Sie sind auf Seite 1von 10

What are the Critical Concepts/Processes? 1.

Identification, categorization, and role of network components (peripheral, host, network device, media). 2. Servers are computer hosts that handle network resources and provide services to clients. Clients make requests and display information received from the server. 3. Advantages and disadvantages of peer-to-peer networking. 4. Construction and verification of a peer-to-peer network. 5. Difference between logical and physical topologies: a. Logical topologies show how devices communicate regardless of location and do not show the devices or media that interconnect them. b. Physical topologies show how the devices are actually connected including the devices between them. 1. That all communication has three components: message source (transmitter), channel (medium), and message destination (receiver). 2. Network messages are encapsulated in a frame, which acts like an envelope for carrying a message. 3. Communications between source, channel, and receiver must follow a set of rules, called a protocol, so that messages can be understood. 4. A protocol is a convention or standard that controls or enables the connection, communication, and data transfer between two computing endpoints. 5. Protocols define the message format, size, timing, encapsulation, encoding, and message pattern within a frame. 6. Common message patterns in computer communication are unicast, broadcast, and multicast messaging. 1. A local network is defined as an area in which all computers share a common protocol. The most common of these protocols is defined is the de facto standard developed by the IEEE, Ethernet. 2. Ethernet has continued to evolve and improve over time under the guidance of the IEEE with the primary changes being that of speed, cables and connecters, and maximum cable length. 3. The MAC address, contained on the NIC card, is used at the lowest physical networking level for hosts and networking devices to communicate. 4. Ethernet controls traffic only on its own network so computers on different networks cannot use their MAC address for communication. 5. Communication across an Ethernet network occurs in frames, also called Protocol Data Units (PDUs). 1. Networking devices installed at the Access Layer allow many users to connect into the network. 2. Hubs are not able to decode messages or determine which host should receive a message. They simply repeat the message to each host until one finally says, "Ive got it!" 3. Switches are able to decode a message frame to identify the source and destination hardware addresses, and uses this information to build a MAC address table as well as forward messages to specific hosts. 4. Collisions occur when two or more hosts attempt to send a message at the same time - hub collisions lead to retransmissions, slowing down the network. In a switch, the collision is isolated, and the effect on the overall network is minimized. 5. Address Resolution Protocol (ARP) is used to obtain the MAC address of a host using the logical IP address. Process by which routing table is constructed

Interpretation, evaluation, and assignment of IP addresses, Subnet mask, and Default Gateway Process the Router/Default Gateway uses to deliver messages outside the local network segment Routers connect networks with protocols that are similar Gateways can convert information from one protocol stack to another Intersection of Logical IP and MAC addresses for message delivery within local networks and routing process for delivering messages to the local network.

Good network design is the intersection of physical and environmental constraints, technical analysis, and business needs requiring a network designer to have strong research, technology, and people skills. Documentation of the as built network is essential for troubleshooting and maintenance.

1. Individual computers as well as independent computer networks connect to form the Internet. Telephone wires, fiber optic cables, wireless transmissions, and satellite links provide the backbone on which the Internet is built. 2. While no one organization "owns" the Internet, several organizations cooperate to establish technological standards that ensure interoperability and proliferation of the Internet. 3. Internet Service Providers (ISPs) are commercial or government organizations that provide Internet connection services to home and institutional users. ISPs connect to other ISPs to form the Internet 4. Users and ISPs connect at a Point of Presence (POP). 5. ISPs provide differing levels and types of services usually at a cost to subscribers. 1. Host and routing devices must be running Internet Protocol (IP) software for communication to occur on the Internet. 2. IP establishes an addressing scheme that enables routing through local and remote networks. 3. Data moves across the Internet in IP packets made up of routing information and data. 4. Network Operations Centers are the home base for all ISP servers. 5. RFC documents set out research, methodology, innovation, and information applicable to Internet technologies. 6. "Ping" and "traceroute" are utilities that allow network users and administrators to monitor connectivity. 1. The "Internet cloud" is a conceptual representation of the complex networks that enable the movement of information from origin host to destination host. 2. ISP's connect to home/small office users and other ISPs by utilizing multiple technologies with differing service levels. Differentiating these devices and their characteristics and capabilities is crucial in understanding how ISPs serve their customers. 3. In order to ensure the Internet operates effectively, ISPs must maintain an operational infrastructure that is safe, secure, and environmentally compatible with the technologies housed therein. 1. 2. 3. 4. Networking media (cables) usually fall into two categories: a. Metallic/Copper (twisted pair cable, coaxial cable) b. Fiber optic UTP, Coaxial, and Fiber Optic are the dominant media The relationship between data transmission quality and the medium used Differentiating shielded from unshielded twisted wire cable

5.

Differentiating single mode from multimode fiber optic cable

1. Cables and components used on a network must adhere to the standards required for that network, which specify types of cables to use in specific environments, conductor materials, pinouts, wire sizes (AWG), shielding, cable lengths, connector types and performance limits. 2. TIA/EIA defines two different wiring schemes called T568A and T568B for twisted pair cabling. 3. UTP cabling must be protected from EMI and RFI interference that come from high-voltage cables, fluorescent lighting, televisions, computer monitors, and microwaves. 4. Network cabling is terminated at PCs, patch panels, hubs, switches, routers, and wall mounts. The connection type determines the use of a straight-through or a cross-connect cable. 5. Improper termination and the use of low quality cables and connectors can degrade the signal carrying capacity of the cable. 6. Always follow the rules for cable termination and test to verify that the termination has been done properly. 7. All cable installations must be properly labeled and documented.

1. The IP address is a logical network address that identifies a particular host on a network. 2. Every packet sent across the Internet needs a source IP address and a destination IP address to ensure information gets to the destination and any replies are returned to the source. 3. At the equipment level, an IP address is a series of 32 binary bits (ones and zeros). 4. For humans, the 32 bits are grouped into four 8-bit bytes called octets and converted into a decimal number that is separated from the next octet with a period or decimal point. 5. IP addresses are hierarchical and consist of two parts, the network address, and the host address. 6. A subnet mask (also 32 bits) assigned to a network address, identifies the portion of the IP address that is the network and which part is the host. 7. When a host sends a packet, it compares its subnet mask to its own IP address and the destination IP address. If the network bits match, both the source and destination host are on the same network and the packet can be delivered locally. If they do not match, the sending host forwards the packet to the local router interface to be sent to the other network. 1. The IP address and subnet mask work together to determine which portion of the IP address represents the network address and which portion represents the host address. 2. The class of an address can be determined by the subnet mask or by the value of the first octet. 3. Hosts in an organization can use private addresses internally as long as the hosts do not connect directly to the Internet. 4. Network routers block private IP addresses from moving out to the public Internet. 5. Hosts use IP addresses to communicate one-to-one (unicast), one-to-many (multicast) or one-toall (broadcast). 6. A packet with a unicast destination address is intended for a specific host. 7. A broadcast packet contains a destination IP address with all ones (1s) in the host portion enabling all host on the network to receive and look at the packet 8. Devices that belong to a multicast group are assigned a destination IP packet multicast group while their source address is a unicast address. 1. Network administrators manually configure the network information for a host when static assignment is used. 2. Static IP addresses are most often used for printers, servers and other networking devices that need to be accessible to clients on the network.

3. Documentation on static IP assignments must be maintained. 4. When running DHCP a server assigns IP addresses, the subnet-mask, and the default gateway address. 5. IP addresses assigned under DHCP administration are temporary and reusable. 6. SOHO's usually receive DHCP assigned IP addresses from their ISP. 7. DHCP servers are manually assigned a set of IP addresses by a network administrator. 8. Hosts receive IP addresses utilizing DHCP Discover, Request, Offer, and Acknowledgement. 1. Routers provide a boundary that separates networks. 2. Each interface on a router can be connected to a separate local or external network. 3. The IP address assigned to a router interface identifies which local network is connected directly to it. 4. This default gateway address can be either statically configured on the host, or received dynamically by DHCP. 5. The default gateway is provided either statically or by DHCP. 6. Integrated Rourters can be configured as DHCP servers and provide their own internal IP address as the default gateway to internal DHCP clients. 7. NAT translates a private (local) source IP address to a public (global) address. 8. Packets destined for external networks are translated as they pass through the Integrated Router gateway, where the Integrated Router replaces the source host's private IP address with the Integrated Router's own public IP address. 9. Each host on the internal network has a unique private IP address and must share the single Internet routable address assigned to the Integrated Router. 10. Integrated Router's keep track of the individual source and destination IP addresses in each conversation by assigning ports to data packets as they move through the Integrated Router.

1. Internet applications rely upon interactions between servers and clients. 2. A server runs software that enables it to provide information or services to other hosts connected to the network. 3. Clients are responsible for requesting and acting upon information that is provided to them by a server. 4. Protocols and standards ensure compatibility of applications produced by different software providers. 5. The Hypertext Transfer Protocol (HTTP) governs the way that a web server and a web client interact. 6. Transmission Control Protocol (TCP) manages the individual conversations between web servers and web clients. 7. Internet Protocol (IP) is responsible for routing packets to the destination host. 8. Ethernet is the most common Network Access Protocol implemented on local networks. 9. Common Internet services use the Internet Protocol (IP) to address and route messages between source and destination hosts. 10. The two most common transport protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). 11. A sending host uses TCP when the application requires acknowledgment. 12. UDP is a "best effort" delivery system that does not require acknowledgment of receipt. 13. Protocols and services requested are identified by a port number, which is a numeric identifier in a packet that is used to keep track of specific conversations and destination services requested. 14. A port is a special number present in the header of a data packet. 15. Ports map data to a particular process running on a computer.

1. The Domain Name Service (DNS) provides a way for hosts to locate servers on the Internet, by associating a name with an IP address. These associations are registered and organized within domains. 2. DNS servers maintain tables for matching domain names to IP addresses. 3. Internet Protocol is the most common standard for DNS. 4. Web requests use Hyper Text Transfer Protocol (HTTP). 5. Client based applications, called browsers, interpret Hyper Text Markup Language (HTML). 6. The File Transfer Protocol (FTP) provides an easy and efficient method to move files from between computers. 7. FTP clients come built into the OS or may be downloaded as standalone applications. 8. Email servers receive, store, and forward email messages to and from clients. 9. Simple Mail Transport Protocol SMTP, POP3, and IMAP store and deliver mail for clients using different ports. 10. Instant Messaging (IM) software runs locally on a computer and allows users to communicate or chat over the Internet in real-time. 11. Voice over Internet Protocol (VoIP) enables digitized voice data. transportation over the Internet. 12. The role of ports in client/server communication. 13. Active network connections, also called sockets, can be viewed with use of client based OS tools. (MS XP Netstat) 1. Communication between hosts requires the interaction of many different protocols. 2. Protocols are implemented in software and hardware that are loaded on each host and network device. 3. Protocol interactions can be modeled as a set of hierarchically layered and stacked activities representing the movement and delivery of data across a network. 4. The benefits of using the layered model include: - Assistance in protocol design - The fostering of competition - One layer does not affect other layers above and below. - Provides a common language to describe networking functions and capabilities. 5. When sending messages the protocol stack on a host operates from top to bottom. 6. When receiving messages on a network, the protocol stack on a host operates from bottom to top. 7. The OSI Model was created for developers as architecture to follow in the design protocols for network communications. 8. The OSI model includes all functions, or tasks, associated with Internetworking communications, not just those related to the TCP/IP protocols. 9. The Ethernet frame encapsulates the TCP Segment and the IP packet.

What are the Critical Concepts/Processes? 1. 2. 3. 4. 5. 6. 7. 8. 9. Electromagnetic radiation Frequency as the differentiator along the Electromagnetic Spectrum Hertz as the measurement of frequency Industrial, Scientific and Medical (ISM) bands enable wireless networking Bluetooth as a technology that provides one to many communications using RF Encryption and authentication as security strategies for wireless networks Data speed, reliability, and interference associated with wireless networks Impact of the environment on the performance of wireless technologies Understanding boundaries with wireless technologies

1. The main organization responsible for the creation of wireless technical standards is the IEEE. 2. The IEEE 802.11 standard governs the WLAN environment with current amendments 802.11a, 802.11b, 802.11g, and 802.11n in effect. 3. The Wi-Fi Alliance is responsible for testing wireless LAN devices from different manufacturers. 4. IEEE WLAN standards define frequency, data rate, and maximum range of signal. 5. All components within a WLAN must adhere to the same standard, or at least be compatible with the standard. 6. Antennas are classified based on the way they output the signal, either directional or omnidirectional. 7. The SSID, a 32-character, case-sensitive, alphanumeric string is used to tell wireless devices which WLAN they belong to and with which other devices they can communicate. 8. Peer-to-Peer wireless networks work with no AP's and STA set to Ad Hoc mode, while larger networks require an AP with a setting of Infrastructure mode on all devices within the network. 9. In order to allow movement between the cells without the loss of signal, BSS's must overlap by approximately 10%. 10. Multiple BSS's make up an ESS via a distribution channel. 11. Conversations among wireless clients in a BSS or ESS must be controlled by the use of channels that can be set manually or automatically on an AP. 12. Wireless technology uses CSMA/CA to create a reservation on a channel for use by a specific conversation. 13. In order for a STA to connect to the WLAN, the APs SSID, security settings, and channel information (if manually set) must match that of the client software that manages the client connection. 14. The wireless client software used can be software integrated into the device operating system, or can be a stand-alone wireless utility software designed to interact with the wireless NIC. 1. Vulnerability in wireless networking requires special security features and implementation methods to help protect your WLAN from attacks. 2. When the SSID function is turned off the presence of a network is no longer made public. 3. Access to a wireless network can be controlled by filtering MAC addresses. 4. Authentication is the process of permitting entry to a network based on a set of credentials. 5. Under open authentication, wireless devices do not require authentication and clients are able to associate regardless of who they are. 6. Pre-Shared keys (PSK) require that both the AP and client be configured with the same key or secret word. 7. Extensible Authentication Protocol (EAP), a backend server functions separately from the AP and maintains a database of valid users that can access the network. 8. Wired Equivalency Protocol (WEP) is an advanced security feature that encrypts network traffic as it travels through the air using pre-configured keys to encrypt and decrypt data. 9. WPA uses encryption keys from 64 bits up to 256 bits, and generates new, dynamic keys each time a client establishes a connection with the AP. 10. Traffic filtering blocks undesirable traffic from entering or leaving the wireless network. 1. The planning process for a wireless network includes determining the type of wireless standard to use, the most efficient layout of devices, an installation and security plan and a strategy for backing up and updating the firmware of the wireless devices. 2. A site survey is needed to determine the optimum number and location of AP's to provide the appropriate coverage at the least amount of cost. 3. It is necessary to consider known sources of interference such as high-voltage wires, motors and other wireless devices when determining the placement of WLAN equipment. 4. As new features are developed for the Integrated Router or problems with the existing firmware are discovered, it may become necessary to update the firmware on the device.

What are the Critical Concepts/Processes? 1. Network security breaches can result in costly network outages and loss of work. 2. Hackers access networks through software vulnerabilities, hardware attacks, or through individual weakness, such as learning someones username/password. 3. Hacker threats can be categorized in one of four ways: a. Information theft b. Identity theft c. Data loss / manipulation d. Disruption of service 4. Security threats can come from both internal and external sources. 5. External threats usually come through the Internet. 6. Internal threats usually come from organizational employees or other network users. 7. Social Engineering is one of the most common ways unauthorized users access networks using one of three methods: a. Pretexting b. Phishing c. Vhishing 1. A network virus is a program or code that changes or damages system or application files. 2. Worms are fast spreading programs usually attached to email messages. 3. A Trojan Horse is embedded code disguised as a legitimate program. 4. DoS attacks are the use of legitimate network tools to attack a network (examples include ping and packet flooding). 5. DDoS is a security breach wherein many points on a network are targeted by packet flooding techniques. 6. Brute Force attacks are a strategy for attacking a network by flooding login functionality with invalid passwords or other encrypted code. 7. Spyware is a tool for gathering personal information from a computer without the users permission. 8. Cookies are a form of spyware that, while useful for certain applications, often places networks at risk. 9. Adware are user-tracking programs that provide advertisers with data about user behavior. 10. Pop-ups are unsolicited advertising placed without permission in the browser application. 11. Spam is unsolicited email-based advertising that threatens to overload networks. 1. Network security comes from a combination of products and services, combined with a thorough security policy and a commitment to adhere to that policy. 2. A security policy is a formal statement of the rules that users must adhere to when accessing technology and information assets. 3. Security procedures implement security policies. 4. Security procedures can range from simple, inexpensive tasks such as maintaining up-to-date software releases, to complex implementations of firewalls and intrusion detection systems. 5. Key tools that support network security include: a. Patches and updates b. Virus protection c. Spyware protection d. Spam blockers e. Pop-up blockers f. Firewalls 6. Recognizing the signs of a virus attack on a network can help prevent damage and data loss. 1. A firewall resides between two or more networks and controls the traffic between them as well as helps prevent unauthorized access. 2. Packet filtering is a way to deny or allow access to packets based on MAC and IP addresses.

3. Application/Web Site filtering denies or allows access based on application, keyword, or URL addresses. 4. Stateful Packet Inspection is a tool for filtering unsolicited packets. 5. Network Address Translation is a scheme to protect internal network addresses from external users. 6. Firewalls are implemented between the internal network (intranet) and the Internet. 7. A demilitarized zone, or extranet is an area of a network that is accessible to both internal and external user. 8. Single firewall configurations use three separate interfaces on a single router, with one interface for the external network, one for the internal network, and one for the DMZ network. 9. Two firewall configurations use two routers to separate internal and external firewall with the DMZ located between them. 10. Integrated Router's and other home networking devices frequently support DMZ and often include Network Address Translation (NAT), Stateful Packet Inspection (SPI) and IP, Application and web site filtering capabilities. 11. Vulnerability analysis tools, known as security scanners, test host and network security. 12. Recommended practices to help mitigate the risks to networks include: a. Define security policies b. Physically secure servers and network equipment c. Set login and file access permissions d. Update OS and applications e. Change permissive default settings f. Run anti-virus and anti-spyware g. Update antivirus software files h. Activate browser tools - Popup stoppers, anti-phishing, plug-in monitors i. Use a firewall

1. Troubleshooting is the process of identifying, locating, and correcting problems that occur. 2. Troubleshooting requires proper documentation that records the problem encountered, steps taken to determine the cause, and steps taken to correct the problem. 3. Documentation is used for future problem solving. 4. The first step in troubleshooting is to confirm that the problem exists. 5. Information about the problem should be gathered from users, documentation sources, or with network monitoring tools. 6. Structured troubleshooting techniques include top-down, bottom-up, and divide and conquer. 7. Structured techniques follow a hierarchical, layered approach like the OSI model from the Physical layer to the Application layer. 8. Trial and error techniques rely on the knowledge and experience of the administrator. 9. Substitution techniques require the use of spare functional equipment. 1. The human senses provide first line notice of network troubles. 2. Software utilities provide advanced diagnostic information about network problems. 3. Ipconfig is a tool for determining proper network configurations. 4. Ping as a test for network connectivity. 5. Tracert is a utility for determining where a packet is lost or delayed. 6. Netstat is a utility for identifying unexplained TCP connections that may threaten a network. 7. Nslookup as a troubleshooting tool for determining if the DNS server is performing name resolution as expected. 1. When troubleshooting a network with both wired and wireless connections, troubleshoot using a

divide and conquer technique to isolate the problem to either the wired or wireless network. Following a structured model is a necessity. 2. The ping utility helps isolate connectivity problem between wireless and wired network sectors. 3. Examining the LEDs is one of the first steps in troubleshooting network devices. 4. Three types of LEDs are usually found on devices: power, status, and activity. 5. Inactive LEDs may be an indication of a device failure, port failure, or physical layering problem. 6. If the wired client is unable to connect to the Integrated Router, one of the first things to check is the physical connectivity and cabling. 7. Cabling should be inspected for proper type, termination, length of run, and ports connections. 8. Many factors affect the ability to connect hosts using RF devices including: a. Incompatible standards b. Channel conflicts c. Signal strength d. Interference e. Shared traffic 9. Incorrectly configured settings affect wireless networks. 10. An incorrect IP configuration can have a major impact on the ability for a host to connect to the network. 11. When hosts on the wired and wireless local network can connect to the Integrated Router and with other hosts on the local network, but not to the Internet, the issue may be in the connection between the Integrated Router and the ISP. 1. Network documentation should include a normal or baseline measurement of network performance against which potential problems can be judged. 2. Documentation should include topology maps, network diagrams, and addressing schemes. 3. Documentation should be maintained during the troubleshooting process. 4. Good troubleshooting documentation should include: a. Initial problem b. Steps taken to isolate the problem c. Results of all steps taken, both successful and unsuccessful d. Final determined cause of the problem e. Final problem resolution f. Preventative measures 5. Additional troubleshooting help includes a. Previously kept documentation, if the problem has happened before. b. Online Frequently Asked Questions (FAQ) c. Colleagues and other network professionals d. Internet forums 6. A help desk might be the users first stop for assistance.

Das könnte Ihnen auch gefallen