ATA Networking
ATA Networking
TRAINING
Who Needs CompTIA Network+?
I Just Want to Learn about Networks!
Is your goal only to get a solid handle on networks and a jump start on
the basics? Are you looking for that training that starts installing and
troubleshooting a network? Do you want to know what’s involved with
running network cabling in your walls or getting your new wireless
network working? Are you tired of not knowing enough about TCP/ IP
and how it works? If these types of questions are running through your
mind, then rest easy— you are in the right training class. You’ll look at
real-world networking as performed by real techs. This is a class that
understands your needs and goes well beyond the scope of a single
certification.
What CompTIA N+ expects as to know
Exams N10-005 to N10 - 006
Network Monitoring
SNMP
Documenting logs
Quiz
Network Troubleshooting
MTU problems
Bad connection solutions
Titanium tech
Quiz
LESSON 1
Understanding Networks
Meet the frame
LESSONS POINTS
. 8bit to a byte
The Mac Address
How do frame know how to get to the right computer
LESSONS POINTS Using the MAC address is a great way to move data around, but this process raises
an important question. How does a sending NIC know the MAC address of the NIC
to which it’s sending the data? In most cases, the sending system already knows
. A MAC address is a unique the destination MAC address because the NICs had probably communicated
48-bit identifier for a NIC earlier, and each system stores that data.
. Frames have a destination If it doesn’t already know the MAC address, a NIC may send a broadcast onto the
and source MAC addresses network to ask for it. The MAC address of FF-FF-FF-FF-FF-FF is the broadcast
address—if a NIC sends a frame using the broadcast address, every single NIC on
. NICs use MAC addresses to the network will process that frame. That broadcast frame’s data will contain a
decide whether or not to request for a system’s MAC address. Without knowing the MAC address to begin
process a frame. with, the requesting computer will use an IP address to pick the target computer
out of the crowd. The system with the MAC address your system is seeking will
. MAC addresses are also read the request in the broadcast packet and respond with its MAC address.
known as physical addresses.
• Data into a network from a computer > sends it to a NIC> NIC creates a frame >
sends to a HUB( repeater) repeater makes multiple copies and send them to the
various computers on the network. // what is wrong with this kind of data
transfer//
• MAC address is HEXADECIMAL CHARACTERs each character represent 4 binary
characters
• MAC address across on the network is a unique identifier to represent the
destination of the frame. so 12 hexadecimal characters FF-FF-FF-FF-FF-FF each of
these characters is 4 bits so we have 48 bits identifier for NIC
• FF-FF-FF-FF-FF-FF
OEM-Manufacture ID Unique ID
Realtek, Broadcom etc
B A FRAME CRC
cyclic redundancy check
good or bad data
After the NIC creates the frame it adds the
FCS and then dumps it and the data into
the frame
But one problem with simple networks is that computers need to broadcast to get MAC
addresses. It works for small networks, but what happens when the network gets big, like
the size of the entire Internet? Can you imagine millions of computers all broadcasting? No
data could get through. Equally important, data flows over the Internet using many
technologies, not just Ethernet. These technologies, such as SONET, ATM, and others, don’t
know what to do with Ethernet MAC addresses. When networks get large, you can’t use the
MAC addresses anymore.
Large networks need a logical addressing method, like a postal code or telephone
numbering scheme, that ignores the hardware and enables you to break up the entire large
network into smaller networks called subnets.
Switches & Hub
• Hub makes multiple copies of a frame and distribute across the
LESSONS POINTS
network
. A hub repeats each frame to • Switch is smart keeps a track of the MAC address of the
every connected device computers that are hook to the network based on ports
. A switch knows the MAC • This allow ports to work at full bandwidth
addresses of the connected
devices and only sends frames Trouble shooting Hubs and Switches
to the appropriate one. The hubs and simple switches function flawlessly for years without any need
for a tech to do more than wipe dust off the top. Very occasionally you’ll run
into a hub or switch that has problems. These problems fall into three
categories
• Obvious physical damage
• Dead ports
• General flakiness
Introduction to IP Addressing
LESSONS POINTS To move past the physical MAC addresses and start using
logical addressing requires some special software called a
. An IP address looks like this network protocol. Network protocols exist in every
32.44.17.231 operating system. A network protocol not only has to create
unique identifiers for each system, but also must create a
. A router connects multiple set of communication rules for issues like how to handle
local area networks
data chopped up into multiple packets and how to ensure
. An IP packet always exist those packets get from one subnet to another. Let’s take a
inside a frame. moment to learn a bit about the most famous network
protocol—TCP/IP—and its unique universal addressing
system.
• To be accurate, TCP/IP is really several network protocols designed to work
together—better known as a protocol suite—but two protocols, TCP and IP, do
so much work that the folks who invented all these protocols named the
whole thing TCP/IP. TCP stands for Transmission Control Protocol, and IP
stands for Internet Protocol. IP is the network protocol
• No two systems on the same network share the same IP address; if two
machines accidentally receive the same address, unintended side effects may
occur. These IP addresses don’t just magically appear—they must be
configured by the end user (or the network administrator). What makes logical
addressing powerful is the magic box—called a router—that connects each of
the subnets. Routers use the IP address, not the MAC address, to forward
data. This enables networks to connect across data lines that don’t use
Ethernet, like the telephone network. Each network type (such as Ethernet,
SONET, ATM, and other) uses a unique frame.
Mac address issue
1.To many broadcast create issues and confuses the network
2.They don’t identify that all computers are on a single network
192.168.0.X
So to work with bigger networks you need a new type of addressing call Broadcast Domain
MAC B IP B Port B
CRC
MAC A IP A Port A Sequencing
No.
Destination
IP Packet DATA
Source
IP B Port B
IP A Port A Sequencing
No.
Destination
What is a MODEL
LESSONS POINTS What is a MODEL
Networking is hard. It takes a lot of pieces, both hardware and software, to get
. We use the term modelling anything done.
to represent how a network
functions Just making Google appear in your Web browser requires millions of hours in
research, development, and manufacturing. Whenever we encounter highly complex
. There are two very popular technologies, we need to simplify
network models. the overall process by breaking it into discrete, simple, individual processes. We do
this using models.
. The OSI7 - Layer Model and
the TCP/IP Modeling is critical in networking. We use models to understand and communicate
with other techs about networks.
TIP
Memorize the OSI and TCP/IP
model
The OSI model vs. The TCP/IP model
LESSONS POINTS To help make interconnectivity work the OSI was born
7 distinct functions that a network must do.
The OSI is being supplanted with the TCP/IP model
. Know the 7 layers of the OSI
level OSI Model 1. Physical layer – what types of cable
2. Data link – anything that works with a mac address
7 Application 3. Network layer – logical addresses
. Know the four layers of the 6 Presentation 4. Transport layer – assembles and disassembles data in good order makes
TCP/IP model 5 Session sure data is in perfect shape
4 Transport 5. Session layer – the kind of connections between two systems – ( tcp
connection b/n a client server etc.)
Practice exams
3 Network 6. Presentation layer – It is used to convert data to formats that your
http://www.examcompass.com/comptia/net 2 Data link application can read
work-plus-certification/free-network-plus- 7. Application layer – is the API you find in application software's that make
practice-tests
1 Physical
the network aware
• All styles of cables have distinct connector types that you need to know.
Shielded twisted Copper Cabling and Connectors The most common form of cabling uses
copper wire wrapped up in some kind of protective sheathing, thus the
term copper cables. The two primary types of copper cabling used in
the industry are coaxial and twisted pair. Both cable types sport a
variety of connector types, none of which are actually copper
connectors, but that’s the term used in the CompTIA Network+
objectives to lump them together.
Unshielded twisted
Coaxial cable
LESSONS POINTS
Coaxial Cable Coaxial cable contains a central conductor wire (usually copper)
. Coaxial cables use RG surrounded by an insulating material, which, in turn, is surrounded by a braided
numbers. metal shield. The cable is referred to as coaxial (coax for short) because the center
. Coaxial Cables have an wire and the braided metal shield share a common axis or centerline
impedance measured in ohms. Coaxial are label RG ( radio grade ) rating
. For the test be able to RG8 50ohms
recognize a BNC connector, a RG58 50ohms
T Connector and F-connector RG6 75ohms – cable modems – has F type connector
Practice exams
http://www.examcompass.com/comptia/net
work-plus-certification/free-network-plus-
practice-tests
Fiber optics
install and properly terminate the various cable types using the appropriate tools
LESSONS POINTS There 2 types of fiber cables – Multimode and Single mode
Multimode is designed to propagate light ( fiber network see light flashing )
They carry LED signals
. Multimode cables carry LED Single mode is designed to use lasers and much thinner – for long distance –
signals NOTE : you cannot have a switch or a network card design for multimode using
Single mode cable
. Single mode cables carry
laser signals
. For the test, be able to
recognize the different types
of fiber connectors
Practice exams
http://www.examcompass.com/comptia/net
work-plus-certification/free-network-plus-
practice-tests
Connectors
ST Connector
looks like a BNC SC Connector FC connector
Looks like your f connector
LC Connector MT RJ connectors
Polishing ferro
When you cut off fiber it has to go through polishing before you put on the feral holder – connector piece
The Term is polishing – There are 3 types of polishing
RJ 11
RJ 45
Ethernet Basics
Introduction to Ethernet
LESSONS POINTS Ethernet is a standard for a family of network technologies that share the same basic bus
topology, frame type, and network access method. Because the technologies share these
essential components, you can communicate between them just fine. The implementation
Ethernet is defined by of the network might be different, but the frames remain the same. This is true for Ethernet
the IEEE802.3 standard running on a physical bus topology (the ancient 10Base5 and 10Base2) and a logical bus
topology (10BaseT and later). Ethernet’s designers faced the same challenges as the
designers of any network: how to send data across the wire, how to identify the sending
The IEEE has defined and receiving computers, and how to determine which computer should use the shared
many versions of the cable at what time.
Ethernet The engineers resolved these issues by using data frames that contain
MAC addresses to identify computers on the network and by using a process
For the test be able to called CSMA/CD to determine which machine should access the wire at any given time.
recognize the naming
syntax
Practice exams
http://www.examcompass.com/comptia/net
work-plus-certification/free-network-plus-
practice-tests
Standard Ethernet Nomenclature
10 Base 5
10 Base T
- 10mbps
- Base
Speed in Mbps The length of the cable – 500meters - Running unshielded twisted pair
with a switch in the middle
Base Or Broad
Multiple access means that all machines have equal access to the wire. If the line is free, any Ethernet node may begin
sending a frame. From Ethernet’s point of view, it doesn’t matter what function the node is performing: it could be a
desktop system running Windows 8 or a high-end file server running Windows Server or Linux. As far as Ethernet is
concerned, a node is a node and access to the cable is assigned strictly on a first-come, first-served basis. So what
happens if two machines, both listening to the cable, simultaneously decide that it is free and try to send a frame? A
collision occurs, and both of the transmissions are lost .A collision resembles the effect of two people talking at the same
time: the listener hears a mixture of two voices and can’t understand either one.
It’s easy for NICs to notice a collision. When two NICs send at the same time, the hub sends out the overlapping
signals, and the NICs immediately know that a collision has occurred. When they detect a collision, both nodes
immediately stop transmitting. They then each generate a random number to determine how long to wait before
trying again. If you imagine that each machine rolls its magic electronic dice and waits for that number of seconds,
you wouldn’t be too far from the truth, except that the amount of time an Ethernet node waits to retransmit is
much shorter than one second. Whichever node generates the lowest random number begins its retransmission
first, winning the competition to use the wire.
The losing node then sees traffic on the wire and waits for the wire to be free again before attempting to retransmit
its data. Collisions are a normal part of the operation of an Ethernet network. Every Ethernet network wastes some
amount of its available bandwidth dealing with these collisions. A properly running average Ethernet network has a
maximum of 10 percent collisions. For every 20 frames sent, approximately 2 frames will collide and require a
resend. Collision rates greater than 10 percent often point to damaged NICs or out-of-control software.
It’s easy for NICs to notice a collision. When two NICs send at the same time, the hub sends out the
overlapping signals, and the NICs immediately know that a collision has occurred. When they detect a
collision, both nodes immediately stop transmitting. They then each generate a random number to determine
how long to wait before trying again. If you imagine that each machine rolls its magic electronic dice and waits
for that number of seconds, you wouldn’t be too far from the truth, except that the amount of time an
Ethernet node waits to retransmit is much shorter than one second . Whichever node generates the lowest
random number begins its retransmission first, winning the competition to use the wire. The losing node then
sees traffic on the wire and waits for the wire to be free again before attempting to retransmit its data.
Collisions are a normal part of the operation of an Ethernet network. Every Ethernet network wastes some
amount of its available bandwidth dealing with these collisions. A properly running average Ethernet network
has a maximum of 10 percent collisions. For every 20 frames sent, approximately 2 frames will collide and
require a resend. Collision rates greater than 10 percent often point to damaged NICs or out-of-control
software.
Bus Ethernet 10BaseT In 1990, the IEEE 802.3 committee created a new
The original Ethernet networks employed a version of Ethernet called 10BaseT to modernize the first
true bus topology, meaning every computer generations of Ethernet. Very quickly, 10BaseT became the
on a network connected to the same cable, most popular network technology in the world, replacing
the bus. In a Thicknet (10Base5) network, for competing and now long-gone competitors with names like
example, devices tapped directly into a thick Token Ring and AppleTalk. Over 99 percent of all networks use
yellow cable that snaked throughout the 10BaseT or one of its faster, newer, but very similar versions.
network. The classic 10BaseT network consists of two or more
computers connected to a central hub. The NICs connect with
wires as specified by the 802.3 committee. 10BaseT hubs
10Base2 networks—some are still in use come in a variety of shapes and sizes to support different
today—use RG-58 coaxial cable with BNC sizes of networks. The biggest differentiator between hubs is
connectors on the end. The complete network the number of ports (connections) that a single hub provides.
is limited to 185 meters. The big quirk with bus A small hub might have only 4 ports, whereas a hub for a
networks involves the signal. The ends of the large network might have 48 ports. As you can imagine, the
bus have to be terminated, otherwise the more ports on a hub, the more expensive the hub. Figure 4-
signal reflects and the whole network goes 10 shows two hubs. On the top is a small 8-port hub for small
down. 10Base2 can handle 30 devices per offices or the home. It rests on a 12- port rack-mount hub for
segment larger networks.
Modern Ethernet, switches and duplex
LESSONS POINTS
100Base TX Fiber version which is 100Base Fx
know your 10BaseT types: 100Base F
100Mbps
names, distances, node - 1024 nodes per hub
1024 nodes per hub
number, etc. - Multimode
100 meters from node to hub
CAT 5e or better - 2 Kilometers
Know your 100Base types:
names, distance, node
number, etc. Full duplex being able to send and receive at the same time
For networks it started with 100Base T
For the test, be able to Eg. Of Half duplex is a hub, or a walker talky
recognize have vs full duplex. Eg. Of a full duplex is the operation of a switch
Practice exams
http://www.examcompass.com/comptia/net Now a days full duplexes are auto setup on your network card
work-plus-certification/free-network-plus- A rear case of manually setting half duplex is when you are using a cross cable
practice-tests
Connecting switches
Given a scenario configure a switch using the proper features
Given a scenario where there is a need to expand our network – how will we go about it
LESSONS POINTS
Straight -through cables have I have a 24 port switch and l want to expand my broadcast domain l can
identical ends as 568B Add another 24 port switch and interconnect them
To inter connect these cables we use straight through cables or cross over cables
Crossover cables have
different ends- 568A and 568B Some Switches have an uplink port that is pre crossover port
For todays switches all ports are auto sensing ports so they detect if a cable is switch
Connect switches directly with To switch
crossover cables
Practice exams
http://www.examcompass.com/comptia/net
work-plus-certification/free-network-plus-
practice-tests
Gigabit Ethernet and 10 -gigabit Ethernet
Given a scenario, deploy the appropriate wired connectivity standard
Gigabit Ethernet and 10 Gigabit Ethernet
LESSONS POINTS If you want a functioning, dependable, real-world network, you need a
solid understanding of a set of standards, collectively called structured cabling.
Structured cabling defines These standards, defined by the Telecommunications Industry Association/Electronic
how we install cabling Industries Alliance (TIA/EIA)—yup, the same folks who tell you how to crimp an RJ-45
onto the end of a UTP cable—give professional cable installers detailed
Telecommunication closet standards on every aspect of a cabled network, from the type of cabling to use to
/equipment room horizontal the position of wall outlets.
runs work area.
Structured cabling setup
Patch panel terminate one end Rack 8u
of horizontal runs
4U
Practice exams
http://www.examcompass.com/comptia/net
work-plus-certification/free-network-plus-
practice-tests
Crimping cables
Install and properly terminate various cable types and connectors using the appropriate tools
LESSONS POINTS
Crossover cables have Lets make Ethernet Cat6E A / B straight & Cross over cables
different TIA connections on
each end
Practice exams
http://www.examcompass.com/comptia/net
work-plus-certification/free-network-plus-
practice-tests
Punch down blocks
Install and properly terminate various cable types and connectors using appropriate tools
LESSONS POINTS
LESSONS POINTS There 2 ways which we can look at the equipment room
MDF – Main distribution frame is stack of servers and switches
in a rack
The primary equipment room
–
is called the main distribution
Other racks that connects with MDF will be called
frame ( MDF)
Intermediate Distribution frame ( IDF)
Rack-mounted equipment is
On the equipment rack has a standard height for the components
standardized at 19inches wide
In a rack Called a U – height of a U is 1.75 inches
and a multiple of 13/4 tall
1.75inches
Demarc this separates equipment from the cable company and
That of your equipment – hence yours is to tap service from the
The demark separate's the
Cable company devices for your LAN or TV
telecom company’s property
from your responsibility
Practice exams
http://www.examcompass.com/comptia/net
work-plus-certification/free-network-plus-
practice-tests
Testing cable
Given a scenario, analyze and interpret the output of trouble shooting tools
LESSONS POINTS Wiremapping is a simple test that confirms that each wire is hooked up correctly,
with no opens or shorts. UTP intended only for POTS (plain old telephone service)
Make sure you understand voice applications actually only needs to be tested for wiremap. Wiremapping is
how to read and interpret the very straightforward.
wiremap feature of your tester
Continuity
Continuity testing show if the is when all the 8 trands of cable light up in a test
cable has any breaks Continuity Problem
This when the test indicates that a strand in a cable does not show up in a test
A time domain refectometer
(TDR) will show the length of Testing for distance ( Time domain reflectometer – TDR)
the cable and help pinpoint For UTP we are allowed 100meters between a node and switch but are true
mid-cable breaks max length will be 90meters to allow for patch cables
In the fiber optic situation we call it the OTDR
Practice exams
http://www.examcompass.com/comptia/net
Cross talk is interference within pairs on individual cable is measured in decibels
work-plus-certification/free-network-plus-
practice-tests
Troubleshooting structured cables
LESSONS POINTS If you suspect that you a problem with your structured cabling
1. Verify if the operating system see the problem
2. Verify id there is a link light on your system
Loopback plugs test the NIC’s 3. Go to the switch to see if there is a link light there too
ability to send and receive 4. Remember if you do not have to link light your network is not in good
shape
Loopback plugs aren’t 5. Go to device panel and check for the network card – enabled, do you
effective but N+ thinks they have good IP information
are 6. Remember you can also have bad device drivers
Patch cables and wall outlets 7. We can also consider an RJ 45 Loop back which connects are RJ45 to PIN
are the most common part of 1 to PIN3 PIN 2 – PIN 6
structured cabling to fail 8. We can use the loop back to run a ping and it should tell us if the
Network card is good ( 127.0.0.1)
Practice exams 9. We need to watch out for our patch cables for damages
http://www.examcompass.com/comptia/net 10. We also need to check for our wall outlet they damage easily
work-plus-certification/free-network-plus-
practice-tests
Advance troubleshooting structured cabling
Given a scenario, troubleshoot and resolve common copper issues
TDR are great tools to check - Problems with horizontal run – use the TDR to check for break
for breaks on horizontal runs - Interference eg someone installed air-conditions,
( some one can gie you a clue – it only happens When is 5 in the day )
- UTP are likely to be affected by interference
Practice exams
http://www.examcompass.com/comptia/net
work-plus-certification/free-network-plus- - Fiber optical cable is susceptible to an interference called modal distortion this happens
practice-tests
In multimode, and is when light brakes into different rays of light
Using toner and probe
LESSONS POINTS
Tone generator and tone probe
They are designed to find cables when you forget to label them
Tone generators and tone
probes are used to locate
cables and connections
Practice exams
http://www.examcompass.com/comptia/net
work-plus-certification/free-network-plus-
practice-tests
LESSON 3
The World of TCP/IP
LESSONS POINTS Introduction to IP address and binary
Given a scenario implement and configure the appropriate addressing schema
Each computer on a
TCP/IP must have a
unique IP address 192.168.0.1
- Every computer on a computer network must have a unique IP address
IP addresses are - IP address are distant and is four values separated by three dots.
written as four octets, - Real IP is 32 ones and zeros
such as 192.168.4.12 - There are no dots in IP they are separators
Lets break 32 shapes of ones and zeros to 8 of 4 groups Ones Zeros
Each octet represent a Dotted decimal notation
binary string, 192 for Is a short hand we use, to represent 32 ones and zeros
eg. Is 11000000 There are 256 combinations – in the IP world we start with zero
So it is 0-255 each octet is valued between 0 and 255
Practice exams
http://www.examcompass.com/co
mptia/network-plus-
certification/free-network-plus-
practice-tests
192.168.0.1
128 64 32 16 8 4 2 1 =192
128 64 32 16 8 4 2 1 =168
128 64 32 16 8 4 2 1 =0
128 64 32 16 8 4 2 1 =1
Introduction to ARP
LESSONS POINTS I have an IP packet, and l need to send to a computer on the network
But l do not have the mac address to make a frame so l need to use a process
Called ARP ( Address Resolution protocol) it sends a broadcast to say l know your IP add
ARP resolves IP address If this is your IP please respond – ( ARP resolves MAC addresses from IP addresses)
Type arp –a to see ARP Who has Will this mean that anytime l want to send a
cache 192.168.15.163? frame I will have to do ARP? .. Will it not be efficient
Tell 192.168.15.23 For the network cards to keep the list of MAC and IP
ARP request a of the computers on the network?
broadcast over a You can do arp –a to see what you computer has keep
network Track off.
I am
192.168.15.163?
Practice exams My MAC address is
http://www.examcompass.com/co C9-60-00-01-2e-ac
mptia/network-plus-
certification/free-network-plus-
practice-tests
LESSONS POINTS Arp is a tool that is used to get a mac address when you only have an IP address of a
Destination computer – ARP gets into difficulty when we start adding a router to our
Network
Subnet mask is used on every 192.168.15.21
computer to determine if a
packet is local or outside the 192.168.15.20
network.
192.168.15.22
Practice exams 192.168.15.23
http://www.examcompass.com/comptia/netw
ork-plus-certification/free-network-plus-
practice-tests
192.168.15.21 So if computer A wants to send data he needs
To check if destination computer is part of the
192.168.15.20 Network so he send a local ARP or send outside
B The network, that case he need to talk to the
Router to send it over to the internet.
Router
A To take care of that you have 2 setting you need to
Gateway Add your computer
1. Subnet mask – the only job it does is to tell the
192.168.15.1
Individual computer to send the data locally or
Switch Send it to the router ( we need to know the location
Of the router HENCE)
2. Default gateway - is the IP of your router
D
192.168.15.22
C 192.168.15.23
LINUX SYSTEM MAC SYSTEM
Subnet Mask
Is a series of ones and series of zeroes, a subnet musk is always going to be 32bit long
And always ones followed by zeroes 24 ones and 8 zeroes
168 15 163
192
IP Address
23
168 15
192
Wake 16
192.168.12.12/16
Wake 20
192.168.13.20/20
- Everyone on the broadcast domain has to have the same subnet mask
- Your network admin decides how many ones and zeroes on your subnet mask
- The small your subnet mask the more computers you can have in your broadcast domain
- If you have 255.255.255.0 you only have the last 8 bits to work with and that is 1-254 computers
- 255.255 .0.0 gives us 16bits 16 power 16 minus 4 - IP Addresses
- When we talk about subnet mask we talk about how many ones are here
Classful addressing
LESSONS POINTS Every computer attach to the internet has to have a unique IP address – called a
Public IP address this IP is passed on by the Internet Assigned Number Authority
Recognize a Class A first octet (IANA)
from 1-126 ISP
Practice exams
http://www.examcompass.com/comptia/netw
ork-plus-certification/free-network-plus-
practice-tests
Passing IP Addresses – by class licenses 3 of them
255.0.0.0
Class A /8
First octet between 1 and 126
255.255.0.0
/16
Class B
First octet between 128 to 191
255.255.255.0
Class C /24
First octet between 192 to 223
Sub netting with CIDR NOTE
CIDR is the short for Classless Inter-Domain Routing, an IP addressing scheme that replaces the Host ID cannot
older system based on classes A, B, and C. A single IP address can be used to designate many be all zeros
unique IP addresses with CIDR. A CIDR IP address looks like a normal IP address except that it ends and all ones
with a slash followed by a number, called the IP network prefix. CIDR addresses reduce the size of
routing tables and make more IP addresses available within organizations.
255 255 255 128 LESSONS POINTS
/25
Extending the subnet by a
208 190 121 1 single digit creates two subnets
LESSONS POINTS
2 to 4th power = 16 -2 =14
It helps to memorize the
How may individual host/computers will l have if l have 7 subnet subnet mask for /25 and
greater subnets
2 to the 5th power = 32 – 2 = 30 computers The number of host is inverse
to the number of subnets
Practice exams
http://www.examcompass.com/comptia/netw
ork-plus-certification/free-network-plus-
practice-tests
Dynamic and static IP
install and configure the following networking services/application Practical's
Set up dhcp in
Every computer on your IP network will have to have windows with a
LESSONS POINTS 1. IP address router
2. Subnet Ipconfig /release
You have a signle DHCP server 3. Default gateway Ipconfig / renew
in every broadcast domain
This information have in someway be inserted into
Every modern operating the network card …
system comes with DHCP Static – inserting it manually
enabled by defuailt Dynamic – automatic using dynamic host
configuration protocol (DHCP or BootP)
DHCP relay enables a single What it mean is your machine needs a dhcp server
dhcp server to service more
than one broadcast domain
Practice exams
http://www.examcompass.com/comptia/netw
ork-plus-certification/free-network-plus-
practice-tests
1. DHCP discover
2. DHCP Request
If you are connected to a DHCP Any IP address from a dhcp server that is unknown to your network is a rogue dhcp
server and still get an APIPA server -
address, make sure the DHCP
server is working
LESSONS POINTS
Practice exams
http://www.examcompass.com/comptia/netw
ork-plus-certification/free-network-plus-
practice-tests
Notes
Fig 3 LESSONS POINTS
192.168.15.1 172.17.3.1
Routing Table Routing Table
Address Subnet Gateway Interface Address Subnet Gateway Interface Metric
192.168.15.0 255.255.255.0 0.0.0.0 192.168.15.1 192.168.15.0 255.255.255.0 0.0.0.0 192.168.15.1 100
98.201.164.0 255.255.254.0 0.0.0.0 98.201.164.215 98.201.164.0 255.255.254.0 0.0.0.0 98.201.164.215 100
172.17.3.0 255.255.255.0 0.0.0.0 172.17.3.1 172.17.3.0 255.255.255.0 0.0.0.0 172.17.3.1 100
0.0.0.0 0.0.0.0 98.201.164.1 98.201.164.215 0.0.0.0 0.0.0.0 98.201.164.1 98.201.164.215 10
0.0.0.0 0.0.0.0 202.190.44.1 202.190.44.1 11
Go find another router
Send it out on
32
Every tcp packet Data crc 80 32.44.17.231 144.22.17.191
18
has two ports
numbers
From my computer
Local private IP …
Will change from local IP to Public IP done by the router on the WAN side
Destination IP
DATA
From my router
Destination IP Router IP on the wan side, but store the local IP, the ports into a table
so that when the data comes back it know were to sent it to
Say want to setup webservers that etc.
• In this case we have different version of NAT
1. Static NAT – this means l have to assign a static ip to the webserver
so anybody that comes in will be looking for the webserver ( Port
forwarding)
2. Dynamic NAT or pooled NAT – this allow you to have multiple public
ips so that when a computer on your network want to get on the
internet they queue to use the gateway WAN of the router
3. Port Address Translation (PAT), is an extension to network address
translation (NAT) that permits multiple devices on a local area
network (LAN) to be mapped to a single public IP address. The goal
of PAT is to conserve IP addresses.
Implementing NAT
• By default NAT is turned on in every SOHO router LESSONS POINTS
SOHO routers ship with NAT
enabled
Any outside queries based on Let practically set up a CCTV camera to view remotely
specific port number are
forwarded to a specific
computer
radio radio
Point to Point
Router
Switch
Switch
Windows Server
Work stations
Introduction to Routing Protocols
LESSONS POINTS
When we think about large networks, and in particular, the Internet itself, by now,
you should be visualizing the Internet as what it really is: a lot of routers carrying a
Dynamic routing protocols use
lot of data for a whole bunch of computers.
metric to determine routers
That's not too terribly inaccurate of a description. The problem we have
and are either Distance Vector
with this is that routers go down.
or link state
we don't have what we call
Dynamic routing protocols are "convergence," and that is when everybody knows where everybody is and
either interior Gateway everything's working.
protocols or
Exterior gateway protocol
Dynamic routing is nothing more than putting some smarts inside of these
routers so that they can literally rewrite their own routing tables on the fly to
adjust for changes and to bring all the routers back into a world of
convergence.
They look into situations like
Convergence 1. HOP Count ie the shortest distance to get to a destination using the metric
value – also factures like MTU, Bandwidth, Latency(distance), Cost
2. How do get info between routers – distance vector, link state.
DISTANCE VECTOR PROTOCOLS – Based on cost of hops. Routers send out
their entire routing tables to each other till convergence. These are sent out
roughly every 30 seconds.
LINK STATE PROTOCOLS – Routers send out only changes to their routing
tables to each other.
OSPF – Open Shortest Path First. Based on Area IDs.
Convergence
Routing information protocol (RIP)
A
LESSONS POINTS z
Rip is a distance vector
protocol that uses hop count to x
determine routes y
C
RIP used only classful networks B
RIPs maximum hop count is 15 - RIP stands for routing information protocol, and it's one of the oldest dynamic routing
Practice exams protocols around. So let's get a few basics down.
http://www.examcompass.com/comptia/netw
ork-plus-certification/free-network-plus-
practice-tests - Number one, RIP is an interior gateway protocol, so we're not going to be using it to
connect autonomous systems. NB: An Autonomous System (AS) is one or more
networks that are governed by a single dynamic routing protocol within that AS
So that's RIP in a nutshell. Make sure you understand the big issues. RIP had a
maximum hop count of 15 hops, so you couldn't have a network bigger than 15 hops
between 2 network IDs or it simply didn't work.
Open Shortest Path First z
A
x y
LESSONS POINTS
C
OSPF is a link state protocol B
OSPF uses Area IDs The interior gateway protocol that is out there on the Internet today is called OSPF. OSPF stands for
Open Shortest Path First, and it is the number one dynamic routing protocol that you're going to see
on individual areas on the Internet itself.
OSPF converges quickly
Practice exams OSPF, is IGP, and secondly, it uses link-state protocols. The COST is calculated based on bandwidth.
http://www.examcompass.com/comptia/netw
ork-plus-certification/free-network-plus-
practice-tests
That's the big, big improvement of OSPF over, in particular, RIP, is that convergence can happen in
seconds, and that's a big reason people like to use it. OSPF is completely compatible with CIDR based
IP addresses. It's really fast, it's relatively easy to configure once you understand how it works. And it
also works very, very well with the Big Kahuna, which is BGP.
You won’t find OSPF on inexpensive home routers, because making it work takes a
lot of computational firepower.
Border Gateway Protocol - BGP
Router Network
LAN
LESSONS POINTS
BGP is a hybrid protocol
LANS
BGP is the primary protocol for
the internet
The best way to see this is to watch it in action. Let's watch BGP. We claim that we can break the entire
LANS internet into two distinct types of networks. First are what I'm going to call the LANS, the millions, the tens
of millions of local area networks each with its own separate subnet that we use to do most of the actual
work on the internet. If you've got a web server, if you've got an e-mail server, if you have a client, all of
these computers are connected to a LAN.
Now, let's interconnect those LANs with a few router networks. You'll notice in this case we are using three
colors. These three colors represent three router networks and the many, many LANs that use those router
networks to connect to the internet. You'll also notice that there are places where these router networks
interconnect. That's because no single router network covers everything. We need interconnection facilities
so that these ISPs can share traffic to get complete interconnection across the internet.
BGP
entries in them. It just doesn't exist. If every router needed to know the path to every LAN on the internet, it would
simply fail. We need something better. And that's where Border Gateway Protocol comes into play.
BGP breaks the entire internet into just over 20 thousand autonomous systems, often simply called an AS. An
autonomous system is a group of one or more router networks under the control of a single entity like a big ISP, a
branch of the federal government, a big university system, whatever. An AS has direct or indirect control of all the
routers, all the networks, all the subnets within their own AS.
AS
So, here we are breaking the entire US into only three autonomous systems. Every AS on the internet has a 32 bit
autonomous systems number and that number starts at one and goes to just over a billion. However, for many
years, ASN's were only 16 bit numbers from one to about 64 thousand. So the vast majority of ASN's that are
actually out there and working for a living go from one to right now around 50 thousand. Since autonomous
systems have total control on their own network routes, they can route between their routers anyway they want
and it's usually done via OSPF, but as far as the internet is concerned, we don't care.
When these autonomous systems interconnect though, they must use BGP. BGP is a heavy duty routing protocol
that is designed from the ground up to do only one thing well and that is route data between autonomous systems.
A router sending a chunk of data out to the internet only needs to know where its own BGP router is located. That
BGP router at the edge, as we say, of the autonomous system only needs to know the AS number of where that
number is going and, in essence, it greatly reduces the load on all BGP routers.
With that now, we understand the position of BGP as an exterior gateway protocol. We also see that BGP can be
used for some large organizations as an internal gateway protocol. We now can also appreciate that OSPF is used all
over the place and RIP, well, you don't see it too much.
• INTERIOR GATEWAY PROTOCOL
• Eg: OSPF, RIP, etc
• EXTERIOR GATEWAY PROTOCOL.
• Eg: BGP
LESSON 4
Making TCP/IP Work
Introduction to TCP and UDP
ETHERNET FRAME
LESSONS POINTS
TCP segment UDP Datagrams TCP Segment
Ethernet Frame
IP Packet
TCP segment
Three way hand shake
TCP Process
Three Way Hand Shkae
TO End
When running Wireshark you need to appreciate that you have three pieces of
the interface. The top piece shows every individual frame coming in and out of
your system. The middle one is details on that particular frame that you have
highlighted. Whatever frame you particularly want to choose you'll get the
details. And the lower one is in the RAW binary format and we don't use that
one too often because, well, I don't read binary that well.
So what we're seeing here is a whole bunch of a webpage coming in. So here's
a part of it, it's trying to get one particular JPEG. So lets load that, I'm sure it's
coming from that cheese.com that I looked at and it's trying to load this one
particular JPEG. And all of these underneath it are as the JPEG is coming in. So
let's take a look at this one right here.
The netstat command lists all To run netstat, just get to a Command Prompt and type netstat, N-E-T-S-T-A-T and these are the
open ports and network results that you're going to get.
connections on your computer
1. netstat –n: What that says is don't put nice words and stuff in there, just give me the raw numbers.
So this gives you the IP Address of the connected ports and devices.
TCP/IP APPLICATIONS
If you close an application and keep running netstat, you'll see that things have gone from ESTABLISHED to
TIME-WAIT.
So what is happening here is that they've been closed or we're waiting for the time-out to kick in and this
will eventually shut down completely
TCP/IP APPLICATIONS
Variants of NETSTAT Command:
2. netstat –b: This shows us who is making these connections and right now. It lists the program associated
with it.
TCP/IP APPLICATIONS
Variants of NETSTAT Command:
2. netstat –bno: This shows show the process ID of the exe we are running in addition to all the
information from the previous netstat commands.
TCP/IP APPLICATIONS
Variants of NETSTAT Command:
3. netstat –a: This shows all active ports.
TCP/IP APPLICATIONS
Webservers
HTTP:- Hyper Text Transfer Protocol, Is the basis of what we
LESSONS POINTS call the world wide web.
Web servers host web sites;
Web clients access web server A Server is just software on a Computer. – It can be a simple
HTTP uses TCP port 80 by
computer. Not only a Huge machine with Lots of ram and
default sitting on a big rack system.
Eg: Microsoft's IIS (Internet Information Service), Apache.
HTTPS uses TCP port 443 by
default
Practice exams HTTPS :- Hyper Text Transfer Protocol over SSL, is the secure
http://www.examcompass.com/comptia/netw
ork-plus-certification/free-network-plus- version of HTTP. Is used for secure connections and encrypts
practice-tests
the data transferred between the client and the webserver.
Uses 2 protocols:
SSL (Secure Sockets Layer ) which is an old protocol.
TLS (Transport Layer Security) which is the newer protocol.
TCP/IP APPLICATIONS
Telnet is unencrypted and runs TELNET runs on port 23. TELNET enables you to access a remote computer. It
over TCP port 23 allowed you to get to another's remote computers command prompt
Disadvantage:
SSH runs over port TCP port 22
Telnet has a downside and that is login details and command typed
SSH is fully encrypted and has in by the user is revealed
almost completely replaced It has no encryption
Telnet So TELNET should never be used on the internet. Only in your LAN
Practice exams
when necessary.
http://www.examcompass.com/comptia/netw
ork-plus-certification/free-network-plus-
practice-tests SSH means Secure Shell. It runs on port 22. Every aspect of SSH, however,
including both login and data transmittal, is encrypted.
TCP/IP APPLICATIONSCV
REVIEW:
Use this table as a review tool to help you remember each Internet application:
NETWORK NAMING
Every computer that runs The HOST file still appears on Windows and linux systems, and it takes
TCP/IP has a HOST file precedence over DNS.
The HOST file takes precedence To locate a HOST file on windows, go to: c:\windows\system32\drivers\etc
over DNS
Practice exams Exercise
http://www.examcompass.com/comptia/netw
ork-plus-certification/free-network-plus- Use the HOST file to redirect a website anytime a user visits a website
practice-tests Get the IP address for myjoyonline.com (use ping)
change the HOST file to call it news
now visit “news” with the web browser and see what happens
NETWORK NAMING
www.admintelecomacademy.c Just as we have contact list on our phones to help is memorize numbers or
om is an example of FQDN convert numbers to names we know, we have the same contact list on the web
called DNS( Domain Name Systems)
.com.edu.com.gh are examples
of top-level domains (TLDs) This helps us to convert ip addresses of servers to the names DNS servers help
us is to resolve IP address based of a Fully Qualified Domain Name (FQDN).
Practice exams
http://www.examcompass.com/comptia/netw They match the FQDN to IP addresses
ork-plus-certification/free-network-plus-
practice-tests
Note the total length of a fully qualified domain name should not be more that
256 characters
NETWORK NAMING
Practice exams
http://www.examcompass.com/comptia/netw
ork-plus-certification/free-network-plus-
practice-tests
NETWORK NAMING
Dynamic DNS
LESSONS POINTS The TCP/IP folks came up with a new protocol called Dynamic DNS (DDNS) in
1997 that enabled DNS servers to get automatic updates of IP addresses of
Dynamic DNS enables you to computers in their forward lookup zones, mainly by talking to the local DHCP
use a DHCP - assigned IP server.
address for connection
Practice exams
http://www.examcompass.com/comptia/netw
ork-plus-certification/free-network-plus-
practice-tests
NETWORK NAMING
6. The good old ping can also be used to test if a dns server is working
SECURING TCP/IP
Security of TCP/IP in modern Networks
LESSONS POINTS Involves 5 Main Areas: encryption, integrity, nonrepudiation, authentication, and
authorization
These 5 areas of security may
be separate • Encryption means to scramble, mix up, or change data in such a way that bad guys
issues, but they overlap a lot in can’t read it.
TCP/IP security practices.
• Integrity is the process that guarantees that the data received is the same as
In TCP/IP security, you have originally sent.
protocols that combine
encryption, • Nonrepudiation is the process of making sure data came from the person or entity it
integrity, nonrepudiation was supposed to come from.
(sometimes), authentication,
and authorization to create • Authentication means to verify that whoever is trying to access the data is the
complete security solutions for person you want accessing that data.
one TCP/IP application or
another. • Authorization defines what an authenticated person can do with that data.
Eg: Permissions in windows (Administrator and Guest account)
SECURING TCP/IP
Encryption - Symmetric Encryption
LESSONS POINTS
Encryption is done every where in the computer world, to understand how this
Plaintext/cleartext is any unencrypted work let create a string of text, say 'llovemynetworkingclass'
data we try an old method called Caesar cypher - which each text is going to change
to the increment of text by three
A cypher is a general term for a way to
encrypt data A=D B=E C=H etc. this can easily be hacked, to do this better we employ the help
of Algorithms = KEY (is 8 characters must be between 0-9) so
An algorithm is the mathematical (llovemynetworkingclass)
formula that underlies the cipher. (1234567891234567891234)
Algorithms use keys to encrypt cleartext so say we have clear text like a word document, in order to encrypt we have to
into ciphertext generate a key we put the key into an algorithm and run the cleartext through
the algorithm and we get a cyphertext.
An algorithm that uses the same key to
encrypt and decrypt is symmetric This is what we call symmetric Encryption - so when you want to read the text
encryption you put your key and your cyphertext through the algorithm to get clear text
Symmetric Encryption is very common ALMOST ALL TCP/IP APPLICATIONS HAVE MOVED TO
you find them in wireless connections ( ADVANCED ENCRYPTION STANDARD (AES)
RC4 or AES)
SECURING TCP/IP
Asymmetric Encryption
In a symmetric encryptions environment same keys are needed to decrypt a text
LESSONS POINTS hence keys are passed all over the internet, which make it more a bit easy to hack
because if someone can get their hands on the keys and the cypher text they can
Asymmetric encryption uses a pretty much hack it.
public and a private key
So Asymmetric encryption was created here you have two keys, ( public key and
Private Key) when you put a public key into our algorithm it will encrypt a private key
Public keys encrypt will decrypt. A private key and its associated public key is a key pair. and these keys
Private keys decrypt are generated with the help of the
algorithm
For two people to
communicate they must l will send my public key to Rex based on an encrypted word document, Rex will
exchange public keys send me his public key
Public keys are distributed so others can send you encrypted data -the process of
exchanging keys is called key exchange.
LAYER 2 - A common place for encryption using proprietary encryption devices. These
boxes scramble all of the data in an Ethernet frame except the MAC address information.
Devices or software encodes and decodes the information on-the-fly at each end.
LAYER 3 - Only one common protocol encrypts at Layer 3: IPsec. IPsec is typically
implemented via software that takes the IP packet and encrypts everything inside the
packet, leaving only the IP addresses and a few other fields unencrypted.
LAYER 4 - Neither TCP nor UDP offers any encryption methods, so little happens
security-wise at Layer 4.
LAYERS 5, 6, and 7 - Important encryption standards (such as SSL and TLS used in
e-commerce) happen within these layers, but don’t fit cleanly into the OSI model.
SECURING TCP/IP
Integrity - Cryptographic Hashes
This is not encryption but it use to verify the data you are expecting or to findout if
LESSONS POINTS the data is good. so whiles sending data to someone we just wont to make sure that
data remains the same.
Hashes are used to verify data,
A Hash is an algorithm that takes a big data and converts it to a string of text a binary
and is not for encryption
value that is fixed inside
Hash values are always fixed in
NOTE: - A hash algorithm creates a fixed-size has value
size
It does not matter the size of data or documents, you still get a fix amount of a binary
Two common hashes are MD5
value which is 128bit hexadecimal value
and SHA-1
A hash can also help as to determine if a document or data has been change,
e.g. is if you are have an error in you downloads
Access Control
LESSONS POINTS This means how do we provide Authentication and Authorization.
Authentication means what will it take to get into the network the system the
Mandatory Access Control Uses resources - this usernames and passwords, certificates RSA tokens to allow the world
Labels to know that, you are who you are suppose to be.
Discretionary Access Control Now when you are in what can you access, and that is what authorization comes in
gives the creators control over (Access Control List) and this is every where, your computer ( username/Password)
permissions
Mandatory access control List
Role-Based Access Control uses Define what you could or could not do on a resource (top secret) - folder sharing
groups
Discretionary Access control - Owner/read/write/
Downside of Kerberos
Everything is timestamp - all computers will have the same time stamp
Expensive to buy a windows server
Designed for wire network
SECURING TCP/IP
Kerberos & EAP
Because of the Downside of Kerberos, EAP was created.
EAP-TLS EAP with Transport Layer Security (TLS) defines the use of a RADIUS
server as well as mutual authentication, requiring certificates on both the server and every
client
EAP-TTLS EAP-TTLS (Tunneled TLS) is similar to EAP-TLS but only uses a single
server-side certificate
EAP-MD5 This is a very simple version of EAP that uses only MD5 hashes for transfer
SECURING TCP/IP
Tunneling Through SSH
LESSONS POINTS unencrypted protocols
VNC VNC
Very few internet protocols are
SERVER CLIENT
encrypted
At work at home
You can either make them
encrypted or ride on an
encrypted protocol
- NTP runs on UDP port 123 and usually manifest it self as some application that
needs to check the time every windows computer has this feature
- A lot of protocols rely on NTP, a system with incorrect time can course trouble on
a network
LESSON 5
Building A Real World Network
ADVANCED IP NETWORKING
Client Server Vs Peer to Peer
Clients
LESSONS POINTS Peer to Peer
Bit torrent
Older client /Server networks modern peer to peer
had dedicated servers and
clients
LESSONS POINTS
Client to site
A VPN creates a secure tunnel
so a remote machine or
network can be part of a local
network
LESSONS POINTS
A system connected to a VPN
looks as though it’s on the local
network, but performs much
slower than if the system was
connected directly back at the
office because it’s not local at
all.
ADVANCED IP NETWORKING
VPN – How VPNs Work
PPTP VPNs - Point-to-Point Tunneling Protocol (PPTP)s
o the PPTP endpoints on the client and the server. The server endpoint is a
LESSONS POINTS special remote access server program. On the Windows client side, you
A system connected to a VPN run Create a New Connection.
looks as though it’s on the local o When your computer connects to the RRAS server (Routing and
network, but performs much Remote Access Service) on the private network, PPTP creates a
slower than if the system was secure tunnel through the Internet back to the private LAN
connected directly back at the
office because it’s not local at L2TP VPNs - Layer 2 Tunneling Protocol
all. The endpoint on the local LAN went from a server program to a VPN-
capable router, called a VPN concentrator.
Network people often directly connect two Cisco VPN
concentrators to connect two separate LANs permanently
This is called a site-to-site VPN connection
LESSONS POINTS
Managed switch
VLAN create separate Managed switch
broadcast domain
Connect the broadcast After creating separate networks from a Vlan, sometimes you want these
domains with physical routers separate networks to talk to each, we will be using a router to help me do
that but the down side is anytime l come up with a new Vlan l need to be
you can also connect broadcast adding Routers what l need is to have a router that can do interVLAN
domains with virtual routers routing
using interVLAN routing
interVLAN routing is a virtualization of the functions of a router that is
put into higher end switches. InterVLAN routing acts like one or more
virtual routers
ADVANCED IP NETWORKING
Interfacing with managed switches
We look at two typical routers where we use a console port to manage switches
LESSONS POINTS and routers without even knowing an IP address. You will need a rollover cable
to connect to your switch/router
Managed switches require
configuration
Port bonding We have two switches are plugin together on a trunk line
but traffic on it becoming heavy so we need to add additional
LESSONS POINTS ports to help increase the bandwidth of the trunk line, and that is where
port bonding comes in ..
Port bonding links switch ports after assigning ports and groups we need to use LACP( link aggregation
to increase bandwidth control protocol) this allows us to interconnect to other brand of switches and
this is set to active and basically means if lookout for a port that is ready to
Use LACP for the trunking do port ponding == Active -active and active - passive work
protocol
when mean when you set it to active for both switch they work
set ports to active and when you set it to active and passive they will work, but cisco recommend
we set both active. If you set it up as passive it basically means l will
wait for active port to sent me traffic both we see my link light.
for the exams if you do active - passive it will work, but passive=passive
it will not work.
ADVANCED IP NETWORKING
Port Mirroring
LESSONS POINTS
Port mirroring gives us that ability to remotely monitor data that is going in and out
of a particular source, through a configured port number. We can set it up for an
Port Mirroring enables the
entire Vlan and know all the traffic going in and out of my vlan, and set it to a
traffic flowing through one port
particular port number.
to be monitored on another
port
Quality of service
LESSONS POINTS
Router
Firewalls are hardware or software
tools that filter traffic based on
various criteria, such as port
number, IP address, or protocol
Broadcast Domain
Intrusion detection system detect Firewalls are imperfect
and report possible attacks to the So we need to have something that will watch for naughtiness..
administrators And that is where Intrusion detections systems come in (IDS)
Turns to be part of the internal network, can be a software on a machine or
Intrusion prevention systems run A box . If they detect something they send txt or email
inline with network and act to stop
detected attacks Active IDS will tell the firewall to shut a port down based on what it has observer
Is called IPS ( Intrusion Prevention system)
A firewall filters; and IDS notifies;
and IPS to acts and to stop Network – IPS – Router - Firewall
ADVANCED IP NETWORKING
Introduction To IPv6
LESSONS POINTS
128-bit IPV6 addresses are
replacing 32 –bit IPv4
addresses
When we talk about IPv6 = 8 groups separated by 7 colons. these addresses are
LESSONS POINTS hexadecimals that is why we have letters and numbers
WAYS TO SHORTEN IT:
128-bit IPV6 addresses are
• leading zeroes can be dropped from any group so 00CF becomes CF and
replacing 32 –bit IPv4
0000 becomes 0
addresses
2001:0:0:3210:800:200C:CF:1234
• you can use a pair of colons (::) to represent a string of consecutive groups
Know the rules for abbreviating
with a value of zero
IPv6 addresses
2001: :3210:800:200C:CF:1234
The IPV6 loop back address is
Eg: IPv6 for a loopback address is
::1
0000:0000:0000:0000:0000:0000:0000:0001
In the IPv6 the front half comes from some where and the back half comes from
your mac address, or a random number
fe80 -> link local address ( fe80::) or fe80:0000:0000:0000
ADVANCED IP NETWORKING
the last half is the mac address on a mac address we have a 48bit identifier but we need 64bit to make that last
part of the IPv6 so they shove in 16bit to make a 64bit
fe80::8939:7684:d84b:a5a4%19
fe80::711b:lc9:f462:7ed4%20
fe80::2112:1234:88a4:b421%21
Link local is what makes a request like arp to take place, is not routable that is an IP
that is used locally.
ADVANCED IP NETWORKING
The routable ipv6 is the IPv6 address which is the internet capable address, the addresses began in 2001 when they
started passing out these addresses, and these address are generated upstream on the network, your computer will
be listing to the first half of the address that is passed by a router given out IPv6 addresses
the last half is generated from your computer with the mac address and some random numbers
Router
ADVANCED IP NETWORKING
Aggregation is the tool used to get a legitimate IP address on the internet
Router
Computer
Delegated Prefix
2001:470:b8f9:ff00
WAN Side DNS
2001:470:1A33:101F:121:232:1:f7 2001:4860:4860::8888
ADVANCED IP NETWORKING
IPv6 Tunneling
LESSONS POINTS Encapsulating IPv6 into IPv4
and when it get to an end point it
Today you need a tunneling will strip the IPv4 off
protocol to get to the IPv6
internet
LESSONS POINTS
Original telephone systems
used frequency division
multiplexing, today they use
time division multiplexing
Analogue systems has a problem
T1 =24 DS0s = 1.5Mbps With in distance so interconnecting Frequency Division Multiplexing
T3 - 28 DS1s = 43.2Mbps Handset has to be with 3 miles of exchange
So at the exchange a human being will see
light Coming from some electrical pulses and
E1 and E3 are European carries she will intern connect the call to who ever
you want to talk to
Analogue
Digital Pieces - Signals Digital
All of the digital pieces are being sampled with 8bit, sampled
ADVANCED IP NETWORKING
eight thousand times per second so each bit of the
conversation is 64kbps this is a good sample rate to hear a
good conversation
OC1 = STS1 = 51.85 Mbps The very top of the internet is all fiber optics the main fiber
optic standard is called Sonet this some kind of optic carrier equivalence
OC3 = STS3 -155.52 Mbps of T1/E1 called OS lines the slowest OC line is called OC1 = 51.85Mbps
OC3 is 3 x of OC1
OC12 = STS12 = 622.08 Mbps
Try to remember OC1 , OC3,OC12 and the STS number . Sonet is now in
competition with Gigabit or 10Gigabit ethernet. Sonet has come up with a
rival called DWDM - Dense wave division multiplexing this using multiple
light colors for one piece of fiber and can take an existing connection and
multiply it by as much as 150 times. We called Sonet on steroids
ADVANCED IP NETWORKING
Packet Switching
Back in the old days we used a concept called circuit switching and you will have
and analogue signal that will travel from one telephone to the next and you will
LESSONS POINTS have to manually switch the signals to get to the other phone so that they can
talk to each other.
Know your types of telephony
packet switching Frame relay was a type of packet switching that did not care about errors
and was very quick. Frame relays are most associated with T1 lines, is the type
Frame Relay, ATM, MPLS of switching that is on top of the T1 line
Integrated Digital Services Network this an old way we used to use for last mile dial-up
connection ISDN is digital and has a telephone number associated with it so you could use
a telephone number to call between ISDN devices. ISDN ran at 64kbps and 128 kbps, they
came with terminal adaptors that will be setting in your office or home and you plug your
special ISDN phones to it and computers.
BPL Broadband over Powerlines is passing your electric with data lines, and problem has
been interference
ADVANCED IP NETWORKING
Remote connectivity
LESSONS POINTS We talk about remote connectively generally is to have the ability remotely connect to a
computer and gave access to the desktop and perform some kind of functions and
Tight VNC runs on port 5900 rarely transfer files.
Microsoft RDP runs on port Remote desktop was spearheaded by a company called Citrix and they developed a
3389 stranded called ICA to provide over an IP network to do remote connectivity.
Remote Assistance is a feature of the Help and Support System in which you
allow another user take over your computer via the Internet and figure out your problem for you.
You can sit back, watch, and learn. And if you don’t like what’s happening, you can drop the
connection with a click. To enable Remote Assistance
2. Select the Allow Remote Assistance Connections to This Computer check box and then click OK.
The System Properties dialog box will close.
3. Open Windows Help and Support. Click the Ask button and then click the Windows Remote Assistance link.
On the window that appears, click the Invite Someone You Trust to Help You link.
4. On the page that appears, you can choose to use your e-mail to invite somebody to help you.
LESSON 6
Beyond the typical network
Network Types Router
LESSONS POINTS
Know the difference between
all the area network acronyms
MAN
Metropolitan area network
CAN
Say the city of ACCRA
We have a WAN inter
connected across campus
INTERNET
Inter connecting cities
Blue tooth
Note if you have your own
Private network we call it Intranet
Key component of UC are the - Now, there's a lot of Voice over IP out there. For example,
UC Devices, UC Server, and UC there's something, when we talk about Voice over IP,
Gateway you'll hear things like, Google Talk or Skype
Ports: RTP[5004.5005(TCP)] SIP Voice over IP we are talking about, which is eventually
[5060,5061(TCP)] H.323 going to become Unified Communications, is really more
of the world where people expect to have a phone, so
VOIP today is really where people have very special types
of phones to do special stuff.
here is a old school PBX system. The PBX is simply a box, arguably a computer, but it's really a
switching device and it's completely analog. Everything you're seeing here are RJ-11 connections,
and what I would have is I would have my specific PBX-style phones that would plug into the PBX
box, and then the PBX box could go out then, and I would have phone line connections directly
to the PBX box, and it could do all kinds of amazing stuff, and most of this should be pretty
common.
When we take a look at Voice over IP, we're going to start with a box again, but this time, we're
simply going to connect this box to our Local Area Network itself, so you could see it's just plugged
into this switch here. In fact, while you can get dedicated VoIP boxes, in most cases, really what you
have is a server that's running very specific VoIP software, so this would be a fairly typical setup.
Now, in order to connect to the outside world, this box is going to be connected, often in the old
days, it would still be connected to an old PBX system but it would have some way to get out to your
regular publicly-switched telephone network, but the question is, "If I'm already an IP, why don't I
take advantage of the actual internet itself?" So a more modern Voice over IP system would have a
connection to the internet, and once you have a connection to the internet, it almost makes the
whole idea of having your own wired connections sort of unimportant because you'd have some
type of service in the cloud where if you actually needed to call a landline, they would take care of
that for you.
So, once we have VoIP, once we have this connection, we can actually do a lot more than that. We
actually get into the world of what we call Unified Communication.
let's talk about Video Conferencing versus Real Time Video.
So, when we talk about Video Conferencing, we usually have
one person, a speaker, and this speaker is giving some kind of
presentation, and this is then propagated over the internet.
Windows server has a Hypervisor that is what runs and managers the virtual machines for us there 2
What is a hypervisor? kinds of hypervisors , this hypervisor runs on top of the windows OS.
There is another kind of hypervisor and this kind of hypervisor boots up a system, you normally see a
thumb drive inside the computer .
Four Clouds to remember Owning a cloud - a good example we can start with is aws- amazon web services
this is a public cloud and anybody can put their data on this cloud. Another way to
1. Public own a cloud is private l could own the hardware but what is important is only l will
2. Private be using the cloud .
3. Community
4. Hybrid l can have a private cloud and invite others to join me hence l will be forming a
community cloud
The other form of cloud is a hybrid one and that is me combining my private cloud
to a public one
Introduction to Wi-Fi and Wireless Access
Point (WAP) Wi-Fi - is short rage radio to be used for distributing data instead of cable for a LAN.
Wi-Fi has been around for a while but it wasn't until a company called Linksys started creating some little boxes the
black and blue that Wi-Fi really took off.
LESSONS POINTS The Wi-Fi that we use is based on the 802.11 standard
The primary wireless standard You can have wire devices in the form PCi/PCie card, Dongle etc.
everyone with a wireless device will have to plug into a network - will need a WAP - wireless access point. WAP is a
is 802.11 bridging devices that connects a LAN to Wireless network.
in infrastructure mode you will need to setup SSID that will be broadcasting one type of connection- this created a
There are 14 channels used in Basic Service Set identifier (BSSID)
you can have a group of WAPs with the same SSID connected to the same switch -
802.11 to get ESSID ( extended SSID)
The N+ is only interested in only 2.4ghz set of channels the channels are 1-14
the rest of the world uses 1-13 USA 1-11 Japan 1-14 . these channels do sometimes overlap easily so in the USA 1,6,11
are what they permanently use based on devices that are manufactured in the US.
802.11 standard
Things have gotten better since the 802.11 standard was created for WAP
so the devices have become better and now what we see is the standard having extension 802.11b - 802.11n,
LESSONS POINTS 802.11ac
802.11b - was the grand daddy of them all - 11mbps /2.4ghz band
Early wireless standards are 802.11a - runs on 5ghz band 54mbps had a short range
802.11b(2.4-GHz) and 802.11a 802.11g - 2.4ghz band 54mbps support 802.11b devices
(5.0=GHz) 802.11n - 2.4/5ghz band runs as slow as 74mbps and fast as 600mbps - they introduced something called
MIMO multiple in/multiple out it allowed multiple channels to talk to different devices.
First widely -used standard was The 802.11n were difficult to configure because if you migrate from 802.11b/g you will need to change devices
802.11g (2.4-GHz) that connected to it or we needed to be on a Green field mode = all n devices on network, which means all
connecting cards will need to be upgraded to work with 802.11n. The 802.11n WAP supports 802.11b/g devices
Current fastest standards are 802.11ac - 5ghz has 3 antenna’s for N and 3 antenna for AC ( can run of 2.4/5 for ac/n) 1gbps is built on multi-
802.11n and 802.11ac user MIMO ( MUMIMO)
it support 802.11b/g/n devices on 2.4ghz frequency
802.11ac
POE
Power over ethernet
LESSONS POINTS
POE provides a power to
networking devices without
the need for power cords
POE Injector POE Switch
POE is used frequently in WAPs
POE WAP
Wireless security standard
LESSONS POINTS By default anybody can connect to a wireless access point, and there is nothing you
can do about that so there is not much in the way of authentication.
WEP is the oldest wireless
The real power of 802.11 is encryption
encryption standard and it uses
1. WEP - Wired Equivalent Privacy
40/64 or 104/128 -bit
2. Wi-Fi Protected Access (WPA) is still WEP but includes TKIP
encryption
( Temporal key integrity protocol)
WPA can be cracked TKIP is a suite of algorithms that works as a "wrapper" to WEP, which allows users of legacy WLAN equipment to upgrade to
TKIP without replacing hardware. TKIP uses the original WEP programming but "wraps" additional code at the beginning and
end to encapsulate and modify it. Like WEP, TKIP uses the RC4 stream encryption algorithm as its basis. The new protocol,
WPA2 is the strongest wireless however, encrypts each data packet with a unique encryption key, and the keys are much stronger than those of its
encryption standard predecessor. To increase key strength, TKIP includes four additional algorithms
3. WPA2 is using AES encryption which means all the wireless devices must support
AES - Advanced Encryption Standard ( symmetric encryption )
4. WPA2 Mixed TKIP+AES
5. Radius
Implementing Wireless Security
LESSONS POINTS 1. turnoff SSID broadcast - what is the downside?
2. Mac address Filtering - what is the downside?
Disable SSID broadcast 3. Setup Multiple SSID
4. Limit DHCP - what is the downside?
Use MAC Filtering 5. Change default password
6. Remote management - also change ports
Limit the number of DHCP - 7. Client isolation - means every one can connect to the SSID but they cannot see each
issued addresses other
LESSON 7
Managing the Network
IT Risk management
When we talk about IT risk management we talk about infrastructure, and our job is to secure the
LESSONS POINTS infra from treats .. so when we are setting up enterprise network we hire people big organizations
have like chief security officers who specialize in providing the security we need.
Security policies are
When we talk about IT risk management we talk about people who sit in boardrooms that setup
documents with broad
overview statements that define techs like you what you are how to set the securities up.
overview statements
Security policies incorporate practices require by laws and standards
Security control provide more Let learns some terms from them
details
1. Laws - from healthcare
Procedures discuss specific 2. Standards - NIST - National Institute of Standards and Technology
implementation of policies 3. Best Practices - eg Microsoft will say if you are setting up a windows network these are the
things we do to provide security
Security policies are documents and they are documents that define how you will do the security
to your infra. for your organization.
These policy say all kinds of staff
A security control will be the one to say " we will have all systems using
windows server setup with a complex password rule set or on our Linux system
all system password will be a minimum of eight characters uppercase lower
case and numbers”.
Strategic change - is a massive change that is going to affect the business of the infra. it self eg. is
The change management team we are moving to a country, we are wiping out every computer in the company and replacing with
handles infra - level changes something else. we don't discus strategic change with the change manage committee, this is big
corporate kind of decision.
The change process includes
If we want to roll out a new software in a department or division of the company
request, types of changes, then we can discuss that at a committee level - so request is made to the committee by say an IT
configuration procedures, person who want to get a new antivirus, so to initiate what change we need
rollback and more A change document - so the change request will have the following
if it is a single point failure then we need to do something about it, so we need to get into the world of failover, if
something goes off the we have something to take over.
LESSONS POINTS
Failover means to have something ready to take over in case of failure.. DONT confuse this with backups
Create failover for redundancy
In n+ we talk about two failovers
One thing on N+ that we need to talk about is Virtual IP = IP address not assigned to a port somewhere. We
Use HSRP or VRRP for Router normally find this in clustering,( This can provide high availability) Basic take one server and mirror it to two other
redundancy servers. So l have two other servers which is constantly in contact with each other constantly updating each
other. so if my primary fails one of these servers can take over, and l don't need to change IP, which means we can
put a router in front of it and properbly use one to many NAT.
These protocol allows more than one router to work as a team or as cluster to make sure that one can failover
incase one does not work
Standard Business Documentation
There is a lot of documentation when it comes to networking
LESSONS POINTS Network plus covers four business documentation.
Smurf Attack - this is like DDoS attack but what it does is using a
bench of computers - it sends out a spoof source address. that is
a bunch of computers will have the target as the source
address so what will have is all the zombie computers will try to
respond to the source
Social Engineering
The form social engineering is the Dumpster Diving, you will be shock with the
amount of information
LESSONS POINTS people leave in their trash cans.
Social engineering comes in
Use a shredder to protect against dumpster diving
many forms
Shoulder Surfing
Shoulder Surfing is looking over shoulders to get passwords or PIN codes,
Shred documents to protect
walking up to unattended computer is also shoulder surfing
against dumpster diving
Ways to avoid Shoulder surfing -
Educating users protect against
1. Use a screen privacy filter they lay over the screen and reduce the view angle
surfing and phishing
substantially
LESSONS POINTS Our gateways routers are also our firewall - A firewall is a software that is define to
protect
Access Control is an important us from the evils of the internet.
part of network security
There are two kinds of firewalls we deal with
Stateless firewalls use pattern 1. Stateless Firewall
analysis and heuristics to 2. Statefull Firewall
decide which packets should
ne blocked Stateless firewall is to just turn them on, they are designed to look at packets coming
in and make decision on it so if it see ICMP packets coming it it may ignor it but when
Stateful firewalls examine each it see a lot is going to do something about it
packet to decide which packets
should be blocked Statefull firewall is looking for something to block or something to allow
Testing network security
The question how do you know your network is save? in most cases you dont know..
l know you have installed anti malware - when was the last time it was updated
l know your router has acls but don't you thing you have allowed a port that is not to be allowed?
LESSONS POINTS
Open ports ( ports are being open all the time and we don't know about it what we need to do
Open ports allow access into a is scan systems to look for open ports - these are vulnerabilities that need s to be checked
computer or device
We need a tool that is going to help us to that..
there a re software's out there that you can use to setup a honey pot
one is called honeybot
Mitigating Network Threats
1. Training and Awareness
LESSONS POINTS
2. Patch management - ( always update your softwares )
Implementing proper
mitigation techniques to 3. Policies and Procedures - (what you can and cannot do on my network)
protect your network
4. Incident Response - ( protecting your data )
Start with training and
awareness, as well as patch
management
LESSONS POINTS Firewalls filter traffic based on specific criteria ( IP and Ports ) but they can do
more than that
Firewalls filter traffic based on Where does firewalls leave - and they are place at the edge of the network.
specific criteria
Firewalls can inside our router or placed in separate box with the router
Firewalls can be network - Most routers are network firewalls our computers also have firewalls .
based or host based
Host-based software firewall on individual stations
Firewalls come in hardware Unified threat management (UTM) can be a firewall box but does a hole lot of
and software varieties staff, like malware scanners, proxy.