Network+ (N10-008)

Section 2: Network Basics

3. Network Basics (OBJ. 1.2)

  • Networks - are used to make connections between machines

  • e.g. Connection of smartwatch to smartphone is a network - called PAN

  • All networks have started to become Converged Network

  • Personal Area Network (PAN) - network that has small distance

  • Converged Network - all data (voice, video and data) transmits in one single line

  • 5 nines of availability (99.999%) - isn't 100% uptime, but close and reliable

  • Kinds of Network Traffic

    • File Sharing

    • Video Chatting

    • Surfing the Web

    • Social Media

    • Streaming Video

    • Email

    • Voice over IP

  • In this section we are covering the topics:

    • Network Components

    • Network Resources

    • Network Geography

    • Network Topologies

    • Internet of Things (IoT)

4. Network Components (OBJ. 2.1)

  • Network Components

    • Client

    • Server

    • Wireless Access Points

    • Hub

    • Switch

    • Router

    • WAN Link

    • Media

  • Client - a device used by an end-user to access and connects the network

    • Workstation, laptop, tablet, phone, smart TV or other terminal device

  • Server - a device that provides resources to the rest of network and provides different functions, also a dedicated hardware and specialized software

    • Email server, file server, chat server, print server

  • Hub - older technology that connects network devices together, it can lead to network errors

  • Hubs receives information and rebroadcasts it, this is a problem if you have many hubs

  • Wireless Access Points (WAP) - device that allows wireless devices to connect into a wired network, also it is a wireless hub

  • Switch - device that connects network devices together (like a next generation/smart hub), sends info on a specific port

  • Router - connects 2 different networks together and forwards traffics to and from a network, modern routers rely on IP address

  • Media - connects 2 devices or a device to a switch port

    • Copper Cable, Fiber optic cable, Radio waves

  • Wide Area Network (WAN) Link - physically connects 2 geographically dispersed networks

    • DSL Line, Cellular, Satellite, Microwave

5. Network Resources (OBJ. 1.2)

  • Network Resources - how is data moved around the network

  • Models of Network Resources

    • Client/Server Model

    • Peer-to-Peer Model

  • Client/Server Model - uses dedicated server to provide access to files, scanners, printers and other resources, administration and backup are easier because of 1 centralized server

Benefits of Client/Server Model

  • Centralized administration - 1 server only

  • Easier Management - 1 server only

  • Better Scalability - expanding outward is easy

Drawback of Client/Server Model

  • Higher costs - require more money because its dedicated

  • Requires specialized OS - specialized skillset

  • Requires dedicated resources

  • Peer-to-Peer Model - peers share resources (files/printers) directly with others, administration and backup is difficult because it is located on different machines

  • Napster - uses Peer-to-Peer Model to share files back in the day

Benefits of Peer-to-Peer Model

  • Low costs

  • No dedicated resources

  • No specialized OS

Drawback of Peer-to-Peer Model

  • Decentralized management - everyone control what they sharing

  • Inefficient for larger networks

  • Poor scalability

6. Network Geography (OBJ. 1.2)

  • Network Geography - about distance

  • Personal Area Network (PAN) - smallest type of wired or wireless network and covers the least amount of area, 10 ft. or less

    • Bluetooth, USB connections

  • Local Area Network (LAN) - connects components within a limited distance, few hundred ft

    • Office building, small office, school, house

  • Ethernet - IEEE 802.3

  • Wi-Fi - IEEE 802.11

  • Campus Area Network (CAN) - connects LANs that are building-centric across a university, industrial park, or business park, also spread across buildings in an area, few miles

  • Metropolitan Area Network (MAN) - connects scattered locations across city or metro area, up to 25 miles

    • buildings scattered in 1 city, police department

  • Wide Area Network (WAN) - connects geographically disparate internal networks and consists of leased lines or VPNs

    • Worldwide coverage, State, Country, World, Internet, LAN to LAN

Network Geography

8. Wired Network Topology (OBJ. 1.2)

  • Physical Topology - how devices connected physically by media, focused on physical layout of the cabling

  • Logical Topology - how devices connected logically, focused on network flow

  • Types of Topology

    • Bus Topology - uses a single cable where each device taps into by using etheir a vampire tap or a T-connector

Bus Topology
  • Ring Topology - uses a cable running in a circular loop where each device connects the ring but data travels in a singular direction, no redundancy

  • Token Ring - uses an electronic token to prevent collisions when communicating on the network, eliminate collisions around a network

Think of a kids sitting on circle listening to their teacher, the teacher will then give stick to 1 kid to speak and pass the stick to another to speak

  • Fiber Distributed Data Interface (FDDI ring) - use to counter-rotating rings for redundancy, clockwise and counter-clockwise direction

Modern ring networks are usually FDDI network

Ring == Redundancy

Ring Topology
  • Star Topology - most popular physical LAN topology where devices connect to a single point, all underlying machines are talking to a central point

If a central device fails, the entire network fails and in star topology you will have a single point of failure

Star Topology
  • Hub-and-Spoke Topology - similar to star but with WAN links instead of LAN connections and it is used for connecting multiple sites

Think of an airline hub is in the city and then you will have to hop from 1 city to another called spoke, if central offices fails, the network will fail also

  • Full-Mesh Topology - optimal routing is always available as every node connects to every other node, it has full redundancy

Formula for cable connection on machine:

x = n(n-1)/2

if we have 6 machines,

x = 6(6-1)/2

x = 15 connections

Full-Mesh Topology
  • Partial Mesh Topology - hybrid of the full-mesh and the hub-and-spoke topologies, using this will result into optimal routing

9. Wireless Network Topology (OBJ. 1.2)

  • Modes of Wireless Networks

    • Infrastructure Mode - uses a wireless access point as a central point and supports wireless security controls

    • Ad Hoc Mode - decentralized wireless network which create P2P connections and does not require a router or access point

    • Wireless Mesh - interconnection of different types of nodes, devices, or radios, redundant and reliable connection

  • Infrastructure Mode - you connect to outside provider to use internet

  • Ad Hoc Mode - no central point, you connect your laptop to another laptop

10. Internet of Things (IoT) (OBJ. 1.2)

  • Internet of Things (IoT) - all devices that connects to internet

    • 802.11 (Wi-Fi) - wireless networks that can operate infrastructure or ad hoc modes

    • Bluetooth - low-energy use variant of Bluetooth which allows for a mesh network

    • Radio Frequency Identification (R FID) - uses electromagnetic fields to read data stored in embedded tags

    • Near Field Communication - enables two devices to communicate within a 4cm range

    • Infrared (IR) - operates with line of sight

    • Z-Wave - provides short range, low-latency data transfer with slower rates and less power consumption that WI-FI, lower speed

    • ANT+ - collection and transfer of sensory data

Z-Wave == used for home automation

ANt+ == anything with a sensor

Quiz 1: Networking Basics

Section 3: OSI Model

11. OSI Model Overview (OBJ. 1.1)

  • Open System Interconnection (OSI) Model - 1977 by ISO, ISO 7498, OSI Stack

    • serves as a reference model, used to compare layer and how to troubleshoot a specific problem

OSI Model
Information every layer

12. Layer 1 (Physical Layer) (OBJ. 1.1)

  • Physical Layer - transmission of bits across the network occurs and includes physical and electrical network characteristics

  • Bits - binary digits, series of 1s and 0s, basic building blocks of our data

    • Electrical cables

      • 0V - 0

      • -5V or +5V - 1

    • Fiber cables

      • light on - 1

      • light off - 0

  • Transition Modulation - If it changes during clock cycle, 1 is represented otherwise 0

How cables are wired?

  • RJ45 connector - used to connect to computer or a switch

    • TIA/EIA-568A

    • TIA/EIA-568B

Cross-over cable
Straight through/Patch cable

How are cables connected?

  • Topologies - Bus, Star, Ring, Hub-and-Spoke, Full-Mesh, Partial-Mesh

How is communication synchronized?

  • Synchronous - uses a reference clock (common time source) to coordinate the transmissions by both sender and receiver

    • e.g. call, same place and the same time , real time

  • Asynchronous - uses start and stop bits to indicate when transmissions occur from the sender to receiver

    • e.g. voicemail, you leave a message then they don't answer and they can view it later, out of sync/time

How is bandwidth utilized?

  • Broadband - divides bandwidth into separate channels

  • Baseband - uses all available frequencies on a medium (cable) to transmit a data, uses a reference clock

How can we get more out of a limited network?

  • Multiplexing - getting more out of a limited network, using a baseband at the same time

  • Time-Division Multiplexing (TDM) - Each session takes a turn, using time slots, to share the medium between all users

  • Statistical Time-Division Multiplexing (StatTDM) - Dynamically allocates the time slots on an as-needed basis

  • Frequency-Division Multiplexing (FDM) - divides the medium into channels based on frequencies and each session is transmitted over a different channel

Physical Devices Example

  • Physical Devices - repeaters, only repeats what they being told, no intelligence, dumb

  • Cable

    • Copper

    • Fiber

    • Coaxial

  • Wireless Devices

    • Bluetooth

    • Wi-Fi

    • NFC

  • Infrastructure Devices

    • Hubs

    • Access Points

    • Media Converters

  • Data Link Layer - Packages data into frames and transmits those frames on a network

  • Media Access Control (MAC) - physical addressing system of a device which operates on logical topology

Uses a 48-bit address assigned to a network interface card (NIC)

e.g. D2:51:F1:3A:34:65

  • Who made that NIC (vendor code)

  • Unique Value

Layer 2 devices view network logically

  • Logical Link Control (LLC) - provides connection services and allows acknowledgement of receipt of messages, basic form of flow, provides basic error control functions

    • if last bit is even (0) = communication is good

    • if last bit is odd (1) = communication is not good

How communication is synchronized?

  • Isochronous mode - network devices uses a common reference clock source and create time slots for transmission

  • Synchronous mode - network devices agree on clocking method to indicate beginning and end of frames and can use control characters, how many beats in a measure

  • Asynchronous mode - network devices reference their own internal clocks and use start and stop bits

  • NIC

  • Bridges

  • Switches - intelligent

14. Layer 3 (Network Layer) (OBJ. 1.1)

  • Network Layer - forwards traffic (routing) with logical address

    • Logical Addressing

      • Common Protocols

        • Internet Protocol (IP)

          • IPv4

          • IPv6

      Dotted octet notation - 172.168.1.1

    • Layer 3 Switching (Routing)

      • How should data be forwarded or routed?

        • Packet switching - data is divided into packets and forwarded

        • Circuit switching - dedicated communication link is established between 2 devices

        • Message switching - data is divided into messages which may be stored and then forwarded

    • Route Discovery and Selection - manually configured as a static route or dynamically through a routing protocol, how data flow

    • Bandwidth usage

    • Connection services - augment layer 2 connection services to improve reliability

      • Flow control - barrier, stopping the flow of much messages

      • Packet reordering - divided data into packets and then send randomly to receiver and then fixes the order of packet

    • Multiplexing strategy

  • Internet Control Message Protocol (ICMP) - send error messages and operational operation to an IP destination

    • ping command

    • traceroute command - to know what routes are up and down

Layer 3 Devices Example

  • Router

  • Multi-layer switches - router and a switch

Common Protocols

  • IPv4, IPv6

  • ICMP

15. Layer 4 (Transport Layer) (OBJ. 1.1)

  • Transport Layer - dividing layer of upper and lower layer of OSI model

  • Segments - data in transport layer

  • Common Protocols

    • Transmission Control Protocol (TCP) - connection-oriented protocol that is reliable way to transport segments across the network, always get an acknowledgement

      • Three-way handshake - establishes connection

        Three-way handshake
    • User Datagram Protocol (UDP) - Connectionless protocol that is unreliable way to transport segments across the network

      • if drop, user is unaware

      • good for audio and video streaming

If you are using UDP, this is not about segments and it is all about datagram.

TCP vs UDP
  • Windowing - allows client to adjust amount of data in each segment, data flow control

    • speeds up and slows down to keep up

    • send less data with increased retransmissions

    • send more data with decreased retransmissions

  • Buffering - devices allocate memory to store segments if bandwidth isn't readily available

    • store for the mean time and then spit out the information when they are available

Layer 4 Devices Example

  • TCP

  • UDP

  • WAN Accelerators

  • Load Balancers

  • Firewalls

16. Layer 5 (Session Layer) (OBJ. 1.1)

  • Session Layer - keeps conversations separate to prevent intermingling of data

  • Steps of a session

    • Set up - checking of user credentials and assigning numbers to sessions to identify them

    • Maintain - maintain the session over and over again

      • Transfer data

      • Re-establish connection - maintaining

      • Acknowledgement of receipt - confirmation of data

    • Tear down - ending of a session after the transfer is done or when the other party disconnects

  • Layer 5 Devices Example

    • H.323/H.264 - setup, maintain and tear down voice and video connections, over RTP, used in YouTube, Skype and other teleconference apps

    • NetBIOS - used to share files over a network

17. Layer 6 (Presentation Layer) (OBJ. 1.1)

  • Presentation Layer - formats the data to be exchanged and secures that data with proper encryption

  • Data Formatting - data is formatted to have compatibility among devices

    • ASCII - text, says that A = 65, ensures data is readable by the receiving system, provide proper structures

    • GIF - pictures with motion

    • JPEG - photo

    • PNG - images in internet

  • Encryption - used to scramble the data in transit to keep it secure from prying eyes and provide data confidentiality

    • Transport Layer Security (TLS) - used to secure data in computer to web, creates an encrypted tunnel

Layer 6 Devices Example

  • Scripting Languages

  • Standard Text

  • Pictures

  • Movie Files

  • Encryption algorithms

    • TLS

    • SSL

18. Layer 7 (Application Layer) (OBJ. 1.1)

  • Application Layer - provides application-level services where users communicate with the computer

  • Application Services - unites communicating components from more than one network application

    • Network Management

    • File Transfer

    • File Sharing

    • Remote Access

    • Client Server Processes

    • Email

      • POP3

      • SMTP

      • IMAP

  • Service Advertisements - sending out of announcements to other devices on the network to state the services they offer

    • device advertises itself to be used by users

Layer 7 Devices Example

  • Email Applications

    • POP3

    • IMAP

    • SMTP

  • Web browsing

    • HTTP/s

  • Domain Name Service

    • DNS

  • File Transfer Protocol

    • FTP/s

    • SFTP

  • Remote Access

    • SNMP

    • SSH

    • Telnet

20. Encapsulation and Decapsulation (OBJ. 1.1)

  • Encapsulation - process of putting headers (and trailers) around some data

  • De-encapsulation - removing encapsulation

Encapsulation - Layer 7 - 1

De-encapsulation - Layer 1 - 7

  • Protocol Data Unit (PDU) - single unit of information transmitted in a computer network

    • L7 PDU - Layer and PDU

    How they pass data

  • TCP Header - used in TCP, has 20 bytes

    • Sequence and Acknowledgement Number - ensures all the data is received

    • TCP Flags

      • SYN (Synchronization) - used to synchronize connection during three-way handshake

      • ACK (Acknowledgement) - used in three-way handshake, but also need to acknowledge the successful receipt of packets

      • FIN (Finished) - used to tear down virtual connections created using three-way handshake and the SYN flag

      • RST (Reset) - used when client or server receives a packet that is not expecting during a connection, rejecting request

      • PSH (Push) - used to ensure data is given priority and is processed at the sending or receiving ends

      • URG (Urgent) - similar to PSH and identifies incoming data as urgent, process it immediately

TCP Header
  • UDP Header - used in UDP, has 8 bytes

UDP Header
  • IP Header - used in IP

IP Header
  • Ethernet Header - used in layer 2

  • MAC Address - is a physical address used to identify a network card in a local network

A frame being sent in Layer 2 will also contain payload, minimum 42 bytes using VLANs, 46 bytes without VLANs

Ethernet Header
Frames

Quiz 2: OSI Model

Section 4: TCP/IP Model

21. TCP/IP Model (OBJ. 1.1)

Most modern computer networks are TCP/IP-based

OSI vs IP
  • Network Interface Layer - electrical and physical characteristics, transferring bits, what medium (cable)

  • Internet Layer - where data is taken and packaged into IP diagrams, connect to internet

    • IP

    • ICMP

    • ARP

    • Reverse ARP

  • Transport Layer - Defines the level of service and the status of the connection being used by TCP, UDP, RTP

    • TCP - connection full

    • UDP - connectionless

    • RTP - real-time

  • Application Layer - dictates how programs are going to interface with the transport layer by conducting session management

    • HTTP

    • Telnet

    • FTP

    • SSH

    • SNMP

    • DNS

    • SMTP

    • SSL/TLS

22. Data Transfer Over Networks (OBJ. 1.1)

  • Port - where data go, logical opening on a system representing a service or application that is listening and waiting for traffic, 0 - 65,535

  • Well-known/Reserved Ports - 0 - 1023

    • FTP - 21

    • HTTP - 80

    • SMTP - 25

  • Ephemeral Ports - 1024 - 65,535

Representation
  • IPv4 packet - consists of source address, destination address, IP flags and protocol

Packet

23. Ports and Protocols (OBJ. 1.5)

  • File Transfer Protocol (FTP)

    • Port 20, 21

    • Provides insecure file transfers, clear no encryption

  • Secure Shell (SSH)

    • Port 22

    • Provides secure remote control machine using text-based environment, safe and encrypted

  • Secure File Transfer Protocol (SFTP)

    • Port 22

    • Provides secure file transfers, encrypted, using SSH to do file transfer

  • Telnet

    • Port 23

    • Provides insecure remote control using text-based environment, no encryption

  • Simple Mail Transfer Protocol (SMTP)

    • Port 25

    • Provides the ability to send emails over network

  • Domain Name Service (DNS)

    • Port 53

    • Converts domain names to IP address, and IP addresses to names

  • Dynamic Host Control Protocol (DHCP)

    • Port 67, 68

    • Automatically provides network parameters to your clients, such as assigned IP address, subnet mast, default gateway, and the DNS server should they use

  • Trivial File Transfer Protocol (TFTP)

    • Port 69

    • Used for lightweight file transfer method for sending configuration files or network booting of an operating system, stripped version of FTP

  • Hypertext Transfer Protocol (HTTP)

    • Port 80

    • Used for insecure web browsing

  • Post Office Protocol Version 3 (POP3)

    • Port 110

    • Used for receiving incoming emails, uses store and forward communication

  • Network Time Protocol (NTP)

    • Port 123

    • Used to keep accurate time to clients on a network

  • Network Basic Input/Output System (NetBIOS)

    • Port 139

    • Used for file or printer sharing in a Windows network

  • Internet Mail Application Protocol (IMAP)

    • Port 143

    • A newer method of retrieving incoming emails which improves upon the older POP3, keeps synchronized to all of devices

  • Simple Network Management Protocol (SNMP)

    • Port 161, 162

    • Used to collect data about network devices and monitor their status

  • Lightweight Directory Access Protocol (LDAP)

    • Port 389

    • Used to provide directory services to your network, Active Directory in Windows, can store user and groups

  • Hypertext Transfer Protocol - Secure (HTTPS)

    • Port 443

    • Used for secure browsing, using secure tunnel (Secure Socket Layer (SSL) - older / Transport Layer Security (TLS) - newer)

  • Server Message Block (SMB)

    • Port 445

    • Used for Windows file and printer sharing services

  • System Logging (Syslog)

    • Port 514

    • Used to send logging data back to a centralized server

  • Simple Mail Transfer Protocol Transport Layer Security (SMTP TLS)

    • Port 587

    • Secure and encrypted way of sending emails

  • Lightweight Directory Access Protocol - Secure (LDAPS)

    • Port 636

    • Provides secure directory services

  • Internet Message Access Protocol over SSL (IMAP over SSL)

    • Port 993

    • Secure and encrypted way to receive emails

  • Post Office Protocol Version 3 over SSL (POP3 over SSL)

    • Port 995

    • Secure and encrypted way to receive emails

  • Structured Query Language Protocol (SQL)

    • Port 1433

    • Used for communication from a client and a database engine

  • SQLnet Protocol - Oracle

    • Port 1521

    • Used for communication from a client to an Oracle database

  • MySQL

    • Port 3306

    • Used for communication from a client to the MySQL database engine

  • Remote Desktop Protocol (RDP)

    • Port 3389

    • Provides graphical remote control of another client or server, full GUI

  • Session Initiation Protocol (SIP)

    • Port 5060, 5061

    • Used to initiate VoIP and video calls

24. Finding Open Ports (OBJ. 5.3)

  • Nmap (Network Mapper) - command line that maps the network

    • used by network technicians and security professionals

Last updated