a single 40 MHz channel, resulting in slightly more than double the bandwidth.
- The 5 GHz range has a total of 23 channels, with 12 non-overlapping. This allows for a maximum of 6 non-overlapping bonded (combined) channels.
- The 2.4 GHz range has a total of 11 channels, with 3 non-overlapping. This allows for a maximum of 1 non-overlapping bonded channel. For this reason, channel bonding is typically not practical for the 2.4 GHz range
Multi-User MIMO (MU-MIMO) (802.11ac Technologies)
MU-MIMO is an enhancement to MIMO that allows multiple users to use the same channel.
In addition to adding MU-MIMO, 802.11ac doubled the number of MIMO radio streams from four to eight.
What are the wireless network authentication methods?
Method
Description
Open
Open authentication requires that clients provide a MAC address in order to connect to the wireless network.
- You can use open authentication to allow any wireless client to connect to the AP. Open authentication is typically used on public networks.
- You can implement MAC address filtering to restrict access to the AP to only known (or allowed) MAC addresses.
Because MAC addresses are easily spoofed, this provides little practical security.
Shared Key
With shared key authentication, clients and APs are configured with a shared key (called a secret or a passphrase). Only devices with the correct shared key can connect to the wireless network.
- All APs and all clients use the same authentication key.
- Shared key authentication should be used only on small, private networks.
- Shared key authentication is relatively insecure, as hashing methods used to protect the key can be easily broken.
- 1x
- 1x authentication uses usernames and passwords, certificates, or devices such as smart cards to authenticate wireless clients. Originally designed for Ethernet networks, the 802.1x standards have been adapted for use in wireless networks to provide secure authentication. 802.1x authentication requires the following components:
- A RADIUS or TACACS+ server to centralize user account and authentication information. A centralized database for user authentication is required to allow wireless clients to roam between cells but authenticate using the same account information
- A PKI for issuing certificates. At a minimum, the RADIUS server must have a server certificate. To support mutual authentication, each client must also have a certificate
Use 802.1x authentication on large, private networks. Users authenticate with unique usernames and passwords.
Wired Equivalent Privacy (WEP)
WEP is an optional component of the 802.11 specifications that were deployed in 1997. WEP has the following weaknesses:
- A static pre-shared key (PSK) is configured on the AP and the client. It cannot be dynamically changed or exchanged without administration. As a result, every host on large networks usually uses the same key.
- Because key values are short and don’t change, the key can be captured and easily broken.
Because of the inherent security flaws, avoid using WEP whenever possible. If using WEP cannot be avoided, implement it only using open authentication. Shared key authentication with WEP uses the same key for both encryption and authentication, exposing the key to additional attacks.
Wi-Fi Protected Access (WPA)
WPA is the implementation name for wireless security based on initial 802.11i drafts that was deployed in 2003. It was intended to be an intermediate measure to take the place of WEP while a fully secured system (802.11i) was prepared. WPA:
- Uses Temporal Key Integrity Protocol (TKIP) for encryption
- Supports both pre-shared key (WPA-PSK or WPA Personal) and 802.1x (WPA Enterprise) authentication
- Can use dynamic keys or pre-shared keys
- Can typically be implemented in WEP-capable devices through a software/firmware update
WPA keys can also be predicted by reconstructing the Message Integrity Check (MIC) of an intercepted packet, sending the packet to an AP, and observing whether the packet is accepted by the AP.
Wi-Fi Protected Access 2 (WPA2) or 802.11i
WPA2 is the implementation name for wireless security that adheres to the 802.11i specifications. It was deployed in 2005. It is built upon the idea of Robust Secure Networks (RSN). Like WPA, it resolves the weaknesses inherent in WEP. It is intended to eventually replace both WEP and WPA. WPA2:
- Uses Advanced Encryption Standard (AES) as the encryption method
- Supports both pre-shared key (WPA2-PSK or WPA2 Personal) and 802.1x (WPA2 Enterprise) authentication
Can use dynamic keys or pre-shared keys
Wi-Fi Protected Access 3 (WPA3)
WPA3 is a new authentication launched in 2018. It is a more resilient version of WPA2. WPA3:
- Uses password-based authentication
- Provides better protection against password guessing attempts by using Simultaneous Authentication of Equals (SAE)
Offers 192-bit cryptographic strength, giving additional protection for networks dealing with sensitive data
Infrared (IR) connection method
Infrared uses invisible light waves for communication. Infrared:
- Is a line-of-sight medium. Objects cannot be in the path of communications.
- Communicates at 9600 bps up to 4 Mbps and uses the resources of a COM port.
- Works best for devices within 1 meter, but can operate up to 30 meters in areas without ambient light interference.
- Offers no security for transmissions.
Infrared is typically used for remote control devices or for sending data between two devices. Most smart phones have integrated IR capabilities.
Bluetooth connection method
Bluetooth uses radio waves in the 2.4 GHz frequency range for communication.
- Bluetooth uses ad hoc connections between devices to create personal area networks called piconets. A piconet can have up to 7 devices, and each device can participate in multiple piconets at the same time.
- By using adaptive frequency hopping (AFH), Bluetooth is able to automatically detect other devices in the area and avoid the frequencies used by those devices. It can switch between 79 channels to avoid interference.
- A 128-bit proprietary encryption mechanism is used to encrypt signals.
- Transmission speeds and max distance depends on the version and device class:
Version
Speed
1.2
1 Mbps
2.0
3 Mbps
3.0
24 Mbps
- 0
*
Class
Distance
1
100 m
2
10 m
3
1 m
- Common applications for Bluetooth include the following:
- Connecting peripheral devices (e.g., keyboard and mouse)
- Wireless headphones and smart phone headsets
- Peer-to-Peer communications (e.g., sharing data between a smart phone, notebook, and tablet)
Bluetooth is also able to transmit audio and video data signals
Near Field Communication (NFC)
NFC enables communication between two devices that are in very close proximity with each other.
- NFC operates in the 13.56 MHz frequency and has a maximum transmission speed of 424 Kbps.
- Special chips called NFC chips are used to send, receive, and store data.
- Devices using NFC operate in one of three modes:
- Reader/writer mode is used to read information stored on an NFC chip.
- Peer-to-Peer mode enables two devices to communicate and exchange information.
- Card Emulation mode emulates the functionality of a smart card in order to perform contactless payment or ticketing (this mode is typically used by smart phones).
- In order to communicate, devices must be within 2 inches of each other.
- Data transmissions can be secured by using encryption algorithms.
- NFC has seen widespread use in the following areas:
- Contactless payment (e.g., using a smart phone as a payment method)
- Identification (e.g., passports that contain an NFC chip)
- Video gaming
Even though NFC has slower transmission speeds than Bluetooth, it consumes much less power and sets up connections much faster
SOHO Characteristics
Most SOHO networks have the following characteristics:
- Supports between 1–10 connected hosts (computers, mobile devices, or printers)
- Uses Ethernet or 802.11 wireless networking (or both) as the network medium
- Uses a single internet connection that is shared among all hosts
- Uses a single subnet
- Employs a workgroup networking model (i.e., there are no dedicated servers and a domain is not used)
A typical SOHO network uses what devices?
A typical SOHO network uses the following devices:
- A modem or router connects the location to the internet. This connection provides a single IP address for connecting to the internet.
- A router connects the private network to the internet connection. This router is typically a multifunction device, which includes a four port switch, wireless access point, and firewall functionality.
- Additional wired connections can be provided by connecting additional switches to the router.
A SOHO network uses multiple devices that share a single internet connection. The connection to the internet is typically through an access point or router that includes switch ports and/or a wireless access point to connect devices to the local area network and the internet. The type of device you use depends on the internet connection type (DSL, cable, fiber, etc.).
What re the general steps you would take to configure a SOHO router and set up the network
Action
Description
Configure the Internet Connection
Begin by connecting the router to the internet connection using the device’s WAN port.
- For a DSL or ISDN router, connect the device directly to the DSL/ISDN line.
- For a cable, fiber optic, or satellite connection, connect the router to the Ethernet port on the modem or connection device.
Many routers will automatically detect and configure the internet connection. If not, follow the ISP instructions for setting up the connection. This could include:
- Configuring the internet connection with a static IP address assigned by the ISP or configuring the device to use DHCP for addressing
- Configuring the protocol used for the connection. This will often be PPPoE for an always-on internet connection
- Configuring logon information (username and password) to access the internet
- Configuring a default gateway and DNS server addresses that the router will use in order to access the internet
Configure the Router
Before setting up the network, some basic settings on the router need to be configured. Most important is to change the default administrator username and password. Default usernames and passwords are easily guessed or discovered by checking the device documentation. By changing the password, you protect the system from unauthorized access.
Enable NAT
Small networks use a single public IP address to connect to the internet. This IP address is shared by all devices on the private network. Network address translation (NAT) is a protocol that allows multiple computers to share a single public IP address used on the internet.
- The internet is classified as a public network. All devices on the public network must have a registered IP address. This address is assigned by the ISP.
- The SOHO network is classified as a private network. All devices on the private network use private IP addresses internally, but share the public IP address when accessing the internet.
- A NAT router associates a port number with each private IP address. Communications with the private hosts from the internet are sent to the public IP address and the associated port number. Port assignments are made automatically by the NAT router.
- The private network can use addresses in the following ranges that have been reserved for private use (i.e., they will not be used by hosts on the internet):
- 10.0.0.0 to 10.255.255.255
- 172.16.0.0 to 172.31.255.255
- 192.168.0.0 to 192.168.255.255
Secure the SOHO Network
Although the router should now be configured to connect hosts to the private network and provide internet access, the following steps should be taken to properly secure the network from external threats:
- Configure the firewall on the device. Enabling the basic firewall on the router provides an additional level of security for the private network. If necessary, configure exceptions on the firewall to allow specific traffic through the firewall.
- Configure content filtering and parental controls. Most SOHO routers provide content filtering and parental controls that prevent hosts from accessing specific websites or using a specific internet service, such as chat, torrent, or gaming applications.
- Physically secure the router. Anyone with physical access to the router can make configuration changes and gain access to the network. To prevent this, limit physical access to the router. For example, place the router and other networking equipment in a locked closet.
Create a Whitelist and Blacklist
When securing devices or navigation access, there are two options to create lists that either allow or deny access through the Firewall security:
- Whitelisting means that only the devices on the list are allowed access. Basically, everyone is blocked access except for the devices on the whitelist.
- Blacklisting means all devices are allowed access except for the ones on the blacklist. It’s just the opposite of Whitelisting.
Configure for a Network Environment
Depending on the implementation, it may be necessary to take the following steps in order to configure the SOHO router for a particular network environment:
- Enable and configure a DMZ (demilitarized zone) host. Configuring a DMZ on a SOHO router causes all incoming port traffic to be forwarded to the specified DMZ host. Because this can open up the network to a variety of external threats, configure a DMZ only if you understand all the implications associated with it.
- Configure quality of service (QoS) settings. Most SOHO routers provide basic QoS functionality. When enabled, QoS prioritizes certain network communications over others. For example, VoIP network traffic would be given higher priority and more bandwidth than HTTP (web browser) traffic.
- Enable the Universal Plug and Play (UPnP) networking protocol. UPnP is a networking protocol that allows UPnP enabled devices to easily discover each other on the network and share data and media content.
If the SOHO router includes a wireless access point, or if a standalone wireless access point is being used, what are the configuration steps to configure and secure the wireless network?
Action
Description
Change the Default SSID
Many manufacturers use a default SSID that contains identifying information (such as device manufacturer and model number), so it is important to change the device’s SSID from the default. In addition to changing the default SSID, it is also possible to disable the SSID broadcast. This is known as SSID suppression or cloaking. With broadcasting disabled, the SSID needs to be manually entered into devices for them to connect to the network (the SSID will not show up in the list of available networks).
Even with the broadcast disabled, it’s relatively easy to identify the SSID of a network by using readily available applications. Because of this, SSID suppression should not be the only form of protection.
Configure the Wireless Protocol
If your access point supports multiple wireless protocols, select the protocols to support, such as 802.11n only or mixed mode (both 802.11n and 802.11g). Be aware that when using mixed mode, most access points will throttle all clients to the slowest connected protocol speeds (i.e. if a 802.11g client connects to the network, 802.11n clients will operate at 802.11g speeds).
Configure the Channel
The channel identifies the portion of the wireless frequency used by the access point and connected devices.
- You should use a channel that does not overlap or conflict with other access points in the area. A simple rule to minimize conflicts is to remember that the frequencies used by channels 2–5 compete with the frequencies used by channels 1 and 6, while the frequencies used by channels 7–10 compete with the frequencies used by channels 6 and 11.
- Many access points have an automatic channel feature that detects other access points and automatically selects the channel with the least amount of traffic.
Configure Encryption and Authentication
Add authentication to allow only authorized devices to connect. Use encryption to protect wireless communications from eavesdropping.
- Always use WPA2 when possible. If WPA2 isn’t available, use WPA.
- Use pre-shared key (PSK) authentication with either AES (more secure) or TKIP (less secure) encryption for a SOHO network without a domain,
- Configure the shared secret (passphrase) value used with WPA2 or WPA. Each client needs to be configured with same secret value.
Because WEP has several known security vulnerabilities and can be easily cracked, it should be used only as a last resort. When using WEP, never use shared key authentication; use only open authentication.
Enable MAC Address Filtering
By specifying which MAC addresses are allowed to connect to your network, you can prevent unauthorized devices from connecting to the access point. MAC address filtering can be implemented in one of two ways:
- All MAC addresses are allowed to connect to the network, except for those specified in the deny list.
- All MAC addresses are denied access, except for those specified in the allow list.
MAC address filtering is considered a cumbersome and weak form of security. Permitted MAC addresses can be very easily captured and spoofed by even casual attackers.
Disable DHCP for Wireless Clients
Disabling DHCP on the wireless access points allows only users with a valid, static IP address in the range to connect. An attacker would have to be able to discover or detect the IP address range, subnet mask, and default gateway information to connect to the access point.
Determine Best Access Point Placement
The location of the access point can affect signal strength and network access. Keep in mind the following recommendations:
- Place access points in central locations. Radio waves are broadcast in each direction, so the access point should be located in the middle of the area that needs network access.
- Place access point to take advantage of the fact that devices often get better reception from access points that are above or below.
- In general, place access points higher up to avoid interference problems caused by going through building foundations.
- For security reasons, do not place access points near outside walls. The signal will extend outside beyond the walls. Placing the access point in the center of the building decreases the range of the signals available outside of the building.
- Do not place the access point next to sources of interference, such as other wireless transmitting devices (cordless phones or microwaves) or other sources of interference (motors or generators).
Configure Wi-Fi Protected Setup (WPS)
The WPS security protocol makes it easier for WPS-enabled devices (e.g., a wireless printer) to connect to the wireless network. WPS can use several methods for connecting devices, including the PIN method and the push button method. The method used to connect devices must be supported by both the access point and the wireless device.
Because of the inherent security vulnerabilities with WPS, it is best to disable this feature on the access point.
Describe each network location profile and the situations in which they should be selected
Location
Description
Home Network
The Home network location is designed for use on networks where you know and trust each device on the network. With the Home network location:
- Network discovery is enabled. This means other computers and devices on the network are able to see and connect to each other.
- Connected devices are able to join the network homegroup.
- The Windows firewall configuration is changed to allow certain types of network communication through.
Because this network location is the least secure, select this location only if you know all the devices and people that are connected to the network.
Work Network
The Work network location is designed to be used in a SOHO environment or other small business network. With the Work network location:
- Network discovery is enabled; however, the computer is unable to create or join a homegroup.
- The Windows firewall configuration is changed to allow certain types of network communication.
Public Network
The Public network location is designed for use on unknown or public networks (e.g., a coffee shop or other public Wi-Fi network). With the Public network location:
- Network discovery is disabled. This means other computers on the network cannot see you and you cannot see them.
- Network sharing, such as printers and scanners, is disabled.
- The Windows firewall configuration is changed to block almost all inbound and most outbound communications. For applications to be able to communicate, they need to be manually allowed through the firewall.
The Public network profile should be used when connecting to any unknown network location, such as a hotel’s Wi-Fi network.
Network
A network is a group of computers that can share information through their connections
A network is made up of what components?
A network is made up of the following components:
- Computers (often called nodes or hosts).
- Transmission media, which provide a path for electrical signals between devices.
- Network interfaces, devices that send and receive electrical signals.
Protocols, rules or standards that describe how hosts communicate and exchange data
What do networks allow them to do that saves organizations money?
Despite the costs of implementation and maintenance, networks actually save organizations money by allowing them to:
- Consolidate (centralize) data storage.
- Share peripheral devices, like printers.
- Increase internal and external communications.
Increase productivity and collaboration
Name 4 different network types and describe the classifications that fall under each.
Type
Classification
Description
Host Role
Peer-to-Peer
In a peer-to-peer network, each host can provide network resources to other hosts or access resources located on other hosts. Each host is in charge of controlling access to those resources. Advantages of peer-to-peer networks include the following:
- Easy implementation
- Inexpensive
Disadvantages of peer-to-peer networks include the following:
- Difficult to expand (not scalable)
- Difficult to support
- Lack centralized control
- No centralized storage
Client-Server
In a client-server network, hosts have specific roles. For example, some hosts are assigned server roles, which allow them to provide network resources to other hosts. Other hosts are assigned client roles, which allow them to consume network resources. Advantages of client-server networks include the following:
- Easy to expand (scalable)
- Easy to support
- Centralized services
- Easy to back up
Disadvantages of client-server networks include the following:
- Expensive server operating systems
- Extensive advanced planning required
Geography
Personal Area Network (PAN)
A personal area network is a very small network used for communication between personal devices. For example, a PAN may include a notebook computer, a wireless headset, a wireless printer, and a smartphone. A PAN is limited to a few feet in range. A PAN is typically created using Bluetooth wireless technologies.
Local Area Network (LAN)
A local area network is a network in a small geographic area, like an office. A LAN typically uses wires to connect systems together.
Wireless Local Area Network (WLAN)
A wireless LAN covers an area that is roughly the same size as a standard LAN. It uses radio signals to connect systems instead of wires.
Metropolitan Area Network (MAN)
A metropolitan area network is a network that covers an area as small as a few city blocks to as large as an entire metropolitan city. MANs are typically owned and managed by a city as a public utility. Be aware that many IT professionals do not differentiate between a wide area network and a MAN, as they use essentially the same network technologies.
Wide Area Network (WAN)
A wide area network is a group of LANs that are geographically isolated, but are connected to form a large internetwork.
Wireless Mesh Network (WMN)
A wireless mesh network (WMN) is a group of wireless mesh nodes that communicate with one another to share the network connection across a large area. They provide the ability to stream voice, data, and video between arbitrary pairs of devices. Each device in the WMN uses the others as relays to avoid the need for infrastructure.
Wireless Wide Area Network (WWAN)
A wireless wide area network (WWAN) covers a large geographical area by connecting separate areas wirelessly. WLAN and WWAN both connect to the internet wirelessly, but they use different technologies to do it. WWANs are often referred to as 3G, 4G, or LTE networks because they usually use cellular network technologies as connection types.
Management
Network
The term network often describes a computer system controlled by a single organization. This could be a local area network at a single location or a wide area network used by a single business or organization. If two companies connected their internal networks to share data, you could call it one network. In reality, however, it is two networks, because each network is managed by a different company.
Subnet
A subnet is a portion of a network with a common network address.
- All devices on the subnet share the same network address, but they have unique host addresses.
- Each subnet in a larger network has a unique subnet address.
- Devices connected through hubs or switches are on the same subnet. Routers are used to connect multiple subnets.
Internetwork
A network with geographically dispersed WAN connections that connect multiple LANs is often called an internetwork. Additionally, connecting two networks under different management is a form of internetworking because data must travel between two networks.
Participation
Internet
The internet is a large, world-wide, public network. The network is public because virtually anyone can connect to it, and users or organizations make services freely available on the internet.
- Users and organizations connect to the internet through an internet service provider (ISP).
- The internet uses a set of communication protocols (TCP/IP) for providing services.
- Individuals and organizations can make services (such as a website) available to other users on the internet.
Intranet
An intranet is a private network that uses internet technologies. Services on an intranet are only available to hosts that are connected to the private network. For example, your company might have a website that only employees can access.
Extranet
An extranet is a private network that uses internet technologies, but its resources are made available to external trusted users. For example, you might create a website on a private network that only users from a partner company can access.
Network-Attached Storage (NAS)
A NAS is a device that is optimized to provide a single service: file sharing. NAS devices range in price from several hundred to several thousand dollars. A NAS can be connected to a network and configured very easily. This makes them a great choice for most networks needing a file sharing service
Internet Appliance
An internet appliance is a specialized device that performs a specific network role. The following are some common internet appliances:
- Web proxy
- Content filter
- Malware scanner
Internet appliances are typically more expensive than configuring a server to perform the same task. However, internet appliances perform much better and have more features.
VoIP
VoIP devices provide voice communication over a packet-switched network (an IP network). The most common VoIP device is an IP phone. Instead of using the standard public switched telephone network, IP phones connect to an Ethernet network using an RJ45 connection. Basic VoIP services include Skype or Google Voice.
Businesses that use VoIP typically hire a third-party entity (such as Vonage or Jive) to set up the service and configure devices
Server
Networks contain two types of hosts, hosts that consume a service, and hosts that provide a service. Hosts that provide a service are called servers. The following are some of the more common types of servers:
- File and Print Server - Provides file sharing and print sharing services.
- Application Server - Provides access to a shared network application (a database server that contains customer information).
- Directory Server - Handles user authentication. Also stores user credentials, permissions, and settings.
- Remote Access Server - Provides remote access to network resources.
- Web Server - Serves web pages and web content via HTTP.
- DNS Server - Uses the domain name service to map IP addresses to domain names.
- DHCP Server - Automatically configures network hosts with an IP address, subnet mask, DNS server, and default gateway
Bridge
A bridge connects two segments within the same subnet. Bridges learn which side a host resides on by copying the MAC address of the source device and placing it into the MAC address table. The port number the frame entered is also recorded in the table and associated with the source MAC address.
Another functionality of a bridge is to convert one type of transmission medium into another. A common example of this is a wireless bridge, which converts wired transmissions into wireless transmissions and vice versa
Router
A router connects two network segments that have different subnet addresses.
- A router has multiple network connections, and each connection is on a different subnet.
- Routers use the IP address within a packet to move packets between networks.
- Routers maintain a list of known networks and the next router in the path to reach the destination network
Switch
A switch provides a central connection for multiple media segments on the same subnet. A switch receives a signal on one port and forwards that signal only to the port where the destination device is connected.
Switches learn where a device is connected by copying the MAC address of the source device and placing it into the MAC address table. The port number the frame entered is also recorded in the table and associated with the source MAC address. If the switch doesn’t know which port a destination device is connected to, it will send the frame in question to all ports.
- Switches use the MAC address to send frames to the destination device.
- Switches can operate in full-duplex mode, where a device uses a different channel for sending and receiving and where the transmission paths are dedicated to only the communicating devices.
- You should use a switch instead of a hub in every situation.
- Many switches allow you to configure Quality of Service (QoS) settings, which prioritize certain types of network traffic over others. For example, if your network includes Voice over IP (VoIP) telephones, you could increase the priority of VoIP traffic on the switch to increase call quality.
- You must configure a switch before you implement it. An unmanaged switch is a low-end switch that you plug it into a power outlet and connect your network devices with UTP cables. While unmanaged switches are convenient and easy to implement, they lack many of the advanced management and security features available. It is preferable to use a managed switch instead. A managed switch is a switch that must be configured before you can use it
Hub
A hub provides a central connecting point for multiple media segments on the same subnet. When a hub receives a signal, it is sent out to all the ports on the hub. Hubs operate in half-duplex mode because the path between devices is shared, meaning that devices can only send when no other devices are sending data.
Hubs are a legacy network device and are rarely used because they lack features and perform poorly
Network Adapter
A network adapter is responsible for creating and receiving transmission signals that are sent along the networking medium.
- A network interface card (NIC) uses a cable medium (such as twisted pair or fiber optic cables).
- A wireless network adapter transmits radio waves
Media
The networking medium provides the path for signals to pass between devices.
- Copper cables use electrical signals.
- Fiber optic cables use light pulses.
- Wireless networks use radio waves or infrared waves.
Networking media that use cables are considered bounded, because the transmission signals are contained within the wire. Networks that use wireless communications are considered unbounded
Describe how devices communicate
Devices use the MAC address to send frames to other devices on the same subnet.
Before two devices can communicate, they must know the MAC address of the receiving device. They do this by using the Address Resolution Protocol (ARP):
- The sending device sends out a broadcast frame:
- The destination MAC address is all Fs (FFFF:FFFF:FFFF).
- The sending MAC address is its own MAC address.
- The destination IP address is the known IP address of the destination host.
- The sending IP address is its own IP address.
- All hosts on the subnet process the broadcast frame and look at the destination IP address of the packet.
- If the destination IP address matches its own address, the host responds with a frame that includes its own MAC address as the sending MAC address.
- The original sender then reads the MAC address from the frame and associates the IP address with the MAC address, saving it in cache.
When the sender knows the MAC address of the receiver, it sends data in frames addressed to the destination device
MAC Address
The MAC address is a unique hexadecimal identifier burned into the ROM of every NIC.
The MAC address is a 12-digit (48-bit) hexadecimal number. Each number ranges between 0–9 or A–F. The numbers in a MAC address can be divided by dashes (00-B0-D0-06-BC-AC), periods (00B0.D006.BCAC), or colons (00:B0:D0:06:BC:AC).
The MAC address is guaranteed unique through design. The first half (first six digits) of the MAC address is assigned to each manufacturer. The manufacturer determines the rest of the address, assigning a unique value which identifies the host address. A manufacturer that uses all the addresses in the original assignment can apply for a new MAC address assignment.
Some network cards allow you to change the MAC address through jumpers, switches, or software. However, there is little practical reason for doing so.
- The MAC address is a unique hexadecimal identifier burned into the ROM (physically assigned address) of every network interface.
- The MAC address is a 48-bit, 12-digit hexadecimal number (each number ranges from 0–9 or A–F).
- The address is often written as 00-B0-D0-06-BC-AC or 00B0.D006.BCAC (although dashes, periods, and colons can also be used to divide the MAC address segments).
- The MAC address is guaranteed unique through design.
- The first half (first 6 digits) of the MAC address is assigned to each manufacturer.
- The manufacturer determines the rest of the address, assigning a unique value which identifies the host address.
A manufacturer that uses all of the addresses in the original assignment can apply for a new MAC address assignment.
- Although some network cards allow you to change the MAC address (or specify one of your own choice), this is rarely done in practice.
- When you change the network card, the host will have a new physical device address.
- When you move a device to another network, the physical address remains the same (as long as the network card has not been changed).
Function of a network adapter
The network adapter is responsible for converting binary data into a format to be sent on the network medium. A transceiver is responsible for converting digital data into digital signals to be sent on the medium. The type of signal the transceiver sends depends on the type of network. A fiber optic NIC sends light signals, an Ethernet NIC sends electronic signals on a wire, and a wireless NIC sends radio signals. To receive signals, the transceiver converts digital signals from the network to digital data for the PC.
A modem converts binary data to analog waves (modulation) on the sending end and then converts the analog waves back to binary data (demodulation) on the receiving end.
Most desktop computers have motherboards with built-in network adapters. Practically all mobile devices (i.e., smart phones, tablets, laptops, etc.) have a built-in wireless NIC.
Network adapters must match the network medium of the network.
Ethernet network adapters that are connected to a switch will operate in full-duplex mode. This allows the adapter to send and receive at the same time
What is this cable? Describe the components
Coaxial cable is primarily used to carry broadband internet signals.
Coaxial cable is built with the following components:
- The inner conductor carries data signals and is made of solid copper or tin.
- The insulator surrounds the inner conductor and keeps the signal separated from the mesh conductor. It is made of PVC plastic.
- The braided mesh conductor is a second physical channel and also functions as a ground. It is made of aluminum or copper-coated tin.
- The sheath is made of PVC plastic and encases the cable, protecting it from external elements.
What is this cable? Describe the components
Coaxial cable is primarily used to carry broadband internet signals.
Coaxial cable is built with the following components:
- The inner conductor carries data signals and is made of solid copper or tin.
- The insulator surrounds the inner conductor and keeps the signal separated from the mesh conductor. It is made of PVC plastic.
- The braided mesh conductor is a second physical channel and also functions as a ground. It is made of aluminum or copper-coated tin.
- The sheath is made of PVC plastic and encases the cable, protecting it from external elements.
Describe the different coaxial cable grades
Because RG-6 is able to carry a higher-quality signal with much lower signal loss than RG-59, RG-6 cabling should always be used for any coaxial cable implementation
Type
Uses
Resistance Rating
RG-59
CCTV video systems; short cable lengths (less than 3 meters) are sometimes used for cable TV
75 ohms
RG-6
Cable TV, satellite TV, and broadband cable internet
75 ohms
describes the most common type of connector used with coaxial cable
- Molded onto the cable
- Used in legacy 10Base2 Ethernet networks
- Used in specialized industries
- Used to connect composite video displays on commercial video devices.
What is this cable? Describe the components
- Four pairs of copper wires carry the data signals (one wire in the pair carries a positive signal, the other carries a negative signal). Wires are twisted into pairs to reduce the effects of electromagnetic interference and crosstalk.
- PVC plastic insulation surrounds each copper wire.
- An outer plastic sheath bundles the wires together and protects them.
- Unshielded twisted pair (UTP) has only an outer plastic sheath. UTP cables are easier to work with and are less expensive than shielded cables.
- Shielded twisted pair (STP) has a grounded outer copper shield around the entire wire bundle or around each wire pair. STP provides additional EMI protection, but costs considerably more than UTP.
Twisted pair cable advantages and disadvantages
Advantages
Disadvantages
- Inexpensive compared to other media types
- Easy to install and manage
- Very common (media and tools are easy to obtain)
- The most common (and most supported) network medium
- Very susceptible to EMI
- Cables are easily damaged
- Vulnerable to eavesdropping
Describe the different unshielded twisted pair (UTP) cable categories
Category
Connector
Speed
Frequency
Description
Phone cable
RJ11
10 Mbps
N/A
Used to connect a modem to a phone jack in a wall outlet to establish a dial-up internet connection
Has two pairs of cable (a total of 4 wires).
Cat 5
RJ45
100 Mbps
100 MHz
Supports up to 100 Mbps Ethernet.
Cat 5e
RJ45
1000 Mbps
100 MHz
Similar to Cat 5 but provides better EMI protection. Supports gigabit Ethernet (gigabit connections require the use of all four twisted pairs)
Cat 6
RJ45
10 Gbps
250 MHz
10 Gbps speeds are limited to cable lengths less than 55 meters.
Cat 6a
RJ45
10 Gbps
500 MHz
10 Gbps speeds are limited to cable lengths less than 100 meters. Provides additional shielding and tighter cable twists than standard Cat 6, which reduces (alien) crosstalk and makes it less susceptible to EMI.
Cat 7
RJ45
10 Gbps
600 MHz
Has the strictest specifications for crosstalk and noise.
Describe the two types of connectors used with twisted pair cables
Connector
Description
RJ11
- Has 4 or 6 connectors
- The RJ-11 wiring standard supports up to 2 pairs of wires (one phone and one power)
- Uses a locking tab to keep a connector secure in an outlet
- Used primarily for telephone wiring
- The RJ-14 and RJ-25 wiring standard support additional phone lines using the same jack
RJ45
- Has 8 connectors
- Supports up to 4 pairs of wires
- Uses a locking tab to keep a connector secure in an outlet
- Used for Ethernet networks