0% found this document useful (0 votes)
19 views

WGU 413 Network Fundamentals Notes

WGU 413 Network Fundamentals Notes

Uploaded by

awhite1990
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

WGU 413 Network Fundamentals Notes

WGU 413 Network Fundamentals Notes

Uploaded by

awhite1990
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 28

Lesson: Introduction to Networking

Definition of a Network
Let's start with what a network is. Imagine a web connecting various computers, devices,
and communication tools. These connections allow them to share resources and data. This
interconnected system is what we call a network. It consists of nodes and hosts. The major
benefit of networking is that it lets us share equipment and data effortlessly. However,
there's a downside: networks can be costly and vulnerable to cyberattacks.

Network Classifications - Networks come in different sizes and serve various purposes. Here
are the main types:
 Local Area Network (LAN): This is like your home network, covering a small area.
 Metropolitan Area Network (MAN): Think of a city's public Wi-Fi system.
 Wide Area Network (WAN): This spans across cities, countries, or even continents, like
the internet. Other types include:
 Personal Area Network (PAN): Your personal Bluetooth devices.
 Campus Area Network (CAN): Networks within a university or business campus.
 Global Area Network (GAN): Global networks that connect multiple wide area
networks.
Network Topologies - The structure or layout of a network is called its topology. Here are four
common ones:
 Star Topology: All devices connect to a central hub.
 Ring Topology: Devices form a circular chain.
 Bus Topology: All devices share a single communication line.
 Mesh Topology: Devices are interconnected, providing multiple pathways. Sometimes,
networks combine these topologies, forming hybrid topologies.
Basic Network Administration Models - Networks can be managed in different ways:
 Centralized Administration: Used in client/server networks where a central server
controls everything.
 Decentralized Administration: Used in peer-to-peer networks where each device
manages itself.
Cloud Computing - Cloud computing offers various services:
 Software as a Service (SaaS): Like using Google Docs online.
 Platform as a Service (PaaS): For developers to build applications.
 Infrastructure as a Service (IaaS): Renting virtual machines and storage. Clouds can
be:
 Private: For a single organization.
 Public: Available to anyone.
 Hybrid: A mix of both. Software-defined networking (SDN) is a key cloud feature that
allows for flexible network management.
Network Operating System (NOS) - A Network Operating System (NOS) helps nodes
communicate. Examples include Windows Server, Unix, and Linux.
Network Communication - Data transmitted over a network is divided into segments. A
typical packet includes a data segment, source and destination addresses, error checking,
and sequence identification.
Protocols - Protocols are sets of rules for communication between nodes. For two computers
to communicate, they must use the same protocol.
 One example is the Link-Layer Discovery Protocol (LLDP), which exchanges
information between devices on the same local area network.
Network Addresses - Each node in a network has a unique identifier called a network
address. There are two main types:
 MAC Address: A physical address unique to each network interface card.
 IP Address: A logical address assigned based on the network.
Network Media and Devices - Several devices and media are essential in a network:
 Media Converters: Convert one type of signal into another.
 Repeaters: Extend the reach of a network by regenerating signals.
 Hubs: Central connection points for devices.
 Gateways: Connect local networks to the internet.
 Bridges: Segment larger networks to reduce collisions.
 Switches: Provide network segmentation and central connections.
 Routers: Connect multiple networks and direct data packets along the best routes.
Standards and Organizations - Several organizations develop networking standards,
including:
 IEEE: Institute of Electrical and Electronic Engineers
 ISO: International Organization for Standardization
 W3C: World Wide Web Consortium
 TIA: Telecommunications Industry Association
 ANSI: American National Standards Institute
OSI Model - The OSI model is a framework for understanding and designing networks. It has
seven layers:
 Physical
 Data Link
 Network
 Transport
 Session
 Presentation
 Application
1. The Data Link layer is further divided into two sublayers: Logical Link Control
(LLC) and Media Access Control (MAC).

Lesson: Network Media

Network Media Classifications - Let's dive into the three major types of network media:
1. Copper Cable
o Widely used due to its reliability and cost-effectiveness.
o Includes coaxial and twisted-pair cables.
2. Fiber-Optic Cable
o Uses light to transmit data, providing higher speeds and longer distances
compared to copper.
o Less susceptible to electromagnetic interference.
3. Wireless Radio Waves
o Enables mobile and flexible network configurations.
o Utilizes radio frequency (RF) signals to transmit data.
Analog and Digital Signals - Understanding the difference between analog and digital signals
is crucial:
 Analog Signals
o Continuous waveforms that vary in amplitude and frequency.
o Example: Sound waves.
 Digital Signals
o Discrete waveforms that represent data in binary format (0s and 1s).
o Example: Data transmitted over the internet.
Both signal types have frequencies, measured in Hertz (Hz).
Bandwidth - The range of frequencies that a medium can carry, influencing data
transmission rates.
Data Transmission - Data transmission methods and communication modes are key to
network performance:
 Baseband Transmission
o Uses the entire bandwidth of the medium to carry a single data signal.
o Common in Ethernet networks.
 Broadband Transmission
o Carries multiple signals simultaneously by dividing the bandwidth into
channels.
o Example: Cable TV.
Communication Modes:
 Simplex: One-way communication (e.g., a keyboard to a computer).
 Half-Duplex: Two-way communication, but not simultaneously (e.g., walkie-talkies).
 Full-Duplex: Two-way communication simultaneously (e.g., phone calls).
Electronic Terms - Understanding these terms helps in grasping how electrical signals work
in network media:
 Direct Current (DC)
o Flows in one direction.
o Used in low-voltage applications like batteries.
 Alternating Current (AC)
o Changes direction periodically.
o Used in household electrical systems.
 Electrical Resistance
o Opposes the flow of electrical current.
o Measured in ohms (Ω).
 Impedance
o Opposition to AC flow, combining resistance and reactance.
o Important in signal integrity and cable performance.
 Reflected Loss
o Signal loss due to reflection at the end of a cable.
o Can degrade signal quality.
 Crosstalk
o Interference caused by adjacent cables.
o Common in tightly packed cable bundles.
Copper-Core Cables - Copper cables vary based on their construction and usage:
 Coaxial Cables
o Central conductor, insulating layer, metallic shield, and outer cover.
o Types: RG-6 (used for TV), RG-8 (thick Ethernet), RG-58 (thin Ethernet).
 Twisted-Pair Cables
o Pairs of wires twisted together to reduce crosstalk.
o Categories (Cat): Cat 3, Cat 5, Cat 5e, Cat 6, Cat 6a, Cat 7, Cat 8 (increasing
bandwidth and performance).
IEEE 802 Standard - IEEE 802.3 is a crucial standard for Ethernet networks:
 Ethernet Technologies
o Defines the physical and data link layers of wired Ethernet.
 Auto-MDIX
o Automatically adjusts the transmission and receiving pins in Ethernet cables,
eliminating the need for crossover cables.
 Power over Ethernet (PoE)
o Delivers electrical power along with data over Ethernet cables.
o Powers devices like IP cameras and wireless access points.
Wiring Faults
Common wiring faults can disrupt network performance:
 Shorts
o Two wires touching each other, causing a short circuit.
 Opens
o Breaks in the wire preventing signal flow.
 Reversed Pairs
o Wires in a pair are connected to opposite terminals.
 Crossed Pairs
o Two pairs have their wires crossed, mixing signals.
 Split Pairs
o Wires from different pairs are connected together, increasing crosstalk and
reducing performance.

Lesson: Fiber-Optic Cables

Characteristics of Fiber-Optic Cable


Fiber-optic cables are an advanced medium for data transmission, using light to represent
binary data. Here's what makes them special:
 Core Composition: Made of glass or plastic.
 Data Security: Difficult to tap into without detection.
 Electromagnetic Interference: Immune, making them reliable in noisy environments.
 Physical Attributes: Lightweight, small in diameter, and resistant to corrosion and
water.
 Safety: No risk of fire or explosion.
 Bandwidth: Offers wide bandwidth, ideal for high-speed data transmission.
 Distance: Supports longer transmission distances compared to copper cables.
Nature of Light
Understanding light is crucial for fiber-optic technology:
 Wavelength: The distance a light wave travels in one cycle, measured in nanometers
(nm).
 Light in fiber-optics is typically in the infrared spectrum, with wavelengths ranging
from 850 nm to 1550 nm.
Fiber-Optic Cable Construction
The construction of fiber-optic cables ensures efficient light transmission:
 Core: The central part, made of glass or plastic, that carries the light.
 Cladding: Surrounds the core and keeps the light within by reflecting it back.
 Scattering: Light loss due to impurities in the core material.
 Dispersion: Distortion caused by light reflecting from the cladding and arriving at
different times.
 Extrinsic Losses: Losses from physical factors like splices and connectors.
Fiber-Optic Cable Specifications
Fiber-optic cables come in different types based on how they carry light:
 Single-Mode Fiber (SMF)
o Smaller core diameter.
o Transmits light over longer distances with less attenuation.
 Multimode Fiber (MMF)
o Larger core diameter.
o Two types:
 Graded-Index: Varying core material grade allows maximum light
conduction at the center.
 Step-Index: Uniform core material; more affected by dispersion.
IEEE 802.3 Standards
Several IEEE standards define the specifications for fiber-optic Ethernet:
 802.3z: Gigabit Ethernet standards including 1000BaseSX, 1000BaseLX, and
1000BaseCX.
 802.3ae: 10 Gigabit Ethernet standards including 10GBaseSR, 10GBaseLR,
10GBaseEW, and 10GBaseER.
 10GBaseW: Includes standards like 10GBaseSW, 10GBaseLW, and 10GBaseEW.
Fiber Distributed Data Interface (FDDI)
FDDI is a high-speed network protocol used as a backbone in large networks:
 Structure: Uses a pair of rings for redundancy and reliability.
 Application: Commonly used in Metropolitan Area Networks (MANs) and Wide Area
Networks (WANs).
Fiber-Optic Cable Connectors
Various connectors are used to join fiber-optic cables:
 SC: Snap-in connector, commonly used in data communication.
 ST: Bayonet-style connector, often used in networking.
 FC: Screw-on connector, used in high-vibration environments.
 LC: Smaller, latch-style connector, ideal for high-density connections.
 MTRJ: Compact connector that combines two fibers in one ferrule.
Fiber-Optic Cable Installation and Troubleshooting
Proper installation and troubleshooting ensure optimal performance:
 Cleaving: Fiber-optic cables are cleaved rather than cut to ensure a smooth end.
 Fusion Splice: Joins fibers using heat for a seamless connection.
 Testing:
o Light Source and Meter: Measures the light at both ends of a short cable run
to assess loss.
o OTDR (Optical Time-Domain Reflectometer): Diagnoses long cable runs,
measuring scattering and faults, and determining the distance to a break.

Lesson: Wireless Networking and Electromagnetic Waves

Electromagnetic Waves
Electromagnetic waves are the backbone of wireless communication. Here’s how they work:
 Radio-Wave and Microwave Transmissions
o These transmissions rely on carrier waves to communicate between devices.
o Modulation: The process of mixing a carrier wave with a data signal to encode
information.
o Infrared: Used for line-of-sight communications, such as remote controls, and
is not affected by radio interference.
 Regulation
o The Federal Communications Commission (FCC) manages the electromagnetic
spectrum, assigning radio frequencies and power limits.
o Interference can come from industrial, scientific, and medical devices using
similar frequencies as wireless networks.
o Infrared technology is often used for direct device-to-device communication,
like between a PDA and a PC.
Antenna Styles
Antennas play a crucial role in wireless communication, with styles affecting signal direction
and range:
 Omni-Directional Antennas
o Emit signals in all directions, ideal for general coverage.
 Directional Antennas
o Focus signals in a specific direction, increasing range and reducing
interference.
 Antenna Types
o Omni: General purpose, all-around coverage.
o Dipole: Simple and common, usually found in routers.
o Flat Panel: Focused signal, often used in indoor settings.
o Yagi: Directional, used for longer distances.
o Parabolic Dish: Highly directional, used for point-to-point communication over
long distances.
Radio-Wave Transmission Techniques
Radio waves cover a broad frequency range and use various techniques for data
transmission:
 Frequency Range: 10 kHz to 300,000 MHz.
 Transmission Techniques:
o Single Frequency: Simplest form, using one frequency for transmission.
o Spread Spectrum: Divides frequencies into channels to avoid interference.
 Frequency Hopping: Changes channels during transmission to reduce
interference.
 Direct Sequencing: Uses overlapping channels within a spectrum (e.g.,
2.4 GHz with 11 channels, 3 non-overlapping).
 Orthogonal Frequency-Division Multiplexing (OFDM)
o Divides the signal into multiple smaller sub-signals that are transmitted
simultaneously at different frequencies.
Radio-Wave-Based Networking
Wireless networks use specific standards and equipment for efficient communication:
 Wireless Access Point (WAP)
o Connects wireless devices to a wired network and acts as a central hub.
o SSID (Service Set Identifier): A unique name assigned to a WAP, similar to a
workgroup or domain name.
o Network Modes:
 Infrastructure Mode: Uses one or more WAPs.
 Ad Hoc Mode: Direct device-to-device communication without a WAP.
 IEEE 802.11 Standards
o 802.11a: 5 GHz, up to 54 Mbps.
o 802.11b: 2.4 GHz, up to 11 Mbps.
o 802.11g: 2.4 GHz or 5 GHz, up to 54 Mbps.
o 802.11n: 2.4 GHz and 5 GHz, up to 600 Mbps, uses MIMO (Multiple-Input
Multiple-Output) and spatial multiplexing for better performance.
o 802.15: Defines wireless personal area networks (WPANs), like Bluetooth.
 CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)
o A method used in wireless networks to avoid data collisions.
Microwave Transmission and Networking
 Satellite Communication
o Involves significant propagation delay due to the long distances signals must
travel to and from satellites.
Advantages and Disadvantages of Wireless Technology
Wireless networks offer several benefits and challenges:
 Advantages
o Cost-effective, especially in environments where laying cables is impractical.
o Flexible and easy to expand or reconfigure.
 Disadvantages
o Susceptible to atmospheric conditions, such as rain or interference.
o Security concerns, requiring robust encryption and security measures to
protect data.

Lesson: Digital Signals and Data Transmission

Digital Signals and Digital Encoding


Digital encoding converts data into patterns that can be transmitted over network media.
Let's explore the key types and methods:
 Unipolar Digital Signal
o Fluctuates between a positive voltage level and zero.
 Bipolar Digital Signal
o Alternates between positive and negative voltage levels, avoiding the zero-
voltage level.
 Manchester Encoding
o Used in LANs, it involves the digital pulse transitioning during the midpoint of
each timing period, ensuring reliable data transmission by embedding the
clock signal within the data signal.
 Synchronous vs. Asynchronous Signals
o Synchronous Signals: Synchronized with a reference signal, ensuring precise
timing.
o Asynchronous Signals: Not synchronized; rely on binary patterns to mark the
start and stop of data.
Data Packaging and Transmission
Data transmission involves ensuring the integrity and proper delivery of data:
 Parity Check
o A simple method to check data integrity by adding a parity bit.
 Cyclic Redundancy Check (CRC)
o A more robust error-checking method that can identify and correct errors.
 Data Encapsulation
o Surrounds raw data with metadata needed for delivery. The terms for data
blocks include:
 Segment: Data unit at the transport layer.
 Frame: Data unit at the data link layer.
 Datagram: Data unit in a packet-switched network.
 Protocol Data Unit (PDU): The most technically accurate term for any
data block.
 Connection-Oriented Protocols
o Establish a connection, transfer data, and then release the connection (e.g.,
TCP).
 Connectionless Protocols
o Send data without establishing a connection (e.g., UDP).
 Circuit-Switching Networks
o Establish a physical connection for the duration of the communication session.
 Packet-Switching Networks
o Use logical connections, allowing data to take different physical paths to reach
the destination.
Data Codes
Standards for representing textual data include:
 ASCII (American Standard Code for Information Interchange)
o Encodes text using 7 or 8 bits per character.
 Unicode
o Expands on ASCII to support a vast array of characters from different
languages and symbols, using up to 32 bits per character.
 HTML (HyperText Markup Language)
o The standard language for creating web pages and web applications.
Protocol Frame Structures
Different protocols have specific frame structures to package data:
 User Datagram Protocol (UDP) Frame
o Contains data, source and destination information, packet length, and error
checking.
 Ethernet II and 802.3 Frames
o Mostly compatible but have differences in their structure.
 Broadcast vs. Multicast Frames
o Broadcast Frame: Sent to all devices on a network.
o Multicast Frame: Sent to a specific group of devices.
Data Encoding, Transmission, and the OSI Model
The OSI model outlines how data is encapsulated and transmitted across networks:
 Application Layer
o Interfaces with software applications, providing network services directly to
end-users.
 Presentation Layer
o Formats data into a universally agreed-upon form, handling encryption and
compression.
 Session Layer
o Manages sessions or connections between source and destination.
 Transport Layer
o Controls the flow of data, ensuring complete data transfer with error checking.
 Network Layer
o Routes data packets across different networks, managing logical addressing.
 Data Link Layer
o Organizes data into frames for transmission and handles error detection and
correction.
 Physical Layer
o Deals with the physical aspects of network hardware, including cables,
switches, and the network topology.

Lesson: Evolution of Network Protocols and Network Operating Systems

The Evolution of Network Protocols


Network protocols have come a long way from their inception:
 Early Internet Access
o Initially limited to the Department of Defense (DoD) and select universities.
o Early network protocols were proprietary and not intended for public use.
 Proprietary Networking
o Various companies developed their own networking methods.
o These early protocols were not standardized, leading to compatibility issues.
Common Network Operating System Traits
Network Operating Systems (NOS) provide essential features for managing network
resources:
 Shared Resources
o Enables the sharing of files, printers, and other resources across a network.
 File Storage and Management
o Organizes and manages data storage, providing easy access and retrieval.
 Security
o Implements user authentication, access controls, and data protection
measures.
 Troubleshooting Utilities
o Tools for diagnosing and resolving network issues.
 Services
o Provides network services like email, web hosting, and file transfer.
 User Interface
o Graphical User Interface (GUI)
 Allows users to interact with the system via graphical elements like
icons and buttons.
o Command-Line Environment
 Users type commands at a text-based interface, offering more control
and flexibility.
Network Operating Systems and Hardware Protocols
NOS interacts with hardware protocols to manage data transmission:
 Data Link Layer
o Manages the placement and retrieval of data on network media.
o Defined by the IEEE 802.2 standard.
 Ethernet and CSMA/CA
o CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)
 Manages how network devices access the media to avoid collisions.
o Broadcast Storm
 Continuous network activity that can overwhelm the network.
o Collision Domain
 A network segment where data packet collisions can occur.
o Segmenting the network helps reduce collisions and improve efficiency.
Network Operating Systems and Networking Protocols
Various protocols ensure effective communication and device management:
 TCP/IP Suite
o The foundation of Internet communication, enabling devices to connect and
exchange data.
 Link-Layer Discovery Protocol (LLDP)
o Identifies devices on a local area network (LAN).
o Microsoft’s Link-Layer Topology Discovery (LLTD)
 Based on LLDP, used for device discovery and network mapping.
o Cisco Discovery Protocol (CDP)
 Another LLDP-based protocol used by Cisco devices.
o LLDP-Media Endpoint Discovery (LLDP-MED)
 Extends LLDP for use with switches, VoIP devices, and PoE (Power over
Ethernet) devices.
 Link-Local Multicast Name Resolution (LLMNR)
o Acts like a DNS server when one is unavailable, resolving device names on a
local network.
 Address Resolution Protocol (ARP)
o One of the oldest networking protocols, it maps IP addresses to physical MAC
addresses on a local network.

Lesson: Microsoft Network Operating Systems and Windows Server Administration

Brief History of Microsoft Network Operating Systems


Microsoft's journey into network operating systems began in the early 90s:
 Windows for Workgroups and Windows NT 3.1 (1993)
o These were Microsoft's first forays into network operating systems.
o Workgroups: A peer-to-peer network grouping computers that share resources.
o Domains: In a client/server setup, domains logically group users and
equipment, managed by network administrators.
Windows Server 2016
Windows Server 2016 is a robust and versatile server operating system with multiple
editions:
 Editions
o Standard: Basic server features for small to medium-sized businesses.
o Datacenter: Advanced features for larger enterprises with extensive
virtualization needs.
o Essentials: Simplified management for small businesses.
 Key Features
o BranchCache: Caches content from remote servers locally.
o DirectAccess: Provides seamless connectivity for remote users.
o Failover Cluster: Ensures high availability by connecting multiple servers.
o Hyper-V: Virtualization platform for creating and managing virtual machines.
o Internet Information Service (IIS): Web server for hosting websites and
applications.
o Network Access Protection (NAP): Enforces health policies on network clients.
o Remote Access: Facilitates secure remote connections.
o Server Core: Minimal installation option that reduces maintenance and attack
surface.
o Nano Server: Lightweight, fast-booting option designed for cloud and
datacenters.
Common Windows Server Administrative Components
Understanding the organization and security in Windows Server is crucial:
 Groups
o Domain: Logical grouping of users and devices.
o Workgroup: Group of computers sharing resources in a peer-to-peer network.
o HomeGroup: Simplified sharing of files and printers in a home network.
 Group Accounts
o Collections of users with common roles or functions, managed collectively.
 Security Policies
o Local Policies: Apply to individual computers.
o Global Policies: Apply across the entire network.
 File Systems
o Server Message Block (SMB): Native file-sharing protocol.
o New Technology File System (NTFS): Advanced file system supporting large
partitions, long filenames, and multiple extensions.
o FAT16 and FAT32: Older file systems with limited partition and filename
capabilities.
o Dynamic Disk (NTFS 5.0): Enhanced version of NTFS.
Network Shares
Network shares facilitate resource sharing with specific permissions:
 Permissions: Full Control, Modify, Read, Write.
 Administrative Shares: Identified by a dollar sign ($).
Active Directory Domain Services
Active Directory (AD) is the backbone of Windows network management:
 Protocols: Uses LDAP and HTTP for information transfer.
 Structure
o Trees: Collections of domains with a contiguous namespace.
o Forests: Collections of domains with disjointed namespaces but sharing a
common AD database.
o Organizational Units (OUs): Containers that hold objects and other OUs, aiding
in network organization.
 Authentication
o Interactive Logon: User authentication at the computer.
o Network Authentication: Authenticates access to network resources.
o Kerberos Protocol: Ensures secure authentication across the network.
 Server Roles
o Domain Controller (DC): Manages user access and security.
o Member Server: Part of a domain but not responsible for authentication.
o Stand-Alone Server: Operates independently of a domain.
 Multimaster Replication: Ensures consistency across multiple domain controllers.
 Trust Relationships: Enable seamless data and communication flow between domains
and forests.
Windows Server Administration
Effective server administration tools include:
 Microsoft Management Console (MMC)
o Organizes and manages various administrative tools.
 Active Directory Users and Computers
o Utility for managing user and group accounts within a domain.
POSIX
POSIX-compliant operating systems can run across diverse hardware platforms, ensuring
interoperability and compatibility.
Network Interoperability
Interoperability is key for seamless network communication:
 Gateway Service
o Facilitates communication between different network systems.
 Gateway Device
o Connects the local area network (LAN) to the internet, acting as an entry and
exit point for data.

Lesson: Unix, Linux, and Their Role in Modern Networking

Unix
Unix has a rich history and forms the foundation for many modern operating systems:
 Origins
o Developed at AT&T Bell Laboratories in the 1960s.
o Known for its open-source nature, with source code accessible to everyone.
 Structure
o Consists of a system kernel surrounded by modules.
o Daemon: A background program waiting for client requests.
Linux
Linux, a derivative of Unix, has become a staple in the tech industry:
 Creation
o Developed in 1991 by Linus Torvalds at the University of Helsinki.
o The term 'Linux' primarily refers to the operating system kernel.
 Licensing
o Uses the General Public License (GPL), allowing users to copy, modify, and
distribute the software freely.
 Enhancements
o Complemented by numerous software packages like GNOME, KDE, Apache,
and Samba.
 Advantages and Disadvantages
o Advantages: Flexibility, cost-effectiveness.
o Disadvantages: Limited support, security vulnerabilities.
Unix/Linux Basics
Understanding the basics is crucial for effectively using these systems:
 Boot Loaders
o LILO and GRUB: Programs that initiate the Linux OS load process and can load
other operating systems.
 Shell
o A user interface that interprets commands.
 File Systems
o Case-Sensitive: File and directory names distinguish between upper and lower
case.
o Types: Ext2, Ext3, Ext4, ReiserFS, JFS1, JFS.
o Journaling File Systems: Ensure file integrity by logging file activities during
unexpected shutdowns.
 File Structure
o Root directory (/) is the top-level directory.
o No drive letters are used; storage devices and shared resources are mounted
to the root.
 Permissions
o Set for the owner, default group, and other users (read, write, execute).
 Administration
o Superuser: The highest level of administration, typically with the username
'root'.
 Network File System (NFS)
o Developed by Sun Microsystems for file exchange over a network, using
TCP/IP.
 Printing Services
o Managed by the line printer daemon (lpd).
 Remote Access
o Protocols like FTP, TFTP, Telnet, and Apache enable remote client access.
 Apache
o The default web server software for Unix/Linux.
X Windows System
The X Windows System provides a graphical interface for Unix and Linux:
 Components
o Consists of an X server and an X client, following a client/server architecture.
o Configured for system hardware upon installation.
 Desktop Environments
o GNOME and KDE are popular choices.
 Tarball
o A compressed file containing one or more software programs.
Interoperability
Ensuring different systems can work together seamlessly:
 Samba
o Allows Unix/Linux systems to share files and printers with Windows clients.
 Windows and NFS
o Windows Server 2016 supports NFS through the Services for Network File
System role.
Mac OS X Server
Mac OS X Server integrates open-source software, making it versatile:
 Features
o Includes Samba, Apache, X Windows, CUPS, and LDAP.
o Supports connectivity with Mac OS X, Windows, and Unix/Linux workstations.

Lesson: Server Types, Services, and Advanced Technologies

Server Types and Services


Servers are the backbone of network infrastructure, each playing a specific role:
 Roles
o Print Server: Manages and distributes print jobs.
o File Server: Stores and manages files.
o Database Server: Hosts databases and handles database queries.
o Application Server: Runs specific applications.
o Backup Server: Manages data backups.
o Web Server: Hosts websites and web applications.
o Mail Server: Manages email services.
 Thin Server
o Designed to support and run a specific function or role, optimizing resources.
 Server Classifications
o Entry-Level Servers: 1 to 8 processors.
o Mid-Range Servers: 9 to 30 processors.
o High-End Servers: 31 to 106 processors.
o Hot-Swap Technology: Allows component replacement while the server is
running, minimizing downtime.
Small Computer Systems Interface (SCSI)
SCSI is a technology for connecting multiple devices to a single controller:
 Terms and Performance
o Wide, Fast, Ultra: Indicate data transfer capabilities.
o Ultra/Wide: Combines features for enhanced performance.
 Device Management
o Each SCSI device requires a unique ID number.
o Devices can extend outside the server via an extender card.
o Serial-Attached SCSI (SAS): Uses a serial port similar to SATA for connectivity.
ACPI and ACPICA
ACPI and ACPICA manage power and hardware configuration:
 ACPI (Automatic Configuration and Power Interface)
o Controls power options for hardware.
o Allows users to select power conservation settings.
 ACPICA (ACPI Component Architecture)
o Extends ACPI for nonproprietary hardware configuration.
System Resources
Understanding system resources is crucial for hardware management:
 Resources
o DMA (Direct Memory Access)
o IRQ (Interrupt Request)
o I/O Port Address
o Memory Address Assignment
 Resource Conflicts
o Shared resource assignments can lead to system conflicts, requiring careful
management.
RAID Systems
RAID (Redundant Array of Independent Disks) enhances storage performance and fault
tolerance:
 RAID Levels
o RAID 0 (Striping): Increases speed without fault tolerance.
o RAID 1 (Mirroring): Duplicates data on two drives for fault tolerance.
o RAID 5 (Striping with Parity): Combines speed with fault tolerance, using parity
data.
External Storage Systems
External storage solutions cater to various network needs:
 Network-Attached Storage (NAS)
o Provides storage for a LAN and shares its bandwidth.
 Storage Area Network (SAN)
o A dedicated network for data storage, preserving other network bandwidths.
Fibre Channel
Fibre Channel offers high-speed data access, often using fiber-optic cables:
 Naming and Topologies
o Uses Network Address Authority (NAA) naming standard.
o Topologies: Point-to-Point and Arbitrated Loop (similar to token ring).
 InfiniBand
o A high-throughput, low-latency communication standard.
Internet Small Computer Systems Interface (iSCSI)
iSCSI is an IP-based storage technology:
 Features
o Uses IPv4 and IPv6 for identifying storage devices.
o Advantages: Long-distance storage, cost-effective compared to Fibre Channel
SANs.
o Identification: Uses iSCSI-qualified names (IQNs) or Enterprise Unique Names
(EUIs).
Virtualization
Virtualization creates a software-based environment, offering numerous benefits:
 Benefits
o Cost reduction.
o Server consolidation.
o Improved resource utilization.
o Enhanced security.
o Disaster recovery.
o Efficient server provisioning.
o Application isolation.
o Support for legacy applications.
Hypervisor
The hypervisor enables virtual servers to access physical resources:
 Functionality
o Acts as a bridge between virtual environments and physical hardware,
ensuring efficient resource allocation and management.

Lesson: IPv4 and IPv6 Addressing and Networking Protocols

IPv4 Addressing
IPv4 is the most widely used internet protocol for assigning IP addresses:
 Structure
o Uses four octets, separated by periods (e.g., 192.168.1.1).
o Each octet ranges from 0 to 255.
 Classes
o Class A: First octet 1–127 (e.g., 10.0.0.1).
o Class B: First octet 128–191 (e.g., 172.16.0.1).
o Class C: First octet 192–223 (e.g., 192.168.0.1).
 Reserved/Private Ranges
o 10.0.0.0 to 10.255.255.255
o 172.16.0.0 to 172.31.255.255
o 192.168.0.0 to 192.168.255.255
 Network Address Translation (NAT)
o Allows multiple devices to share a single public IP address.
Domain Name System (DNS)
DNS translates human-readable domain names to IP addresses:
 Structure
o Fully Qualified Domain Name (FQDN): host name + domain name
(e.g., www.example.com).
o Hierarchical: top-level domains (TLDs), second-level domains, subdomains.
 Mechanisms
o Hosts file: Resolves names to IP addresses when DNS is unavailable.
o Windows Internet Name Service (WINS): Matches IP addresses to NetBIOS
names.
IP, TCP, and UDP
Key protocols in the TCP/IP suite:
 UDP (User Datagram Protocol)
o Frame format: source port, destination port, message length, checksum.
o Connectionless, suitable for fast, non-critical transmissions.
 TCP (Transmission Control Protocol)
o Reliable, connection-oriented.
o Header includes sequence number for data reassembly.
Assigning IP Addresses
Methods for assigning IP addresses to devices:
 Static Assignment
o Manually configured per host.
 Dynamic Assignment
o Automatically assigned, typically at boot, using DHCP.
o DHCP: Dynamic Host Configuration Protocol, sets lease periods for IP
addresses.
o APIPA: Automatic Private IP Addressing, assigns temporary addresses when
DHCP fails.
TCP/IP Ports and Sockets
Ports and sockets facilitate network connections:
 Port Number
o Virtual connection identifier between two computers.
 Socket
o Combination of an IP address and port number.
IPv6 Addressing
IPv6 addresses overcome limitations of IPv4:
 Advantages
o Larger address pool.
o Enhanced security.
o Better quality of service.
o Reduced need for broadcasts.
 Structure
o Uses eight 16-bit hexadecimal segments (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334).
o No need for subnet masks.
 Types of Addresses
o Global Address: Public, managed by IANA.
o Link-Local Address: Non-routable, starts with FE80.
o Unique-Local Address: Private, starts with FD00.
o EUI-64: Identifier similar to a MAC address.
Types of IPv6 Addresses
Different address types for various network functions:
 Unicast
o Delivers packets to a single address.
 Multicast
o Delivers packets to multiple addresses.
 Anycast
o Delivers packets to the nearest interface, primarily used by routers.
 Loopback Addresses
o IPv4: 127.0.0.1
o IPv6: ::1
IPv6 Transition Technologies
Technologies to support IPv6 adoption over IPv4 networks:
 6to4
o Addresses starting with 2002: enable IPv6/IPv4 communication.
 ISATAP
o Supports IPv6 tunneling over IPv4 networks.
 Teredo
o Tunnels IPv6 traffic through an IPv4 firewall.
Broadcast and Multicast Addresses
Protocols for name resolution and communication:
 LLMNR (Link-Local Multicast Name Resolution)
o Uses both IPv4 and IPv6 for name resolution via multicast.
IPv6 Lifetimes
Defines the duration of IPv6 address validity:
 Valid Lifetime
o Typically a week.
 Preferred Lifetime
o Typically a day.

Lesson: Binary Number System, Subnetting, and Advanced Network Segmenting

The Binary Number System


Binary is the foundational number system for computing and networking:
 Structure
o Comprises only ones (1s) and zeros (0s).
o Represents electrical energy (1) or its absence (0).
 Conversion to Decimal
o Each bit in a binary number represents a power of 2.
o Example: 1010 in binary equals ( 12^3 + 02^2 + 12^1 + 02^0 ) = ( 8 + 0 +
2 + 0 ) = 10 in decimal.
Dotted Decimal Notation
IPv4 addresses are represented in a human-readable format called dotted decimal notation:
 Format
o Consists of four octets (e.g., 192.168.1.1).
o Each octet is separated by a period and ranges from 0 to 255.
Subnetting
Subnetting divides a network into smaller, manageable sub-networks (subnets):
 Process
o Expands the network portion of an IP address by borrowing bits from the host
portion.
o Subnet mask differentiates the network and host portions of an IP address.
 Address Rules
o Addresses with all zeros or ones in the host portion are reserved and not
assignable.
 Types
o VLSM (Variable-Length Subnet Mask): Creates subnets of varying sizes.
o FLSM (Fixed-Length Subnet Mask): Creates subnets of equal size.
 Benefits
o Enhances security.
o Reduces network traffic by isolating broadcasts.
Network Segmenting Devices
Devices used to segment and manage network traffic:
 Layer 2 Devices
o Bridges and Switches: Filter frames based on MAC addresses.
o Switches: Segment wired networks and can create VLANs (Virtual LANs).
 Layer 3 Devices
o Routers: Filter frames based on IP addresses, connect different network
switches, and make decisions based on source and destination IP addresses.
o Routers: Reduce collision domains by not forwarding broadcasts.
o Router Metrics: Determine the best route based on throughput, reliability,
packet loss, latency, and hops.
 Routing Protocols
o IGP (Interior Gateway Protocol): Used within a single organization.
o EGP (Exterior Gateway Protocol): Used between different organizations.
o RIP (Routing Information Protocol)
o EIGRP (Enhanced Interior Gateway Routing Protocol)
o Multilayer Switches: Combine routing and switching functionalities.
o ASICs (Application-Specific Integrated Circuits): Enhance switch functions.
Virtual LAN (VLAN)
VLANs improve network efficiency and security:
 Function
o Connect workstations on separate or the same network segments.
o Can be created statically (manually) or dynamically (automatically).
 Standards
o IEEE 802.1Q: Describes VLAN technology.
o Spanning Tree Protocol (STP): Prevents switch loops.
Classless Inter-Domain Routing (CIDR)
CIDR enhances routing efficiency and IP address allocation:
 Format
o Uses a slash (/) followed by the network prefix length (e.g., 192.168.1.0/24).
o Network prefix length ranges from 0 to 32, indicating the number of bits in the
network portion of the address.
Link Aggregation
Link aggregation combines multiple network connections for increased bandwidth and
redundancy:
 Function
o Parallels two or more network cables.
o Increases bandwidth and provides failover capabilities.

Lesson: Voice, Audio, Video, and Advanced Transmission Protocols

Voice and Audio Signals


Understanding how voice and audio signals are processed and transmitted is essential for
effective communication:
 Analog to Digital Conversion
o Sampling: Converts analog signals to digital by measuring amplitude at
specific intervals.
o Sampling Rate: Number of times a signal is sampled in a given period.
o Sampling Frequency: Number of samples taken per second, measured in Hertz
(Hz).
 Quality Factors
o Jitter: Small, variable delays in audio/video delivery due to latency or packet
loss.
o Latency: Delay in data transmission, with an acceptable threshold of around
250 milliseconds.
o Acoustical Echo: Feedback loop caused by the proximity of microphones and
speakers or improper audio adjustments.
Video
Video signals require specific parameters to ensure smooth playback:
 Frame Rate
o Minimum of 24 frames per second (fps) for smooth video.
 Codec
o Software or hardware that compresses and decompresses video and audio
data for efficient transmission and storage.
Other Transmission Protocols
Several protocols facilitate data transfer across different media and applications:
 X.25
o An early protocol for data transfer over telephone lines.
 Frame Relay
o Packet switching protocol for long-distance data transport using leased lines.
 Asynchronous Transfer Mode (ATM)
o Supports audio, video, and multimedia with five classifications:
 CBR (Constant Bit Rate)
 VBR-nrt (Variable Bit Rate - non-real-time)
 VBR-rt (Variable Bit Rate - real-time)
 ABR (Available Bit Rate)
 UBR (Unspecified Bit Rate)
o ATM Cell Size: 53 bytes (5-byte header, 48-byte payload).
 Voice over IP (VoIP)
o Uses TCP/IP for transmitting audio and video data.
o UDP: Used for time-sensitive data like phone conversations.
o TCP: Used for reliable streaming of audio and video.
 Bandwidth Shaper
o Prioritizes network packets to ensure quality service in time-sensitive
applications.
 H.323 Protocol
o Used in telecommunications and telephone equipment.
o Gateway: Converts TCP/IP protocol to H.323.
 Session Initiation Protocol (SIP)
o Initiates, maintains, and terminates data exchange sessions.
 Quality of Service (QoS)
o Developed to minimize latency and ensure the quality of data transmission.
 Real-time Transport Protocol (RTP)
o Streams voice and video for video conferencing and gaming applications.
Basic VoIP Troubleshooting
Troubleshooting VoIP involves understanding common issues and tools:
 Protocol Analyzers
o Identify problems related to VoIP by analyzing network traffic.
 Impedance Mismatch
o Occurs when connecting two electronic audio systems with different
characteristics, leading to signal degradation.

Lesson: Web-Based Networks and Communication Protocols

Internet, Intranet, and Extranet


Understanding the distinctions between these network types is fundamental for web-based
communication:
 Internet
o A global network open to public access and communication.
 Intranet
o A private, web-based network restricted to specific clients within an
organization.
 Extranet
o Combines elements of intranets and the internet, allowing controlled access to
external users.
Domain Name and URL Resolution
URLs and domain names make navigating the web user-friendly:
 Uniform Resource Locator (URL)
o A user-friendly address that resolves to an IP address.
 Domain Name System (DNS)
o Servers that translate URLs into IP addresses for routing and access.
 Microsoft Active Directory (AD)
o Uses Lightweight Directory Access Protocol (LDAP) for client-server directory
communication.
Web Servers
Web servers deliver various internet services:
 Services
o Web pages, file transfers, and email services.
 Whois Utility
o Provides information about domain name ownership.
 Apache
o A popular and widely used web server software package.
Search Engines
Search engines help users find relevant web pages:
 Functionality
o Use spiders or bots to collect web page content, stored in large server farms.
o Index and retrieve data based on search terms.
Website Communication
Web-based communication relies on several protocols and standards:
 HTTP (Hypertext Transfer Protocol)
o Protocol for communication between web clients and servers.
 HTML (Hypertext Markup Language)
o Programming language for creating web content.
 Web Browsers
o Display web page content and facilitate user interaction.
 XML (eXtensible Markup Language)
o Supports client-server interaction and data sharing.
 CSS (Cascading Style Sheets)
o Enhances HTML by enabling uniform web page modifications.
 JavaScript
o Adds interactivity to web pages, such as form handling and database
interactions.
 SOAP (Simple Object Access Protocol)
o Supports XML and runs applications on web servers.
File Transfer Protocol (FTP)
FTP protocols manage file transfers between clients and servers:
 FTP
o Standard protocol for transferring files.
 TFTP (Trivial File Transfer Protocol)
o Simplified version of FTP, used for basic file transfers.
 SFTP (Secure File Transfer Protocol)
o Encrypts usernames, passwords, and data during transfer.
 Anonymous FTP
o Allows file transfers without requiring a username or password.
Network News Transfer Protocol (NNTP)
NNTP distributes news messages across the internet:
 Functionality
o Articles are grouped by newsgroups, making it easy to follow specific topics.
E-Mail
Email protocols handle the sending and receiving of electronic messages:
 Incoming Mail Servers
o Use protocols like POP3, IMAP, or HTTP.
 Outgoing Mail Servers
o Typically use the SMTP protocol.
 Dual Functionality
o Some servers handle both incoming and outgoing mail functions.

Lesson: Telecommunication Systems and Remote Connection Technologies

Introduction to Telecommunication Systems


Telecommunication systems have evolved significantly, especially post-deregulation:
 Deregulation
o Enabled separate local and long-distance telephone services.
o Increased competition and reduced costs.
o Point of Presence (PoP): The demarcation point where public telephone lines
end and customer premises begin.
o Post-deregulation, customers are responsible for the infrastructure on their
side of the PoP.
Remote Connection Technologies and Media
Various media types and technologies facilitate long-distance communication:
 Types of Media
o Cable: High-speed internet access through cable television lines.
o DSL (Digital Subscriber Line): Uses existing telephone lines with different
types offering varied speeds and distances.
 ADSL (Asymmetric DSL)
 SDSL (Symmetric DSL)
 HDSL (High Data Rate DSL)
 VDSL (Very High Data Rate DSL)
o ISDN (Integrated Services Digital Network): Transmits voice, video, and data
over traditional phone lines.
 BRI (Basic Rate Interface): Two B channels (64 kbps each) and one D
channel (16 kbps).
 PRI (Primary Rate Interface): 23 B channels and one D channel, total
1.544 Mbps.
 B-ISDN (Broadband ISDN): Supports higher data rates by carrying
multiple frequencies.
o PSTN (Public Switched Telephone Network): Traditional phone lines.
o Satellite: Ideal for remote areas, with consumer speeds typically around 400-
500 kbps and commercial speeds up to 1.5 Mbps (US) or 2 Mbps (Europe).
o SONET (Synchronous Optical Network): High bandwidth and long-distance
communication using optical fiber.
o T-Carriers: Digital transmission systems.
 T1: 24 channels, each 64 kbps, total 1.544 Mbps.
 T3: 672 channels, total 44.736 Mbps.
o X.25: An older packet-switching technology, still used outside the US.
o Frame Relay: Replaces X.25, uses Permanent Virtual Circuits (PVC) for packet
switching.
Dial-Up Networking
Dial-up networking allows remote access via telephone lines:
 Requirements
o Modems and remote access software on both client and server sides.
 Protocols
o SLIP (Serial Line Internet Protocol): An older protocol, replaced by PPP.
o PPP (Point-to-Point Protocol): More reliable and flexible.
o PPTP (Point-to-Point Tunneling Protocol): Encapsulates other protocols for
secure connections.
 MPLS (Multiprotocol Label Switching)
o Efficient routing for various network types (IPv4, IPv6, ATM, Frame Relay).
o Applications include network traffic shaping and VPN support.
Virtual Private Network (VPN)
VPNs provide secure connections over public networks:
 Functionality
o Encrypts data to ensure secure communication over the internet.
o Often used to connect remote workers to corporate networks securely.

Lesson: Network Security Fundamentals and Best Practices

Hacking
Understanding the types of hackers helps in devising appropriate security measures:
 Types of Hackers
o White-Hat: Ethical hackers who test and improve security.
o Black-Hat: Malicious hackers who exploit vulnerabilities for personal gain.
o Gray-Hat: Operate between ethical and unethical boundaries.
Common Network Security Breaches
Knowing the types of security breaches helps in preventing them:
 Authentication
o Verifies a user’s identity to ensure authorized access.
 Encryption
o Encodes data to protect it from unauthorized access using algorithms.
 Unprotected Network Shares
o Can serve as entry points for attackers if not properly secured.
 Social Engineering
o Manipulates individuals to gain network access.
 Zeroconf (Zero Configuration Networking)
o Automatically detects network devices, but can be a security risk if not
managed properly.
 Denial of Service (DoS) Attack
o Overloads a server, causing it to crash and denying service to legitimate
users.
 Man in the Middle Attack
o Intercepts communication between two parties to steal or alter information.
 Spoofing
o Uses a false IP address to gain unauthorized access.
 Malware
o Includes Trojan horses, viruses, worms, ransomware, and logic bombs.
 DNS Poisoning
o Involves inserting fake entries into DNS servers, redirecting users to malicious
sites.
 Evil Twin
o A rogue wireless access point mimicking a legitimate one to capture data.
 Deauthentication/Deassociation Attacks
o Disconnect clients from legitimate access points.
 Phishing
o Emails mimic legitimate enterprises to gather personal information.
 Insider Threats
o Pose a significant risk as insiders have access to sensitive information.
Intrusion Detection and Intrusion Prevention Systems
 IDS (Intrusion Detection System)
o Monitors for unauthorized activity.
 IPS (Intrusion Prevention System)
o Monitors and actively prevents unauthorized activities.
Security Methods and Protocols
Key methods and protocols for securing data:
 Encryption
o Symmetric-Key: Same key for encryption and decryption.
o Asymmetric-Key: Public and private keys for encryption and decryption.
 Digital Certificates
o Verify identities in online transactions.
 Secure Socket Layer (SSL) and Transport Layer Security (TLS)
o Secure internet transactions.
 Virtual Network Connection (VNC)
o Provides secure remote access.
 IPSec
o Secures IP packets over unsecured networks.
 Secure Shell (SSH)
o Provides secure network services.
 Secure Copy Protocol (SCP)
o Securely transfers files over a network.
Wireless Security
Protecting wireless networks:
 SSIDs
o Identifiers for wireless networks.
 MAC Filters
o Control access to Wireless Access Points (WAPs).
 Security Protocols
o Wired Equivalent Privacy (WEP)
o Wi-Fi Protected Access (WPA/WPA2)
o IEEE 802.11i: Advanced security measures for wireless networks.
o 802.1x: Network access control.
Authentication, Authorization, and Accounting (AAA)
Protocols and types for securing network access:
 AAA Protocols
o RADIUS
o Diameter
o TACACS+
 Authentication Types
o Something known (password).
o Something had (security token).
o Something you are (biometrics).
o Somewhere you are (geolocation).
o Something you do (behavioral biometrics).
Authentication Protocols
Various protocols for authentication:
 PAP (Password Authentication Protocol)
 CHAP (Challenge Handshake Authentication Protocol)
 MS-CHAP (Microsoft CHAP)
 Kerberos
 EAP (Extensible Authentication Protocol)
 PEAP (Protected EAP)
 LEAP (Lightweight EAP)
Security Implementations
Practical steps to secure networks:
 Software Patches and Service Packs
o Apply immediately after installation.
 Default Administrator Usernames
o Change to enhance security.
 Device Hardening
o Secure devices as much as possible.
 Strong Passwords
o Use a mix of letters, numbers, and symbols.
 Password Policies
o Enforce history, length, age, and complexity requirements.
 Firewalls
o Monitor and control incoming and outgoing network traffic.
 Unified Threat Management (UTM)
o Combines multiple security technologies.
 Proxy Servers
o Hide clients from unauthorized external access.
Security Tools
Tools for monitoring and ensuring security:
 Netstat Utility
o Checks open ports.
 Protocol Analyzers and Packet Sniffers
o Monitor network protocols and data packets.
 Policies
o Define security measures, remote access guidelines, BYOD rules, equipment
disposal procedures, data loss prevention, and incident response.
Data Security Compliance Requirements
Distinguish between voluntary standards and legally binding laws:
 Standards
o Voluntary best practices for security.
 Laws
o Legally enforceable requirements for data security.

Lesson: Monitoring, Maintaining, and Ensuring Network Stability

Monitoring the Server and Network


Constant monitoring of the server and network is critical for maintaining stability and
performance:
 Importance of Monitoring
o Identifies failures and predicts potential issues before they become critical.
 Documentation and Diagrams
o Essential for effective network maintenance and troubleshooting.
o Provide a clear visual representation of the network structure and
configuration.
 Baseline and Data Collection
o Establish a performance baseline to understand normal network behavior.
o Routinely collect performance data to compare with the baseline.
o Identifying trends helps in predicting and mitigating potential problems.
Maintaining System Software
Regular updates and patches are crucial for system security and functionality:
 Software Bugs
o Programming flaws that can cause system errors or vulnerabilities.
 Patches and Fixes
o Correct bugs and address security issues.
o Microsoft releases these updates as service packs.
 Testing
o Test patches and updates in a controlled environment before applying them
network-wide to avoid unexpected disruptions.
Maintaining System Hardware
Proper hardware maintenance ensures continuous network operation and performance:
 Server Clusters
o Allow maintenance without disrupting network activities by providing
redundancy.
 VLANs and Switches
o Adding switches to create Virtual Local Area Networks (VLANs) can enhance
network bandwidth and segment traffic efficiently.
Maintaining System Integrity
Ensuring data integrity and preparedness for disasters is vital for network reliability:
 Data Integrity
o Ensures the completeness and accuracy of data stored on the network.
 Disaster Recovery
o Involves restoring normal operations after a disaster or system failure.
o Regular data backups and continuous data protection are essential
components.
 Backup Types
o Full Backup: Complete copy of all data, resets the archive bit.
o Incremental Backup: Copies only the data that has changed since the last
incremental backup, resets the archive bit.
o Differential Backup: Copies data that has changed since the last full backup,
does not reset the archive bit.
Maintaining Stable Electrical Power
Stable electrical power is crucial for uninterrupted network operations:
 Lightning Arrestors
o Protect against electrical surges caused by lightning strikes.
 Inductive Reactance
o Occurs in coiled wires within electrical devices, affecting power quality.
 Power Issues
o Brownouts: Partial loss of power.
o Blackouts: Total power loss.
 Uninterruptible Power Supply (UPS)
o Standby UPS: Provides backup power when the main power fails.
o Continuous UPS: Provides constant power, offering better protection against
power fluctuations.
 Isolation Transformers
o Isolate circuits from each other within the same electrical source, protecting
sensitive equipment from electrical noise and surges.

Lesson: Network Troubleshooting and System Recovery

CompTIA Network+ Troubleshooting Methodology


A structured approach to network troubleshooting helps identify and resolve issues
efficiently:
 Seven Steps to Troubleshooting
o Identify the Problem: Gather information and symptoms.
o Establish a Probable Cause Theory: Hypothesize potential reasons for the
issue.
o Test the Theory: Validate or refute your hypothesis through testing.
o Establish a Resolution Plan: Develop a plan based on confirmed cause.
o Implement the Solution: Execute the resolution plan.
o Verify System Functionality: Ensure the issue is resolved and systems are
operational.
o Document Findings and Actions: Record the problem, solution, and actions
taken.
 Diagnosing Problems
o Ask questions to understand the issue.
o Investigate recent changes that might have caused the problem.
Stages of Computer Operation
Consider different stages of computer operation when troubleshooting:
 Three Areas
o POST (Power-On Self Test): Hardware-related issues.
o Operating System Loading: OS file or driver corruption.
o After Successful Logon: Application software or service issues.
 System Configuration (msconfig.exe)
o Identifies problematic applications or services.
Detailed Computer Startup Process
Understanding the startup phases can help diagnose boot issues:
 Startup Phases
o POST
o Initial Startup
o Windows Boot Loader
o Kernel Loading
o Logon Phase
 Extensible Firmware Interface (EFI)
o An alternative to BIOS systems.
 Windows Boot Manager
o Selects operating systems in multi-OS setups.
o Access Advanced Boot Options menu using [F8] after POST.
Windows-Based Troubleshooting Tools
Several built-in tools assist with troubleshooting Windows systems:
 Safe Mode
o Boots with minimal drivers and memory.
 System Restore
o Reverts to previous registry settings.
 Last Known Good Configuration
o Loads OS with last successful registry data.
System Recovery Strategies and Methods
Prepare for system failures with robust recovery strategies:
 Disk Image
o Exact sector-by-sector copy of the OS and files.
 Windows 7 System Recovery Options
o Startup Repair, System Restore, System Image Recovery, Windows Memory
Diagnostic, Command Prompt.
 Windows 10 System Recovery Options
o Restore from a point, System Restore, System Reset, Reinstall Windows,
Command Prompt.
Troubleshooting Dual-Boot Systems
Managing dual-boot configurations requires special tools:
 System Configuration Tool (msconfig.exe)
o Selects startup programs and services.
 Boot Configuration Data (BCD)
o Replaces Boot.ini file in Windows XP for later versions.
Server Data Integrity and Performance
Ensure server reliability and performance with these measures:
 UPS Units
o Provide backup power during outages.
 RAID Systems
o Enhance data redundancy and performance.
 Frequent Backups
o Protect against data loss.
 Malware Protection
o Guard against security threats.
 Service Packs and Patches
o Keep systems updated and secure.
Troubleshooting the Network Infrastructure
Use built-in tools to diagnose and fix network issues:
 Network Diagnostics Utility
o Diagnoses common network problems.
 Network and Sharing Center
o Centralizes network configuration and troubleshooting.
 Network Status Indicators
o Red X: No connection.
o Yellow Triangle: Problem exists.
Troubleshooting Common Network Problems
Common issues often stem from human errors or misconfigurations:
 Typical Issues
o Login problems, connection issues, share access, network printing, malware,
IP address conflicts, application server access, VoIP issues, duplex mismatch,
Internet access problems.
Troubleshooting Common Wireless Problems
Wireless networks can experience unique issues:
 Wireless Issues
o Incorrect ESSID, signal bounce, mismatched encryption, unbalanced signal-to-
noise ratio.
Troubleshooting with TCP/IP Utilities
TCP/IP utilities help diagnose network paths and issues:
 Ping and Tracert
o Verify network path and identify breaks.
 Pathping
o Combines Ping and Tracert to identify bottlenecks by sending ICMP echo
requests.
Miscellaneous Issues
Additional network problems can include:
 Incorrect Time Settings
o Ensure time synchronization across network devices.
 ACL (Access Control List) Configurations
o Verify ACL settings to ensure proper access permissions.

Lesson: Network Needs Assessment and Design

Needs Assessment and Design


The foundation of a successful network design begins with a thorough needs assessment:
 Conducting a Needs Assessment
o Evaluate the current and future needs of the organization.
o Consider the physical network structure, security requirements, applications,
organizational structure, fault tolerance, and data integrity.
 Organizational Structure Considerations
o Determine the number of servers required.
o Design the directory structure and resource locations.
o Plan partition and volume configurations.
 LDAP (Lightweight Directory Access Protocol)
o Standard protocol for directory services, facilitating the organization of
network resources.
 Naming Conventions
o Develop a consistent and logical naming convention for network objects to
simplify management and troubleshooting.
Network Design Tools
Various tools and case studies assist in planning and visualizing network designs:
 Microsoft Assessment and Planning (MAP) Toolkit
o Helps in system updates or migration by assessing the current network
environment.
 Microsoft Visio
o A diagramming tool for creating detailed network maps and structures.
 NetworkView
o Creates comprehensive network maps, highlighting device locations and
connections.
Installation Process
A structured installation process ensures a smooth network deployment:
 Timeline Development
o Plan the installation process with a detailed timeline.
 Automation Tools
o Utilize Microsoft tools to automate software and operating system
installations.
 Testing
o Test all sections of the network post-implementation to ensure functionality.
 Documentation and Training
o Develop comprehensive network documents, including security procedures
and usage rules.
o Train users on security policies, remote access, and email fundamentals.
Specifications for Network Design
Clear specifications guide the quality and materials used in the network design:
 Workmanship and Materials
o Specify standards for workmanship and materials to ensure network reliability.
 Isolated Electrical Systems
o Use isolated electrical systems for network equipment to prevent interference.
 Demarcation Point
o Defines where public/private telecom cables end, and customer cabling
begins.
 MDF and IDF
o MDF (Main Distribution Frame): Central point for incoming telecom cables.
o IDF (Intermediate Distribution Frame): Secondary distribution point for
telecom cables.
 Cabling Limits
o Horizontal Cable Distance: Limited to 90 meters.
o Backbone Wiring Limits:
 UTP: 90 meters.
 Multimode Fiber-Optic: 2000 meters.
 Single-Mode Fiber-Optic: 3000 meters.
 Punch Down Blocks
o Used for distributing and connecting telecommunication cables.
Standards Organizations
Adhering to standards ensures network compatibility and quality:
 ANSI/TIA/EIA
o Primary network design standards in the U.S.
 ISO
o International standards organization for network design.
 CSA
o Canadian equivalent to ANSI/TIA/EIA standards.
 Wiring Standards
o Consolidation points and MUTOAs (Multi-User Telecommunications Outlet
Assemblies) in horizontal wiring.
o Maximum patch panel cable length in telecom rooms: 7 meters.
 National Electrical Code (NEC)
o Standards for electrical work in network installations.
 BICSI
o Nonprofit organization providing telecommunication installation and training
standards.

You might also like