WGU 413 Network Fundamentals Notes
WGU 413 Network Fundamentals Notes
Definition of a Network
Let's start with what a network is. Imagine a web connecting various computers, devices,
and communication tools. These connections allow them to share resources and data. This
interconnected system is what we call a network. It consists of nodes and hosts. The major
benefit of networking is that it lets us share equipment and data effortlessly. However,
there's a downside: networks can be costly and vulnerable to cyberattacks.
Network Classifications - Networks come in different sizes and serve various purposes. Here
are the main types:
Local Area Network (LAN): This is like your home network, covering a small area.
Metropolitan Area Network (MAN): Think of a city's public Wi-Fi system.
Wide Area Network (WAN): This spans across cities, countries, or even continents, like
the internet. Other types include:
Personal Area Network (PAN): Your personal Bluetooth devices.
Campus Area Network (CAN): Networks within a university or business campus.
Global Area Network (GAN): Global networks that connect multiple wide area
networks.
Network Topologies - The structure or layout of a network is called its topology. Here are four
common ones:
Star Topology: All devices connect to a central hub.
Ring Topology: Devices form a circular chain.
Bus Topology: All devices share a single communication line.
Mesh Topology: Devices are interconnected, providing multiple pathways. Sometimes,
networks combine these topologies, forming hybrid topologies.
Basic Network Administration Models - Networks can be managed in different ways:
Centralized Administration: Used in client/server networks where a central server
controls everything.
Decentralized Administration: Used in peer-to-peer networks where each device
manages itself.
Cloud Computing - Cloud computing offers various services:
Software as a Service (SaaS): Like using Google Docs online.
Platform as a Service (PaaS): For developers to build applications.
Infrastructure as a Service (IaaS): Renting virtual machines and storage. Clouds can
be:
Private: For a single organization.
Public: Available to anyone.
Hybrid: A mix of both. Software-defined networking (SDN) is a key cloud feature that
allows for flexible network management.
Network Operating System (NOS) - A Network Operating System (NOS) helps nodes
communicate. Examples include Windows Server, Unix, and Linux.
Network Communication - Data transmitted over a network is divided into segments. A
typical packet includes a data segment, source and destination addresses, error checking,
and sequence identification.
Protocols - Protocols are sets of rules for communication between nodes. For two computers
to communicate, they must use the same protocol.
One example is the Link-Layer Discovery Protocol (LLDP), which exchanges
information between devices on the same local area network.
Network Addresses - Each node in a network has a unique identifier called a network
address. There are two main types:
MAC Address: A physical address unique to each network interface card.
IP Address: A logical address assigned based on the network.
Network Media and Devices - Several devices and media are essential in a network:
Media Converters: Convert one type of signal into another.
Repeaters: Extend the reach of a network by regenerating signals.
Hubs: Central connection points for devices.
Gateways: Connect local networks to the internet.
Bridges: Segment larger networks to reduce collisions.
Switches: Provide network segmentation and central connections.
Routers: Connect multiple networks and direct data packets along the best routes.
Standards and Organizations - Several organizations develop networking standards,
including:
IEEE: Institute of Electrical and Electronic Engineers
ISO: International Organization for Standardization
W3C: World Wide Web Consortium
TIA: Telecommunications Industry Association
ANSI: American National Standards Institute
OSI Model - The OSI model is a framework for understanding and designing networks. It has
seven layers:
Physical
Data Link
Network
Transport
Session
Presentation
Application
1. The Data Link layer is further divided into two sublayers: Logical Link Control
(LLC) and Media Access Control (MAC).
Network Media Classifications - Let's dive into the three major types of network media:
1. Copper Cable
o Widely used due to its reliability and cost-effectiveness.
o Includes coaxial and twisted-pair cables.
2. Fiber-Optic Cable
o Uses light to transmit data, providing higher speeds and longer distances
compared to copper.
o Less susceptible to electromagnetic interference.
3. Wireless Radio Waves
o Enables mobile and flexible network configurations.
o Utilizes radio frequency (RF) signals to transmit data.
Analog and Digital Signals - Understanding the difference between analog and digital signals
is crucial:
Analog Signals
o Continuous waveforms that vary in amplitude and frequency.
o Example: Sound waves.
Digital Signals
o Discrete waveforms that represent data in binary format (0s and 1s).
o Example: Data transmitted over the internet.
Both signal types have frequencies, measured in Hertz (Hz).
Bandwidth - The range of frequencies that a medium can carry, influencing data
transmission rates.
Data Transmission - Data transmission methods and communication modes are key to
network performance:
Baseband Transmission
o Uses the entire bandwidth of the medium to carry a single data signal.
o Common in Ethernet networks.
Broadband Transmission
o Carries multiple signals simultaneously by dividing the bandwidth into
channels.
o Example: Cable TV.
Communication Modes:
Simplex: One-way communication (e.g., a keyboard to a computer).
Half-Duplex: Two-way communication, but not simultaneously (e.g., walkie-talkies).
Full-Duplex: Two-way communication simultaneously (e.g., phone calls).
Electronic Terms - Understanding these terms helps in grasping how electrical signals work
in network media:
Direct Current (DC)
o Flows in one direction.
o Used in low-voltage applications like batteries.
Alternating Current (AC)
o Changes direction periodically.
o Used in household electrical systems.
Electrical Resistance
o Opposes the flow of electrical current.
o Measured in ohms (Ω).
Impedance
o Opposition to AC flow, combining resistance and reactance.
o Important in signal integrity and cable performance.
Reflected Loss
o Signal loss due to reflection at the end of a cable.
o Can degrade signal quality.
Crosstalk
o Interference caused by adjacent cables.
o Common in tightly packed cable bundles.
Copper-Core Cables - Copper cables vary based on their construction and usage:
Coaxial Cables
o Central conductor, insulating layer, metallic shield, and outer cover.
o Types: RG-6 (used for TV), RG-8 (thick Ethernet), RG-58 (thin Ethernet).
Twisted-Pair Cables
o Pairs of wires twisted together to reduce crosstalk.
o Categories (Cat): Cat 3, Cat 5, Cat 5e, Cat 6, Cat 6a, Cat 7, Cat 8 (increasing
bandwidth and performance).
IEEE 802 Standard - IEEE 802.3 is a crucial standard for Ethernet networks:
Ethernet Technologies
o Defines the physical and data link layers of wired Ethernet.
Auto-MDIX
o Automatically adjusts the transmission and receiving pins in Ethernet cables,
eliminating the need for crossover cables.
Power over Ethernet (PoE)
o Delivers electrical power along with data over Ethernet cables.
o Powers devices like IP cameras and wireless access points.
Wiring Faults
Common wiring faults can disrupt network performance:
Shorts
o Two wires touching each other, causing a short circuit.
Opens
o Breaks in the wire preventing signal flow.
Reversed Pairs
o Wires in a pair are connected to opposite terminals.
Crossed Pairs
o Two pairs have their wires crossed, mixing signals.
Split Pairs
o Wires from different pairs are connected together, increasing crosstalk and
reducing performance.
Electromagnetic Waves
Electromagnetic waves are the backbone of wireless communication. Here’s how they work:
Radio-Wave and Microwave Transmissions
o These transmissions rely on carrier waves to communicate between devices.
o Modulation: The process of mixing a carrier wave with a data signal to encode
information.
o Infrared: Used for line-of-sight communications, such as remote controls, and
is not affected by radio interference.
Regulation
o The Federal Communications Commission (FCC) manages the electromagnetic
spectrum, assigning radio frequencies and power limits.
o Interference can come from industrial, scientific, and medical devices using
similar frequencies as wireless networks.
o Infrared technology is often used for direct device-to-device communication,
like between a PDA and a PC.
Antenna Styles
Antennas play a crucial role in wireless communication, with styles affecting signal direction
and range:
Omni-Directional Antennas
o Emit signals in all directions, ideal for general coverage.
Directional Antennas
o Focus signals in a specific direction, increasing range and reducing
interference.
Antenna Types
o Omni: General purpose, all-around coverage.
o Dipole: Simple and common, usually found in routers.
o Flat Panel: Focused signal, often used in indoor settings.
o Yagi: Directional, used for longer distances.
o Parabolic Dish: Highly directional, used for point-to-point communication over
long distances.
Radio-Wave Transmission Techniques
Radio waves cover a broad frequency range and use various techniques for data
transmission:
Frequency Range: 10 kHz to 300,000 MHz.
Transmission Techniques:
o Single Frequency: Simplest form, using one frequency for transmission.
o Spread Spectrum: Divides frequencies into channels to avoid interference.
Frequency Hopping: Changes channels during transmission to reduce
interference.
Direct Sequencing: Uses overlapping channels within a spectrum (e.g.,
2.4 GHz with 11 channels, 3 non-overlapping).
Orthogonal Frequency-Division Multiplexing (OFDM)
o Divides the signal into multiple smaller sub-signals that are transmitted
simultaneously at different frequencies.
Radio-Wave-Based Networking
Wireless networks use specific standards and equipment for efficient communication:
Wireless Access Point (WAP)
o Connects wireless devices to a wired network and acts as a central hub.
o SSID (Service Set Identifier): A unique name assigned to a WAP, similar to a
workgroup or domain name.
o Network Modes:
Infrastructure Mode: Uses one or more WAPs.
Ad Hoc Mode: Direct device-to-device communication without a WAP.
IEEE 802.11 Standards
o 802.11a: 5 GHz, up to 54 Mbps.
o 802.11b: 2.4 GHz, up to 11 Mbps.
o 802.11g: 2.4 GHz or 5 GHz, up to 54 Mbps.
o 802.11n: 2.4 GHz and 5 GHz, up to 600 Mbps, uses MIMO (Multiple-Input
Multiple-Output) and spatial multiplexing for better performance.
o 802.15: Defines wireless personal area networks (WPANs), like Bluetooth.
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)
o A method used in wireless networks to avoid data collisions.
Microwave Transmission and Networking
Satellite Communication
o Involves significant propagation delay due to the long distances signals must
travel to and from satellites.
Advantages and Disadvantages of Wireless Technology
Wireless networks offer several benefits and challenges:
Advantages
o Cost-effective, especially in environments where laying cables is impractical.
o Flexible and easy to expand or reconfigure.
Disadvantages
o Susceptible to atmospheric conditions, such as rain or interference.
o Security concerns, requiring robust encryption and security measures to
protect data.
Unix
Unix has a rich history and forms the foundation for many modern operating systems:
Origins
o Developed at AT&T Bell Laboratories in the 1960s.
o Known for its open-source nature, with source code accessible to everyone.
Structure
o Consists of a system kernel surrounded by modules.
o Daemon: A background program waiting for client requests.
Linux
Linux, a derivative of Unix, has become a staple in the tech industry:
Creation
o Developed in 1991 by Linus Torvalds at the University of Helsinki.
o The term 'Linux' primarily refers to the operating system kernel.
Licensing
o Uses the General Public License (GPL), allowing users to copy, modify, and
distribute the software freely.
Enhancements
o Complemented by numerous software packages like GNOME, KDE, Apache,
and Samba.
Advantages and Disadvantages
o Advantages: Flexibility, cost-effectiveness.
o Disadvantages: Limited support, security vulnerabilities.
Unix/Linux Basics
Understanding the basics is crucial for effectively using these systems:
Boot Loaders
o LILO and GRUB: Programs that initiate the Linux OS load process and can load
other operating systems.
Shell
o A user interface that interprets commands.
File Systems
o Case-Sensitive: File and directory names distinguish between upper and lower
case.
o Types: Ext2, Ext3, Ext4, ReiserFS, JFS1, JFS.
o Journaling File Systems: Ensure file integrity by logging file activities during
unexpected shutdowns.
File Structure
o Root directory (/) is the top-level directory.
o No drive letters are used; storage devices and shared resources are mounted
to the root.
Permissions
o Set for the owner, default group, and other users (read, write, execute).
Administration
o Superuser: The highest level of administration, typically with the username
'root'.
Network File System (NFS)
o Developed by Sun Microsystems for file exchange over a network, using
TCP/IP.
Printing Services
o Managed by the line printer daemon (lpd).
Remote Access
o Protocols like FTP, TFTP, Telnet, and Apache enable remote client access.
Apache
o The default web server software for Unix/Linux.
X Windows System
The X Windows System provides a graphical interface for Unix and Linux:
Components
o Consists of an X server and an X client, following a client/server architecture.
o Configured for system hardware upon installation.
Desktop Environments
o GNOME and KDE are popular choices.
Tarball
o A compressed file containing one or more software programs.
Interoperability
Ensuring different systems can work together seamlessly:
Samba
o Allows Unix/Linux systems to share files and printers with Windows clients.
Windows and NFS
o Windows Server 2016 supports NFS through the Services for Network File
System role.
Mac OS X Server
Mac OS X Server integrates open-source software, making it versatile:
Features
o Includes Samba, Apache, X Windows, CUPS, and LDAP.
o Supports connectivity with Mac OS X, Windows, and Unix/Linux workstations.
IPv4 Addressing
IPv4 is the most widely used internet protocol for assigning IP addresses:
Structure
o Uses four octets, separated by periods (e.g., 192.168.1.1).
o Each octet ranges from 0 to 255.
Classes
o Class A: First octet 1–127 (e.g., 10.0.0.1).
o Class B: First octet 128–191 (e.g., 172.16.0.1).
o Class C: First octet 192–223 (e.g., 192.168.0.1).
Reserved/Private Ranges
o 10.0.0.0 to 10.255.255.255
o 172.16.0.0 to 172.31.255.255
o 192.168.0.0 to 192.168.255.255
Network Address Translation (NAT)
o Allows multiple devices to share a single public IP address.
Domain Name System (DNS)
DNS translates human-readable domain names to IP addresses:
Structure
o Fully Qualified Domain Name (FQDN): host name + domain name
(e.g., www.example.com).
o Hierarchical: top-level domains (TLDs), second-level domains, subdomains.
Mechanisms
o Hosts file: Resolves names to IP addresses when DNS is unavailable.
o Windows Internet Name Service (WINS): Matches IP addresses to NetBIOS
names.
IP, TCP, and UDP
Key protocols in the TCP/IP suite:
UDP (User Datagram Protocol)
o Frame format: source port, destination port, message length, checksum.
o Connectionless, suitable for fast, non-critical transmissions.
TCP (Transmission Control Protocol)
o Reliable, connection-oriented.
o Header includes sequence number for data reassembly.
Assigning IP Addresses
Methods for assigning IP addresses to devices:
Static Assignment
o Manually configured per host.
Dynamic Assignment
o Automatically assigned, typically at boot, using DHCP.
o DHCP: Dynamic Host Configuration Protocol, sets lease periods for IP
addresses.
o APIPA: Automatic Private IP Addressing, assigns temporary addresses when
DHCP fails.
TCP/IP Ports and Sockets
Ports and sockets facilitate network connections:
Port Number
o Virtual connection identifier between two computers.
Socket
o Combination of an IP address and port number.
IPv6 Addressing
IPv6 addresses overcome limitations of IPv4:
Advantages
o Larger address pool.
o Enhanced security.
o Better quality of service.
o Reduced need for broadcasts.
Structure
o Uses eight 16-bit hexadecimal segments (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334).
o No need for subnet masks.
Types of Addresses
o Global Address: Public, managed by IANA.
o Link-Local Address: Non-routable, starts with FE80.
o Unique-Local Address: Private, starts with FD00.
o EUI-64: Identifier similar to a MAC address.
Types of IPv6 Addresses
Different address types for various network functions:
Unicast
o Delivers packets to a single address.
Multicast
o Delivers packets to multiple addresses.
Anycast
o Delivers packets to the nearest interface, primarily used by routers.
Loopback Addresses
o IPv4: 127.0.0.1
o IPv6: ::1
IPv6 Transition Technologies
Technologies to support IPv6 adoption over IPv4 networks:
6to4
o Addresses starting with 2002: enable IPv6/IPv4 communication.
ISATAP
o Supports IPv6 tunneling over IPv4 networks.
Teredo
o Tunnels IPv6 traffic through an IPv4 firewall.
Broadcast and Multicast Addresses
Protocols for name resolution and communication:
LLMNR (Link-Local Multicast Name Resolution)
o Uses both IPv4 and IPv6 for name resolution via multicast.
IPv6 Lifetimes
Defines the duration of IPv6 address validity:
Valid Lifetime
o Typically a week.
Preferred Lifetime
o Typically a day.
Hacking
Understanding the types of hackers helps in devising appropriate security measures:
Types of Hackers
o White-Hat: Ethical hackers who test and improve security.
o Black-Hat: Malicious hackers who exploit vulnerabilities for personal gain.
o Gray-Hat: Operate between ethical and unethical boundaries.
Common Network Security Breaches
Knowing the types of security breaches helps in preventing them:
Authentication
o Verifies a user’s identity to ensure authorized access.
Encryption
o Encodes data to protect it from unauthorized access using algorithms.
Unprotected Network Shares
o Can serve as entry points for attackers if not properly secured.
Social Engineering
o Manipulates individuals to gain network access.
Zeroconf (Zero Configuration Networking)
o Automatically detects network devices, but can be a security risk if not
managed properly.
Denial of Service (DoS) Attack
o Overloads a server, causing it to crash and denying service to legitimate
users.
Man in the Middle Attack
o Intercepts communication between two parties to steal or alter information.
Spoofing
o Uses a false IP address to gain unauthorized access.
Malware
o Includes Trojan horses, viruses, worms, ransomware, and logic bombs.
DNS Poisoning
o Involves inserting fake entries into DNS servers, redirecting users to malicious
sites.
Evil Twin
o A rogue wireless access point mimicking a legitimate one to capture data.
Deauthentication/Deassociation Attacks
o Disconnect clients from legitimate access points.
Phishing
o Emails mimic legitimate enterprises to gather personal information.
Insider Threats
o Pose a significant risk as insiders have access to sensitive information.
Intrusion Detection and Intrusion Prevention Systems
IDS (Intrusion Detection System)
o Monitors for unauthorized activity.
IPS (Intrusion Prevention System)
o Monitors and actively prevents unauthorized activities.
Security Methods and Protocols
Key methods and protocols for securing data:
Encryption
o Symmetric-Key: Same key for encryption and decryption.
o Asymmetric-Key: Public and private keys for encryption and decryption.
Digital Certificates
o Verify identities in online transactions.
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
o Secure internet transactions.
Virtual Network Connection (VNC)
o Provides secure remote access.
IPSec
o Secures IP packets over unsecured networks.
Secure Shell (SSH)
o Provides secure network services.
Secure Copy Protocol (SCP)
o Securely transfers files over a network.
Wireless Security
Protecting wireless networks:
SSIDs
o Identifiers for wireless networks.
MAC Filters
o Control access to Wireless Access Points (WAPs).
Security Protocols
o Wired Equivalent Privacy (WEP)
o Wi-Fi Protected Access (WPA/WPA2)
o IEEE 802.11i: Advanced security measures for wireless networks.
o 802.1x: Network access control.
Authentication, Authorization, and Accounting (AAA)
Protocols and types for securing network access:
AAA Protocols
o RADIUS
o Diameter
o TACACS+
Authentication Types
o Something known (password).
o Something had (security token).
o Something you are (biometrics).
o Somewhere you are (geolocation).
o Something you do (behavioral biometrics).
Authentication Protocols
Various protocols for authentication:
PAP (Password Authentication Protocol)
CHAP (Challenge Handshake Authentication Protocol)
MS-CHAP (Microsoft CHAP)
Kerberos
EAP (Extensible Authentication Protocol)
PEAP (Protected EAP)
LEAP (Lightweight EAP)
Security Implementations
Practical steps to secure networks:
Software Patches and Service Packs
o Apply immediately after installation.
Default Administrator Usernames
o Change to enhance security.
Device Hardening
o Secure devices as much as possible.
Strong Passwords
o Use a mix of letters, numbers, and symbols.
Password Policies
o Enforce history, length, age, and complexity requirements.
Firewalls
o Monitor and control incoming and outgoing network traffic.
Unified Threat Management (UTM)
o Combines multiple security technologies.
Proxy Servers
o Hide clients from unauthorized external access.
Security Tools
Tools for monitoring and ensuring security:
Netstat Utility
o Checks open ports.
Protocol Analyzers and Packet Sniffers
o Monitor network protocols and data packets.
Policies
o Define security measures, remote access guidelines, BYOD rules, equipment
disposal procedures, data loss prevention, and incident response.
Data Security Compliance Requirements
Distinguish between voluntary standards and legally binding laws:
Standards
o Voluntary best practices for security.
Laws
o Legally enforceable requirements for data security.