1 lesson
1 lesson
Networking Concepts
There are two general kinds of nodes: intermediate nodes and end systems.
Intermediate nodes perform a forwarding function, while end system nodes
are those that send and receive data traffic. End systems are often also
referred to as hosts.
A client-server network is one where some nodes, such as PCs, laptops, and
smartphones, act mostly as clients. The servers are more powerful
computers. Application services and resources are centrally provisioned,
managed, and secured.
A peer-to-peer network is one where each host acts as both client and
server. This is a decentralized model where provision, management, and
security of services and data are distributed around the network. A small
peer-to-peer network can also be referred to as a workgroup.
Network Types
A network type refers primarily to its size and scope. The size of a network
can be measured as the number of nodes, while the scope refers to the area
over which nodes sharing the same network address are distributed.
Datacenter—A network that hosts only servers and storage, not end
user client devices.
Network Topology
Where the type defines the network scope, the topology describes the
physical or logical structure of the network in terms of nodes and links.
The logical topology describes the flow of data through the network. For
example, given the different physical network topologies described
previously, if in each case the nodes can send messages to one another, the
logical topology is the same. The different physical implementations—
directly connected via a cable versus connected to the same switch—achieve
the same logical layout.
Description
Physical point to point topologies using different media types for half-duplex
and duplex communications.
Star Topology
Description
You may also encounter the hub-and-spoke topology, which has the same
physical layout as a star topology but is primarily used in a different context.
While the star topology is often seen in local area networks (LANs), the hub-
and-spoke topology is more commonly applied to wide area networks (WANs)
with remote sites.
Mesh Topology
Description
Although not all network systems implement layers using this precise
structure, they all implement each task in some way. The OSI model is not a
standard or a specification; it serves as a functional guideline for designing
network protocols, software, and appliances and for troubleshooting
networks.
Description
When a message is sent from one node to another, it travels down the stack
of layers on the sending node, reaches the receiving node using the
transmission media, and then passes up the stack on that node. At each
level (except the Physical layer), the sending node adds a header to the data
payload, forming a “chunk” of data called a protocol data unit (PDU). This
is the process of encapsulation.
For example, on the sending node, data is generated by an application, such
as the HyperText Transfer Protocol (HTTP), which will include its own
application header. At the Transport layer, a Transmission Control Protocol
(TCP) header is added to this application data. At the Network layer, the TCP
segment is wrapped in an Internet Protocol (IP) header. The IP packet is
encapsulated in an Ethernet frame at the Data Link layer, then the stream of
bits making up the frame is transmitted over the network at the Physical
layer as a modulated electrical signal.
Layer 1 – Physical
The Physical layer (PHY) of the OSI model is defined as layer 1. The
Physical layer is responsible for the transmission and receipt of the signals
that represent bits of data. Transmission media can be classified as cabled or
wireless:
Local networks do not typically connect hosts directly with point to point or
mesh links. To reduce cabling and interface costs, each host is connected to
a central node, such as a switch or a wireless access point. The central node
provides a forwarding function, receiving the communication from one node
and sending it to another. To do this, each node interface must have a Data
Link layer address. The addresses of interfaces within the same layer 2
segment are described as local addresses or hardware addresses.
The Data Link layer also performs an encapsulation function. It organizes the
stream of bits arriving from the Physical layer into structured units
called frames. Each frame contains a Network layer packet as its payload.
The Data Link layer adds control information to the payload in the form of
header fields. These fields include source and destination hardware
addresses, plus a basic error check to test if the frame was received intact.
Description
Devices that operate at the Data Link layer include the following:
Layer 3 – Network
Layer 3 is the Network layer. This layer is responsible for moving data
around a network of networks, known as an internetwork. While the Data
Link layer is capable of forwarding data by using hardware addresses within
a single segment, the Network layer moves information around an
internetwork by using logical network and host IDs. The networks are often
heterogeneous; that is, they use a variety of Physical layer media and Data
Link protocols. The main appliance working at layer 3 is the router.
Description
Layer 4 - Transport
The first three layers of the OSI model are primarily concerned with moving
frames and datagrams between nodes and networks. At the Transport
layer—also known as the end-to-end or host-to-host layer—the content of
the packets becomes significant. Any given host on a network will be
communicating with many other hosts using many different types of
networking data. One of the functions of the Transport layer is to identify
each type of network application by assigning it a port number. For example,
data requested from an HTTP web application can be identified as port 80,
while data sent to an email server can be identified as port 25.
At the Transport layer, on the sending host, data from the upper layers is
packaged as a series of layer 4 PDUs, referred to as segments. Each segment
is tagged with the application's port number. The segment is then passed to
the Network layer for delivery. Many different hosts could be transmitting
multiple HTTP and email packets at the same time. These are multiplexed
using the port numbers along with the source and destination network
addresses onto the same link.
Description
At the Network and Data Link layers, the port number is ignored—it becomes
part of the data payload and is invisible to the routers and switches that
implement the addressing and forwarding functions of these layers. At the
receiving host, each segment is decapsulated, identified by its port number,
and passed to the relevant handler at the Application layer. Put another way,
the traffic stream is de-multiplexed.
The Transport layer can also implement reliable data delivery mechanisms,
should the application require it. Reliable delivery means that any lost or
damaged packets are resent.
Upper Layers
The upper layers of the OSI model are less clearly associated with distinct
real-world protocols. These layers collect various functions that provide
useful interfaces between software applications and the Transport layer.
Layer 5—Session
Layer 6—Presentation
Layer 7—Application
More widely, upper-layer protocols provide most of the services that make a
network useful, rather than just functional, including web browsing, email
and communications, directory lookup, remote printing, and database
services.
SOHO Networks
SOHO Routers
At layer 2, the SOHO router implements the following functions to make use
of its Physical layer adapters:
Description
There is no separate OSI model layer for security. Instead, security issues can
arise, and solutions are needed at every layer. Network security is essentially
a matter of allowing or preventing devices, users, and services (applications)
from using the network. The WAN interface is the network perimeter. The
SOHO router can apply filtering rules to traffic sent between the public and
private zones, implementing a firewall. The firewall can be configured to
block traffic based on source or destination IP addresses and also on the type
of application.
The firewall in the router can be configured with rules specifying behavior for
each port. For example, computers on the network might use the
Server Message Block (SMB) protocol to share files. It would not be
appropriate for hosts on the Internet to be able to access these shared files,
so the SMB port would be blocked by default on the WAN interface but
allowed on the LAN and WLAN interfaces.
Any host can connect to the RJ45 ports on the router and join the network.
The wireless network is usually protected by an encryption system that
requires each station to be configured with a passphrase-based key to join
the network.
Description
The Internet
The WAN interface of the router connects the SOHO network to the Internet.
The CPE is connected via its modem and WAN port to the local loop. This is
cabling from the customer premises to the local exchange. The point at
which the telco's cabling enters the customer premises is referred to as the
demarcation point (often shortened to demarc).
Internet Standards
References to RFCs in this course are for your information should you want to
read more. You do not need to learn them for the certification exam.
The OSI model has a stricter definition of the Session, Presentation, and
Application layers than is typical of actual protocols used on networks. The
Internet model (tools.ietf.org/html/rfc1122) uses a simpler four-layer
hierarchy, with a Link layer representing OSI layers 1 and 2, layer 3 referred
to as the Internet layer, a Transport layer mapping approximately to layers 4
and 5, and an Application layer corresponding to layers 6 and 7.
(2x10x10)+(5x10)+5
Binary is base 2, so a digit in any given position can only have one of two
values (0 or 1), and each place position is the next power of 2. The binary
value 11111111 can be converted to the decimal value 255 by the following
sum:
(1x2x2x2x2x2x2x2)+(1x2x2x2x2x2x2)+(1x2x2x2x2x2)+(1x2x2x2x2)+(1x2x
2x2)+(1x2x2)+(1x2)+1
As you can see, it takes eight binary digits to represent a decimal value up to
255. An 8-bit value is called a byte or an octet. While computers process
everything in binary, the values make for very long strings if they have to be
written out or entered into configuration dialogs. An IPv4 address can be
expressed as decimal octets. The four decimal numbers in the SOHO router's
WAN IP address 203.0.113.1 are octets.
Troubleshooting Methodology
Network Troubleshooting Methodology
When you encounter a network problem, you must try to get it resolved as
quickly as you reasonably can. However, you must also take enough time to
determine what has caused the problem so that you can avoid a recurrence.
You should make sure you familiarize yourself with the order of the steps in
the CompTIA Network+ troubleshooting methodology. These steps are
explained in more detail in the following topics.
Gather information.
Question users.
Identify symptoms.
Gather Information
Check recent job logs or consult any other technicians who might have
worked on the system recently or might be working on some related
issue.
Question Users
You will often need to contact users to establish more facts about the
problem. The basis of getting troubleshooting information from users is
asking good questions. Questions are commonly divided into two types:
Symptoms are facts and clues in the affected system that can be correlated
with known causes and issues. To identify symptoms, complete the following
tests:
Duplicate the problem on the user's system or a test system. You will
need to try to follow the same steps as the user. Issues that are
transitory or difficult to reproduce are often the hardest to
troubleshoot.
There are two key questions to ask when trying to identify the cause of a
problem:
Did it ever work? Hopefully, your users will answer the question
truthfully, because the correct answer is important—two different
approaches are required. If the system worked before 9:00 a.m., you
must ask what happened at 9:00 a.m. If the system never worked, then
you are not looking for something that stopped working, but for
something which was never working in the first place.
What has changed since it was last working? The change that caused
the problem may not be obvious. Maybe the window cleaners were in
the building, and one of them tripped over a cable and now the user
can't log in. Maybe someone has moved the user's workstation from
one end of their desk to another and plugged the cable into a different
port. Check for documented changes using the system inventory, but if
this does not reveal anything, look for undocumented changes in the
local area of the incident.
It may also be the case that a user reports two different problems at the
same time, often preceded by "While you're on the line . . ." sort of
statements. Treat each problem as a separate case. In most cases, you
should advise the user to initiate a separate support ticket.
If you obtain accurate answers to your initial questions, you will have
determined the location, scope, and severity of the problem, and whether to
look for a recent change or an oversight in configuration.
Question the obvious. Step through what should happen and identify
the point at which there is a failure or error. This approach can quickly
identify obvious oversights, such as a network cable not being plugged
in.
4. Test your theory (replace the cable with a known good one).
When you have drilled down like this, the problem should become obvious.
Of course, you could have made the wrong choice at any point, so you must
be prepared to go back and follow a different path.
If you are really unlucky, two (or more) components may be faulty. Another
difficulty lies in assessing whether a component itself is faulty or if it is not
working because a related component is broken.
In a divide and conquer approach, rather than starting at the top or bottom,
you start with the layer most likely to be causing the problem and then work
either down or up depending on what your tests reveal. For example, if you
start diagnosis at layer 3 and cannot identify a problem, you would then test
at layer 4. Conversely, if you discovered a problem at layer 3, you would first
test layer 2. If there is no problem at layer 2, you can return to layer 3 and
work from there up.
If you cannot prove the cause of the problem, you will either need to develop
and test a new theory or decide to escalate the problem. Escalation means
referring the problem to a senior technician, manager, or third party. You may
need to escalate a problem for any of these reasons:
The problem falls under a system warranty and would be better dealt
with by the supplier.
The scope of the problem is very large and/or the solution requires
some major reconfiguration of the network.
When you escalate a problem, you should have established the basic facts,
such as the scope of the problem and its likely cause, and be able to
communicate these clearly to the person to whom you are referring the
incident.
If you can prove the cause of the problem, you can start to determine the
next steps to resolve the problem.
Assuming you choose not to escalate the issue, the next step in the
troubleshooting process is to establish an action plan. An action plan sets out
the steps you will take to solve the problem. There are typically three
solutions to any problem:
When you consider solutions, you must assess the cost and time required.
Another consideration is potential effects on the rest of the system. A typical
example is applying a software patch, which might fix a given problem but
cause other programs not to work. Up-to-date configuration management
documentation and standard operating procedures should help you to
understand how different systems are interconnected and cause you to seek
the proper authorization for your plan.
When you apply a solution, validate that it fixes the reported problem and
that the system as a whole continues to function normally. In other words,
identify the results and effects of the solution. Ensure that you were right and
that the problem is resolved. Can the user now log in properly? Is there any
way you can induce the problem again?
Before you can consider a problem closed, you should be satisfied in your
own mind that you have resolved it, and you should get the customer's
acceptance that it has been fixed. Restate what the problem was and how it
was resolved, then confirm with the customer that the incident log can be
closed.
To fully solve a problem, you should try to eliminate any factors that may
cause the problem to recur. For example, if a user plugs their laptop into the
wrong network jack, ensure that the jacks are clearly labeled to help users in
the future. If a faulty server induces hours of network downtime, consider
implementing failover services to minimize the impact of the next incident.
Most troubleshooting takes place within the context of a ticket system. This
shows who is responsible for any given problem and what its status is. This
gives you the opportunity to add a complete description of the problem and
its solution, including findings, actions, and outcomes.
This is very useful for future troubleshooting, as problems fitting into the
same category can be reviewed to see if the same solution applies. It also
helps to analyze IT infrastructure by gathering statistics on what type of
problems occur and how frequently. Analyzing support incidents in a lessons
learned process can be used to improve network design, adjust standard
procedures, and guide investments in appliance and infrastructure upgrades.
Description