Get the latest AI workflows to boost your productivity and business performance, delivered weekly by expert consultants. Enjoy step-by-step guides, weekly Q&A sessions, and full access to our AI workflow archive.
Summary
This comprehensive video course by PowerCert Animated Videos covers a myriad of topics related to networking, offering foundational insights into network communication structures, configurations, and protocols. It discusses the different types of network topologies, such as star, bus, ring, mesh, and hybrid topologies, highlighting their advantages and disadvantages. The course also delves into various networking devices, including routers, switches, and firewalls, and details the different types of cabling used in networking. Additionally, it explains important networking protocols such as TCP/IP, FTP, and secure protocols like HTTPS and VPNs. The course provides a detailed overview of cloud computing, virtualization, and storage solutions, making it a valuable resource for those pursuing the CompTIA Network+ certification. Finally, practical insights into network troubleshooting and maintenance are shared.
Highlights
The video delves into network topologies, comparing the unique benefits and drawbacks of each type. π
It provides detailed explanations of networking devices including routers and switches, emphasizing their roles in data routing and network security. π‘
Explore key networking protocols like TCP/IP and HTTPS to understand their significance in secure data transmission. π
The course covers modern networking trends like virtualization and cloud computing, demonstrating their impact on resource management. π
Gain practical insights into network troubleshooting, ensuring smooth and efficient network operations. π οΈ
Key Takeaways
Understanding different network topologies - star, bus, ring, mesh, and hybrid - is crucial for network design and troubleshooting. πΈοΈ
Routers, switches, and firewalls play key roles in managing and securing networks. π
TCP/IP, FTP, HTTPS, and VPNs are essential protocols for network communication and security. π
Virtualization and cloud computing are revolutionizing the way networks operate and manage resources. βοΈ
Practical skills in network troubleshooting and maintenance are vital for network administrators. π οΈ
Overview
The video begins with an exploration of different network topologies, illustrating how each structure facilitates communication between devices and manages data flow efficiently. Topologies like star, ring, and mesh are discussed with their individual strengths and weaknesses, providing viewers with a solid understanding of network designs suitable for different environments.
Following this, the course transitions into a detailed examination of networking devices and protocols. Critical devices such as routers, switches, and firewalls are discussed along with protocols like TCP/IP, FTP, and secure variants like HTTPS. This section serves to equip viewers with knowledge about how these elements work together to maintain efficient and secure networks.
The latter part of the course focuses on modern concepts in networking, including virtualization and cloud computing. These innovations are shown to drastically alter how network resources are utilized and managed. Additionally, the course provides practical guidance on troubleshooting and maintenance to help aspiring network professionals keep their systems running smoothly.
Chapters
00:00 - 00:30: Introduction to Network Topologies The chapter discusses network topologies and defines topology as the layout of how a network communicates with various devices. It highlights the star topology as the most common one, where all computers connect to a central point like a hub or switch, ensuring all data passes through this central point.
00:30 - 01:00: Star, Bus, and Ring Topologies The chapter discusses Star, Bus, and Ring network topologies, focusing particularly on the star topology. One of its primary advantages is that a failure in one computer or a cable break does not affect the other computers as each one is independently connected via its own cable. However, it highlights a key disadvantage: if the central hub or switch fails, all connected computers will be impacted by the failure.
01:00 - 01:30: Mesh and Hybrid Topologies The chapter discusses the concept of a 'single point of failure' in network topologies, highlighting the bus topology as an example. It describes how in a bus topology, all computers and network devices are connected to a single cable or backbone. This creates a vulnerability because if the cable fails, the entire network goes down. The bus topology is considered outdated and is not commonly used today.
01:30 - 02:00: Point-to-Point and Client Server Topologies The chapter discusses networking concepts focusing on point-to-point and client-server topologies. It describes the use of coaxial cables and the role of BNC connectors, also known as T-connectors, in connecting computers. The bus topology's advantages, such as cost-effectiveness and ease of implementation, are noted alongside its disadvantage of requiring cable termination at both ends with terminators.
02:00 - 02:30: Connectors and Cabling Types Chapter Title: Connectors and Cabling Types
Summary: The chapter discusses the importance of maintaining closed connections in network setups to ensure operational integrity. It highlights that any disconnection, such as removal or addition of a computer, or issues with terminators, can lead to open circuits where data reflections occur, causing disruptions in data flow. This concept is illustrated using the 'ring topology', a specific network configuration where such considerations are critical.
02:30 - 03:00: IEEE Standards and HDMI The chapter provides an overview of a rarely used network topology called 'ring topology'. In a ring topology, computers are connected in a closed loop, where each computer is linked to precisely two other computers, forming a circle. Data packets travel in one direction around the ring until they reach their intended destination. Although it is not commonly used in modern networking, the ring topology is noted for its simplicity.
03:00 - 03:30: Ethernet, Wireless, and Cable Networking The chapter 'Ethernet, Wireless, and Cable Networking' discusses various network topologies, focusing particularly on the mesh topology. A mesh topology is explained as a network setup where each computer is connected to every other computer, leading to high redundancy and reliability. However, the downside of such a configuration is that if one computer fails or if there's a single break in the cable, it can disrupt the entire data flow, making it essential to have robust installation and troubleshooting practices.
03:30 - 04:00: Role of Firewalls and Network Protection The chapter titled 'Role of Firewalls and Network Protection' discusses the effectiveness of network technologies in handling failures. It uses the example of a mesh network where four computers are connected, each with three connections, resulting in a total of twelve connections. Despite the high reliability and connectivity offered by such a setup, mesh topologies are considered expensive due to the extensive cabling and network cards required, and thus are not commonly used in local area networks (LANs) but are more often found in wide area networks (WANs).
04:00 - 04:30: TCP/IP, UDP, and Application Layer Protocols The chapter covers the topic of network topologies with a focus on mesh topology. It highlights the redundancy benefits of a mesh topology, using the internet as an example. In a mesh network, the failure of one or more connections does not stop communication between computers. The chapter also touches on the possibility of combining different network topologies.
04:30 - 05:00: IP Addressing, Subnetting, and DHCP The chapter discusses hybrid network topologies, explaining that many businesses use these topologies to meet their expanding needs. It highlights two popular forms: the star-ring network and the star-bus network, describing how in a star-bus network, several star topologies are connected via a single bus connection.
05:00 - 05:30: Routing Protocols and Network Concepts This chapter covers the structure and operation of various network topologies, specifically focusing on star ring networks and point-to-point topologies. Star ring networks are formed by linking two or more star topologies together to create a large ring network. Point-to-point topology involves two hosts directly connected to each other using a single cable, and these hosts can include a range of devices such as computers, switches, routers, and servers.
05:30 - 06:00: Internet Connections: DSL, Cable, Satellite This chapter explores different network topologies, starting with the simplest form, point to point topology. It then delves into client-server topology, which is commonly used in business environments because it centralizes resources on a dedicated server. This is in contrast to connecting all resources on individual computers, which can be inefficient. The administrator can, therefore, manage data more effectively by placing it all on one machine, facilitating easier access for clients.
The chapter title suggests a focus on Internet connections, so detailed comparisons among DSL, cable, and satellite connection types might follow, linking these methods of internet service with network topology choices. However, the provided transcript doesnβt cover that content.
06:00 - 06:30: Networking in IoT and Industrial Control This chapter discusses networking in Internet of Things (IoT) and industrial control systems. It highlights the efficiency and simplicity of centralizing resources on a single machine, which clients can access when needed, as opposed to distributing data across multiple clients. This approach not only reduces administrative effort but also simplifies the network architecture. Furthermore, the chapter introduces the point-to-multipoint topology, a network architecture commonly employed in wireless systems.
06:30 - 07:00: Virtualization and Cloud Computing This chapter discusses the concept of outdoor networks characterized by a central wireless base station, also known as an access point, and several other wireless locations, referred to as clients, that communicate solely with this central location. It highlights that these clients do not communicate with each other directly, emphasizing the centralized nature of the network.
07:00 - 07:30: Network Attached Storage and SAN The chapter discusses peer-to-peer topology in networking, where clients communicate directly to share resources without a centralized server. An example provided includes computers sharing printers and files across the network.
07:30 - 08:00: Cabling, Panels, and Network Interfaces This chapter covers the basics of networking components including cabling, panels, and network interfaces. It begins with a discussion on peer-to-peer topologies, highlighting their simplicity in setup and common usage in homes and small businesses. The chapter introduces the RJ-11 connector, explaining it as a registered jack commonly used for telephone connections and employing a 4-wire configuration.
08:00 - 08:30: VLANs, Intranets, and Extranets The chapter begins with a discussion on the RJ-11 connector, which is primarily used for telephone equipment connections but also can connect computers to local area networks (LANs) through a computer's modem. It features a single locking tab and is smaller in size compared to the RJ-45 connector.
08:30 - 09:00: Load Balancing, Quality of Service, and Security The chapter discusses the usage of different types of connectors in local area networks, highlighting the similarity between the RJ-11 and RJ-45 connectors in physical appearance, specifically their locking mechanism, and explaining the difference between the RJ-48C and RJ-45 connectors in terms of cable compatibility, with the former being suited for shielded twisted pair cables.
09:00 - 09:30: Backup, Redundancy, and Disaster Recovery The chapter discusses the use of UTP couplers for connecting UTP cables, particularly with RJ-45 connectors. This configuration is essential when extending cable length is not feasible. It explains the process of using a coupler by connecting one cable end into the coupler and attaching another cable on the opposite side to create a longer connection.
09:30 - 10:00: IPsec, SSL/TLS, and Wireless Security The chapter titled 'IPsec, SSL/TLS, and Wireless Security' covers various important aspects of network security, including encryption and secure connections in both wired and wireless environments. It also touches upon the use of different types of connectors, such as BNC connectors, which are commonly used for connecting coaxial cables in analog and digital transmissions. The BNC connector, standing for Bayonet Neill Concelman, is specifically mentioned as a popular RF connector for audio and video, and the chapter briefly explains the use of BNC couplers to connect coaxial cables with attached BNC connectors.
10:00 - 10:30: Configuring SOHO Routers and Security The chapter begins with a technical explanation of couplers, specifically BNC female to female couplers. It moves on to discuss fiber optic couplers, explaining their use in connecting or joining two identical fiber optic connectors. The discussion is focused on understanding the configurations and security measures for SOHO (Small Office/Home Office) routers, enhancing the reader's technical know-how on networking components.
10:30 - 11:00: Network Troubleshooting Tools and Techniques The chapter titled 'Network Troubleshooting Tools and Techniques' talks about the different types of network adapters and couplers. It makes a distinction between fiber adapters and fiber couplers, indicating that fiber adapters are used for connecting different types of connectors like ST to SC or LC to SC, while fiber couplers are shown joining similar connectors together, as described with an example of two ST connectors.
11:00 - 11:30: Troubleshooting Wireless and Wired Networks The chapter "Troubleshooting Wireless and Wired Networks" explains different types of connectors used in networking, starting with the F-type connector. The F-type is a threaded connector primarily used on coaxial cables, often employed by cable providers to connect to cable modems. This connector is tightened by hand using an attached nut. The chapter also discusses USB connectors, which are common on desktops and laptops. It mentions that many manufacturers produce wireless network cards that can plug into a USB port, which comes with two different types of connectors.
11:30 - 12:00: Identifying and Resolving Network Issues This chapter introduces the IEEE 1394 connector, commonly known as Firewire, recognized by its distinct D shape. The chapter discusses the increasing popularity of Firewire connections on desktops and laptops, mainly due to its association with attaching peripheral devices like digital cameras. The focus is on understanding the role and function of Firewire in network and peripheral connectivity.
12:00 - 12:30: Final Thoughts on Network Administration The chapter discusses the usage of different types of connectors in network administration. Initially, it talks about how certain connectors are utilized more for connections with peripherals like printers rather than for network connections. It then highlights the presence of these connectors in various video and multimedia devices. The chapter further delves into fiber optic connectors, particularly focusing on the MTRJ (Mechanical Transfer Registered Jack) connector. It describes the MTRJ as a fiber optic cable connector with a latched push-pull connection mechanism, and notes its small form factor, which is suitable for high-density networking environments.
CompTIA Network+ Certification Video Course Transcription
00:00 - 00:30 The layout of how a network communicates with
different devices is called a topology, and the most common topology is the star topology.
In a star topology all computers are connected to a central wiring point such as a hub or
a switch, and all data on a star network passes
00:30 - 01:00 through this central point before continuing
to its destination. One of the major benefits of this topology, is that if one computer
failed or if there was a break in the cable, the other computers would not be affected
because each computer has their own cable connection. However a disadvantage of the
star topology is that if the central hub or switch fails, then all the computers on that
central point would be affected. And this
01:00 - 01:30 is called a single point of failure, if this
happens the entire network goes down. This is called the bus topology. Now this
topology is very old technology and it is not used today that much. This is the kind
of network setup where each of the computers and network devices are connected to a single
cable or backbone, and this backbone is a
01:30 - 02:00 coaxial cable. The computers connect to this
table using special connectors called BNC which are also known as T-connectors. One
of the advantages of the bus topology is that it is fairly cheap and easy to implement,
however a disadvantage of the bus topology is that it requires that the cable be terminated
at both ends using terminators. In order for
02:00 - 02:30 this setup to remain operational, there must
not be any open connections, including the ends that attach to the computers. If a computer
is removed or added or if the terminators are loose or missing, then the cable would
be open and data would bounce back, and this is known as signal reflection, if this happens
data flow would be disrupted. And this is called the ring topology. A ring
topology is a type of network configuration
02:30 - 03:00 where each computer is connected to each other
in the shape of a closed loop or ring. So every computer on this ring has exactly two
neighbors for communication purposes. Each data packet is sent around the ring until
it reaches its final destination. This kind of topology is rarely used today. The advantage
of a ring topology is that they are easy to
03:00 - 03:30 install and easy to troubleshoot. However
the disadvantage would be that if just one of these computers goes down or if there was
a single break in the cable, then all data flow would be disrupted. And this is called the mesh topology. In a
mesh topology each computer on the network is connected to every other computer on the
network. So by having so many connections
03:30 - 04:00 it handles failure very well. In this illustration
there are 4 computers with 3 connections on each computer which makes a total of 12 connections
for this network. But because of the amount of cabling and network cards that have to
be used, mesh topologies can be expensive, so they are rarely used all local area networks
or LANs, they are mainly used on wide area
04:00 - 04:30 networks like the internet, in fact the internet
is a perfect example of a mesh topology. The advantage of a mesh topology is that it creates
a high redundancy level, because if one or more connections fail, the computers would
still be able to communicate with each other as you can see in the illustration. Topologies can also be combined with other
topologies if needed, and these are known
04:30 - 05:00 as hybrid topologies. Hybrid apologies can
offer the best of both worlds. In fact, a lot of businesses use some form of a hybrid
apology to suit their growing needs. The most common forms of hybrid topologies are the
star ring network and the star bus network. In a star bus network, two or more star topologies
are linked together using a single bus connection.
05:00 - 05:30 And in a star ring network, two or more star
topologies are linked together to form a large ring network. Now a point to point topology is 2 hosts that
are directly connected to each other using a single cable. These hosts could be computers,
switches, routers, servers, and so on.
05:30 - 06:00 So a point to point topology is the simplest
form of topology there is. A client server topology is where clients
connect directly to a centralized dedicated server to access resources rather than connecting
to each other. Typically a lot of businesses use this type of topology because instead
of having to put all the resources on each computer, which is a lot more work, the administrator
can just put all the data on one machine and
06:00 - 06:30 then all the clients can access the resources
when they need it. So obviously putting the resources on just one machine is a lot less
work than putting the data on multiple clients. It makes the administration a lot simpler. Point-to-multipoint topology is a network
architecture that is commonly used in wireless
06:30 - 07:00 outdoor networks. So what you would have is
a central wireless base station and then there would be other wireless locations around it
that connect to the single central location. Now these other locations will not directly
communicate to the other locations. They will all only communicate to the central location.
So these wireless locations are commonly called clients. And the central location is commonly
called an access point or a base station.
07:00 - 07:30 A peer-to-peer topology is where all the clients
on the network talk to every other client on the network to share their resources with
each other. So for example, one computer can share their printer, another computer can
share their files on their hard drive, and so on. So there is no centralized server that
the clients connect to. They all just connect
07:30 - 08:00 to each other. And peer-to-peer topologies
are simple to set up. You would typically find them in homes and small businesses. This is the RJ-11 connector, and RJ stands
for registered jack. And this is a 4 wire
08:00 - 08:30 connector used mainly to connect telephone
equipment. But as far as networking, the RJ-11 is used to connect computers to local area
networks through the computer s modem. The RJ-11 locks itself and to place by a single
locking tab, and it resembles an RJ-45 but it's a little bit smaller. Now the RJ-45 is by far the most common network
connector. This is an 8 wire connector used
08:30 - 09:00 to connect computers to local area networks.
And like the RJ-11, it also locks itself into place by a single locking tab, and it also
resembles an RJ-11 but it's a little bit larger. The RJ-48C looks very similar to the RJ-45.
The difference between the two is that the RJ-48C is used with shielded twisted pair
instead of unshielded twisted pair. It s primarily
09:00 - 09:30 used with T1 lines and it's also wired differently
than the RJ-45. A UTP coupler is used for connecting UTP cables
with RJ-45 connectors to each other. This is typically used when running a longer cable
is not an option. You just plug one end of the cable into the coupler and then add another
cable on the other side, and now you have
09:30 - 10:00 successfully extended your UTP cable. The BNC connector is a common type of RF connector
that is used on coaxial cable. BNC stands for Bayonet Neill Concelman, and it is used
for both analog and digital video transmissions, as well as audio. A BNC coupler is used to connect together
two coaxial cables with BNC connectors attached
10:00 - 10:30 to them. This particular coupler is a BNC
female to female coupler. If you wanted to join two fiber optic connectors,
you would use a fiber coupler. Fiber couplers are used to a couple or join two of the same
fiber optic connectors. The two connectors
10:30 - 11:00 have to be the same. These are not to be confused
with fiber adapters, because fiber adapters are for joining two different connectors together
such as an ST to an SC or an LC to an SC and so on. So here we have an example of a fiber
coupler joining to ST connectors together.
11:00 - 11:30 Now this connector is called the F-type. Now
this is a threaded connector typically used on coaxial cables. These are primarily used
by cable providers to attach to cable modems. The F-type hand tightens by an attached nut. This is a USB connector. The USB is very common
on desktops and laptops. Many manufacturers make wireless network cards that plug into
a USB port. The USB has two different connector
11:30 - 12:00 types, type A and type B. This is the IEEE 1394 connector, and this
is also known as firewire. Firewire is recognized by its D shape. This type of connection is
becoming more popular on desktops and laptops and is commonly associated with attaching
peripheral devices such as digital cameras
12:00 - 12:30 and printers rather than being used as network
connections. These are also found in many types of video and multimedia devices. Now we're getting into fiber optic connectors.
And this connector is called the MTRJ which stands for mechanical transfer registered
jack. And this is a fiber optic cable connector that uses a latched push-pull connection,
and it has a small form factor used for high
12:30 - 13:00 packed density. The next fiber optic connector is called the
ST or straight tip. This uses a half-twist bayonet type of lock, and is commonly used
with single-mode fiber optic cable. And our next connector is called the LC or
local connector. And this is also a fiber
13:00 - 13:30 optic connector. It uses a jack similar to
the RJ-45. This type of connector is commonly used between floors in a building. And our last fiber optic connector is called
the SC or standard connector. And this uses a push-pull connector similar to audio and
video plugs. And like the LC connector this is also commonly used between floors in a
building.
13:30 - 14:00 The term serial refers to sending data one
bit at a time. Serial cables are cables that carry serial data transmission. And the most
common form of serial cables use the RS-232 standard, which uses the common D connectors
such as the DB-9 and DB-25.
14:00 - 14:30 Now we're going to talk about the difference
between UPC and APC connectors, and as an example we're going to use a group of ST fiber
connectors equipped with UPC and APC connectors. When fiber optic connectors make a connection
to each other, the point at which the connection is made is not perfect because of the small
imperfections of the surfaces. So what happens
14:30 - 15:00 is at the point where the connectors join,
light is transmitted from one connector, to the other connector. But at the point where
light passes to the other connector, light will reflect back in the opposite direction
towards the light source, and as this happens there is signal loss. This is what happens
in a UPC connector, light is reflected directly back. So as technology progressed, a new connector
was developed to decrease the signal loss,
15:00 - 15:30 and this is called the APC connector The difference
between the UPC and the APC is the angle of the tip where the connection is made. With
the UPC, the light reflects back towards the light source, but with the APC, with its angled
connection, the light doesn't reflect back towards the light source, it reflects back
at an angle into the wall of the cable. And
15:30 - 16:00 as a result, this greatly reduces the signal
loss. The term plenum refers to a space in a building
where there is open airflow circulation. And
16:00 - 16:30 this is usually between the drop ceiling and
the structure ceiling. Buildings that don't have plenum spaces, have air ducts encapsulating
the airflow. So as a result, buildings that have plenum spaces where there is adequate
open airflow, are more prone to fires than buildings that don't have plenum spaces. And
because of this, cables that run through plenum spaces must meet certain requirements. First,
they must be more fire-resistant. And secondly,
16:30 - 17:00 they must not produce any toxic fumes if they
are burned. The IEEE 1901 - 2013 standard is called ethernet
over HDMI. The HDMI 1.4 specification adds another channel to an HDMI cable for data
that will have the capability of network communication.
17:00 - 17:30 So the connected devices that use this feature
will have the ability to send and receive data at 100 Mbits per second ethernet. So
in addition to video and audio on a single cable, the HDMI cable will have another ability
of ethernet networking. Sometimes there might be cases in your home
or office where you want a certain computer,
17:30 - 18:00 in a certain part of the building, to be able
to access the internet or to be networked. And for whatever reason, network cabling or
Wi-Fi just wasn't an option in that part of the building. Maybe because of difficulties
in the structure of the building or interference or whatever. So another 1901 standard gave
the ability to network using the existing electrical system of the building. Ethernet
over Powerline gives this ability of ethernet
18:00 - 18:30 networking over power. So for example let's
say you needed this computer up here to be able to access the internet. But for some
reason you can't get any network cables or any Wi-Fi signal to reach that computer. So
in this case we're going to use ethernet over power. So we're going to need a couple of
powerline adapters like these. These powerline adapters plug directly into a power outlet
and they have a built-in ethernet port for
18:30 - 19:00 an RJ-45 connector. So one of them plugs into
the power outlet next to this computer up here, and then you would connect an ethernet
cable from the network port of the computer, and the other end into the powerline adapter's
ethernet port. Then the other adapter plugs into the power outlet next to the modem or
router down here, then you would plug an ethernet
19:00 - 19:30 cable from the modem or router to the powerline
adapter. And now ethernet data would use the building's electrical wiring to deliver networking
data to the other powerline adapter so that the other computer can access the internet. Today there are many different cable standards
that are used on networks. These cables are
19:30 - 20:00 categorized and named according to their speed,
type, and media. So here is one example: a cable called 10 BASE-T. 10 stands for the
maximum speed of this cable. The maximum speed of this cable is 10 Mbits per second. BASE
stands for baseband transmission. And T stands for twisted pair cable. 10 BASE-2 which is
also referred to as thin ethernet, is a version
20:00 - 20:30 of ethernet that uses coaxial cable as opposed
to unshielded twisted pair cable. And it has a maximum speed of 10 Mbits per second. And
has a maximum length of 200 meters. Other cable standards include 100 BASE-T. And this,
as the name states, has a speed of 100 Mbits
20:30 - 21:00 per second, which is 10 times faster than
10 BASE-T. This uses category 5 UTP cable or higher and it also has a maximum length
of 100 meters. 100 BASE-T is also known as fast ethernet. 100 BASE-FX, just like 100
BASE-T, has a speed of 100 Mbits per second
21:00 - 21:30 but the difference is that FX uses fiber-optic
cable where 100 BASE-T uses copper cabling. It has a maximum length of 400 meters in half
duplex mode, and 2 kilometers in full duplex mode. And moving on to the gigabit standards,
there is 1000 BASE-T, and this has a speed of 1,000 Mbits per second. It uses category
5 UTP cabling or higher and has a maximum
21:30 - 22:00 length of 100 meters. 1000 BASE-TX is similar
to 1000 BASE-T with the exception that it was supposed to be an easier set up because
it only uses two unidirectional pairs of wires for communication, whereas 1000 BASE-T uses
four bidirectional wires. But 1000 BASE-TX
22:00 - 22:30 never caught on and is known as a failure
in commercial implementation. Moving on to the 10 gigabit standard, there
is 10G BASE-T. And this has a speed of 10,000 Mbits per second or 10 gigabits per second.
It was developed in 2006 and it uses both shielded and unshielded twisted pair cabling.
It has a maximum distance of 100 meters when
22:30 - 23:00 using category 6A cabling. Or if it s using
Category 6 it has a maximum length of 55 meters. Next is 10G BASE-SR, where the SR stands for
short-range. This is a commonly used multimode fiber optic specification and has a maximum
length of 300 meters.
23:00 - 23:30 10G BASE-ER or extended reach. And this has
a longer range of 40 kilometers using single mode fiber optics. 10G BASE-SW has the same specification as
10G BASE-SR, but this is specifically used to operate over SONET which is synchronous
optical networks.
23:30 - 24:00 Now a firewall can be either software or hardware.
It is a system that is designed to prevent unauthorized access from entering a private
network by filtering the information that comes in from the internet. It blocks unwanted
traffic and permits wanted traffic. So basically
24:00 - 24:30 it filters the incoming network data packets
and determines by its access rules if it is allowed to enter the network. In today s high-tech
world, a firewall is essential to every business to keep their networks safe. And one way that
a firewall controls the flow of traffic coming into and out of a network is through its access
control list or ACL. And the ACL is a list
24:30 - 25:00 of rules on what can access the network. It
either allows or denies permission. So as an example, here we have a very simplified
ACL with a list of IP addresses that have been allowed or denied on this firewall. So
if this IP address tried to get into this network, the firewall will deny it because
of the rules that are set in the ACL. But
25:00 - 25:30 these other IP addresses are granted access
because the ACL allows them. Most firewalls come up with a default rule
of implicit deny. And what that basically means is that the firewall will only allow
traffic to enter the network that the ACL
25:30 - 26:00 specifically says that it will allow. So as an example, if your ACL only has one
rule, and let's say that that rule has allowed port number 80, which is web pages, then that
means that you'll be allowed to access web pages on your network, but nothing else. You
won't be able to use any FTP, HTTPS, or incoming POP or IMAP email because the firewall has
implicitly denied those ports. So the only
26:00 - 26:30 way to access those services, is you have
to specifically allow them by granting them access in the ACL. So for example, we ll go
ahead and add port 25 and port 110, and give those ports access to the network. And now
those ports, along with their respective service, are able to go through the firewall. But everything
else is implicitly denied.
26:30 - 27:00 Firewalls come in different types. And one
type is called a host-based firewall. And this is a software firewall, this is the kind
of firewall that is installed on a computer and it protects that computer only and nothing
else. For example later versions of Microsoft operating systems come pre-packaged with a
host-baseball firewall as you can see here.
27:00 - 27:30 You can turn the firewall on or off if you
want, and you can also create exceptions to the firewall based on the application name
on the exceptions tab. And of course you can always purchase a third party firewall and
install it on your computer. Another type of firewall is called a network-based
firewall. And this is the kind that is shown here. A network-based firewall is a combination
of hardware and software and it operates at
27:30 - 28:00 the network layer. It is placed between a
private network and the internet. And unlike a host-based firewall, where it only protects
its own computer, a network-based firewall protects an entire network and it does this
through management rules that are applied to the entire network, so that any harmful
activity can be stopped before it reaches
28:00 - 28:30 the computers. Firewalls also inspect traffic in a couple
of different ways. And one way is called stateful. A stateful firewall monitors all the connections
and data streams that are passing through and keeps a record of it. It uses the connection
information that comes from the applications and previous sessions, and factors that in
allowing or denying the flow of data packets.
28:30 - 29:00 It does a thorough job of protecting a network
dynamically. A stateless firewall on the other hand does not do a thorough job as a stateful
firewall does. A stateless firewall uses an access control list to allow or deny traffic.
It does not thoroughly inspect a data packet, it only looks into the header portion of the
data packet, and it does not keep a record
29:00 - 29:30 of previous data packets. Content filtering is a technology that is
commonly used in email, and as its name implies, it filters data based on their content and
not on the source. This type of filter is commonly used to filter email spam.
29:30 - 30:00 And another type of filter is called signature
identification. And this is used to detect viruses that have a well-known behavior pattern.
Certain viruses and malware have a common behavior, and firewalls that use signature
identification are programmed to spot this behavior and once it s spotted, it takes action
to block the intruder. Intrusion detection or prevention system is
a hardware tool that is typically placed between
30:00 - 30:30 the internet and the firewall. And its job
is to alert and prevent a network from outside attacks. These attacks include viruses, malware,
and hackers who are trying to sabotage an internal network. It monitors traffic flowing
through a network, looking for suspicious patterns, and if it finds any, it alerts the
network administrator of a pending danger.
30:30 - 31:00 The terms 568A and 568B, refer to a set of
wiring standards developed by TIA / EIA, which is also known as the Telecommunications Industry
Association. And these terms define the rules
31:00 - 31:30 on how twisted pair cables should be wired
to RJ-45 connectors. And these wires must follow a certain order so that the network
can function properly. The 568A standard is wired in this order: White/green, then green,
white/orange, blue, white/blue, orange, white/brown, and brown. And the 568B standard is wired
in the following order: white/orange, then
31:30 - 32:00 orange, white/green, blue, white/blue, green,
white/brown, and brown. There is no difference in the functionality as to which standard
is used. Whether you choose to use the A or B wiring
standard, if both ends of the cable are wired
32:00 - 32:30 using the same standard, then this is known
as a straight cable. For example this cable is wired on both ends using the 568A standard.
A straight cable allows signals to pass straight through from end to end, and this is the most
common type of cable and it is used to connect computers to hubs, switches, or modems. Another
type of cable is called a crossover, and this
32:30 - 33:00 cable is created when both ends of the cable
are wired using the two different standards. For example one end is wired using the A standard,
and the other end is wired using the B standard. Crossover cables are used to connect two similar
devices together. For example, you can use a crossover cable to connect two computers
directly to each other without using a hub
33:00 - 33:30 or switch. Crossover cables are also used
to connect hubs or switches to each other. A rollover cable is created when both ends
are wired completely opposite of each other. These are used to connect a computer or a
terminal to a router s console port. And a
33:30 - 34:00 loopback table is for testing purposes. It
s to make a computer think that it's connected to a network. And to make a loop-back cable,
you connect pin 1 to pin 3, and pin to 2 pin
34:00 - 34:30 6. Today there are five different categories
of twisted pair cables that you're going to need to know for the exam. The difference
between these is the maximum speed that can handle without having any crosstalk. The numbers
of these categories represent the tightness of the twists that are applied to the wires.
So category 3 has a maximum speed of 10 Mbits
34:30 - 35:00 per second. And this is an old category that
was used on old 10 BASE-T ethernet networks. Category 5 has a maximum speed of 100 Mbits
per second, and these were used on 100 BASE-T & TX ethernet networks. Category 5e is an
enhanced version of category 5, and it has
35:00 - 35:30 speeds of over 1,000 Mbits per second, and
these are used on 1000 BASE-T ethernet networks. And category 6 also has a maximum speed of
1,000 Mbits per second, and is also used on 1000 BASE-T ethernet networks, but it's more
of a heavier duty cable when compared to category 5e. And it's also used on 10G BASE- T networks,
which has a max speed of 10,000 Mbits per
35:30 - 36:00 second but only for cable lengths of less
than 100 meters. And last there's category 6A, or augmented, and this has a maximum speed
of 10,000 Mbits per second, and is used on 10G BASE-T networks. And unlike category 6,
this has a maximum length of 100 meters.
36:00 - 36:30 Unshielded twisted pair is by far the most
common type of table that is used today. It consists of 4 pairs of unshielded wires twisted
around each other. The wires are twisted to prevent electromagnetic interference or crosstalk.
This type of cabling is mainly used on local area networks. Now shielded twisted pair is very similar
to unshielded twisted pair, except that it
36:30 - 37:00 has a foil shield that covers the wires. This
shielding adds a layer of protection against electromagnetic interference leaking into
or out of a cable. This is a coaxial cable. This is used today
primarily by cable providers to provide a computer with broadband internet connection.
Early on it was used as a backbone for networks,
37:00 - 37:30 such as a bus network. Now there are two common types of coaxial
cable. The first type is RG-6, and this is made for long distances and is commonly used
for cable television and internet connection. And the second type is RG-59, and this is
made for short distances and is commonly used for high definition and high quality video.
37:30 - 38:00 Now we're getting into fiber optic cables,
and here is a cutaway view of a fiber optic cable and a light source. Fiber optic cable
uses pulses of light to send data, and as a result it is very fast and it can span for
great distances. Now there were two different modes in fiber optics: single- mode fiber
and multimode fiber. Single-mode fiber is
38:00 - 38:30 a fiber optic cable that allows light to enter
only at a single angle, as you can see here. So when this type of transmission of light
enters at this angle, it can span for great distances. Now this is multimode fiber. The
difference between multimode and single-mode, is that in multimode, light travels in multiple
beams that reflect off the walls of the cable.
38:30 - 39:00 And unlike single-mode fiber, multimode fiber
is made for short distances. Sometimes you may need to convert different
media types in your network. So if you're running different types of media, such as
fiber, ethernet, or coaxial, within your network, well then you can convert and connect all
these different types by using a media converter.
39:00 - 39:30 Media converters allow you to convert to different
types of media, such as converting single and multimode fiber to ethernet, fiber to
coaxial, and single-mode fiber to multimode fiber and so on.
39:30 - 40:00 Another standard is called DOCSIS, which stands
for data over cable service interface specifications. And those of you who have broadband cable
internet will recognize this device. And yes, this is your typical DOCSIS cable modem. The
DOCSIS modem handles both incoming and outgoing data signals, including internet, video, and
voice. The DOCSIS 3.1 specification supports
40:00 - 40:30 speeds of 10 gigabit downstream and 1 gigabit
upstream. A hub is a device that has multiple ports
that accepts ethernet connections from network devices. A hub is considered not to be intelligent
because it does not filter any data or has any intelligence as to where data is supposed
to be sent. When a data packet arrives at one of the ports, it is copied to all other
ports, so all the devices on that hub sees
40:30 - 41:00 that data packet. There are also two different
types of hubs: passive and active. The difference is a passive hub does not require power, but
an active hub does require power. Now a switch is very similar to a hub. It's
also a device that has multiple ports that
41:00 - 41:30 accepts ethernet connections from network
devices. But unlike a hub, a switch is intelligent. A switch can actually learn the physical addresses
of the devices that are connected to it and it stores these addresses in a table. So when
a data packet is sent to a switch, it s directed only to the intended destination port. That's
the major difference between a hub and a switch.
41:30 - 42:00 So as a result, switches are far more preferred
over hubs, because they reduce any unnecessary traffic on the network. Regular switches operate at layer 2 of the
OSI model, and we'll talk about the OSI model in a later lesson, but there are other types
of switches that operate at higher levels of the OSI model. And one of these is called
a multilayer switch. A multi-layer which can
42:00 - 42:30 operate at layer 2 and layer 3 of the OSI
model. It s able to interpret layer 3 data similar to a router. And another type of switch is called a content
which. And a content switch can operate at layers 4 through 7 of the OSI model. This
type of switch can perform load balancing and advanced filtering and these switches
are also very expensive.
42:30 - 43:00 Networking devices need electrical power to
function and that's why they have a separate electrical port for a power plug. But some
networking devices don't have an electrical port. It s not that they don't need electrical
power, it's just that they get their power and data from the same cable, which is through
the ethernet cable. And this technology is
43:00 - 43:30 known as POE, which stands for power over
ethernet. Some networks are designed to be more fault
tolerant. For example in some networks, multiple switches are installed in case a switch does
fail. So in a case of a failure, the data can bypass a failed switch and use the others
to get to their destination. But a potential
43:30 - 44:00 problem can happen with this setup, and that
problem is with broadcast traffic loops. These loops can happen when there are multiple active
paths between the destinations. And when this happens, it can slow down the network because
of the excess traffic. So to solve this problem, the spanning tree protocol was created. The
spanning tree protocol allows for fault tolerance and prevents unnecessary traffic loops in
the network. And it does this by allowing
44:00 - 44:30 the switches to talk to each other to find
if loops are happening in the network. Bridges are used to divide a network into
separate collision domains. For example here we have a network and this network is segmented
into two by a couple of hubs. And if you notice
44:30 - 45:00 all the broadcast traffic from two segments
are seen by all the computers on both sides. And this causes unnecessary traffic. So that
is where a bridge can be helpful. If you add a bridge to this network, it will reduce any
unnecessary traffic between the two segments by filtering the data based on their MAC address.
The bridge only allows data to crossover if
45:00 - 45:30 it meets the required MAC address of the destination.
Because a bridge keeps a record of all the MAC addresses of the NICs that are connected
to it, and it will also block all data from crossing over if it fails to meet this requirement. Now a router does exactly what its name implies.
A router is a device that routes or forwards data from one network to another based on
their IP address. When a data packet is received
45:30 - 46:00 from the router, the router inspects the packet
and determines if the packet was meant for its own network or if it's meant for another
network. If the router determines that the data packet is meant for its own network,
it receives it. But if it's not meant for its own network, it sends it off to another
network. So a router is essentially the gateway
46:00 - 46:30 for a network. Now let's go ahead and demonstrate this. Here
we have a private network with its router. And we ll refer to this one as the red network,
indicated by the red-colored screens on the computers. And over here you're going to have
different data packets, indicated by their various colors, and they are going to be entering
the red network s router from the internet. The router is only going to accept the red
data packets, because they are the only ones
46:30 - 47:00 that are intended for this network. So all
of the other data packets, the yellows, blues, greens, etc., will be rejected by his router
because they were not intended for this network. Now this is a very simplified illustration
of how a router works, but I think you'll get the idea. Now here is an expanded view of routers over
the internet. There are 4 networks here, indicated
47:00 - 47:30 by their different colors, and each network
has their own router. Now notice how the routers send data. Notice that when a computer wants
to send data to another computer on the same network, the data packet never leaves their
own network. The router would not let that happen because the router knows what belongs
inside and outside their network. But on the
47:30 - 48:00 other hand, when a computer wants to send
data to another computer on a different network, the router allows it. For example, notice
how the router on the red network allows the yellow, blue, and green data packets pass
by so they can go to their intended destination. The yellow packet goes to the yellow network,
the blue goes to the blue network, and so on. And the same goes for all the other networks.
48:00 - 48:30 A gateway can be defined as a device that
joins two networks together. They interconnect networks with different or incompatible communication
protocols. A gateway however does not change the data, it only changes the format of the
data. So in simple terms, this illustration is showing how a gateway is transforming a
simple signal into something totally different.
48:30 - 49:00 The circular pattern can represent one network,
and as it goes through the gateway, it transforms into a wave pattern, which represents a different
network. Now this is a CSU/DSU. Now this is a device
about the size of a modem. And what this does is it converts data from a local area network
to a wide area network. And this has to happen
49:00 - 49:30 because the data formats between a LAN and
a WAN are different. A network interface card or NIC, is used to
connect a computer to a network. It is basically a circuit board with a network adapter that
is installed on your computer. And its job is to convert incoming serial data into parallel
data, so that the computer can understand
49:30 - 50:00 it. A NIC provides a constant dedicated connection
to a network. And every NIC has its own unique identifier, called a MAC address. A transceiver is a device that has both a
transmitter and a receiver in the same package. The term applies to wireless communication
devices like cell phones and two-way radios.
50:00 - 50:30 It's basically a term used for any device
that receives data, converts it, then transmits the data to another location. A wireless access point is basically a wireless
hub that is used by wireless devices. It connects to a wired network and relays data between
the wired network and the wireless device for communication purposes. In this illustration
you see a wireless access point, wired to
50:30 - 51:00 a network so that the wireless laptop can
communicate with the network. A dial-up modem is a device that allows a
computer to transmit data over normal telephone lines. The data coming in from the telephone
lines is analog, however the data in a computer is all digital. So when the analog data comes
in from the telephone lines, the modem's job
51:00 - 51:30 is to convert it into a digital form so the
computer can understand it. So that's basically what a modem does, it converts analog data
into digital data. And the maximum speed of most modems today is 56 kbps.
51:30 - 52:00 The IEEE is an international organization
for the advancement of technology related to electricity. And they are responsible for
a set of standards for a project called the 802 project. And one of these standards is
the 802.11 standard, which is wireless. Wireless technology is becoming more and more popular.
And today there are 5 wireless standards.
52:00 - 52:30 There are the A, B, G, N, and AC standards.
And here is a chart of the speed, frequencies, and release year for each one. Starting with
the first wireless standard which is 802.11A, which came out in 1999. And the latest standard
is the 802.11AC standard which was released
52:30 - 53:00 in 2014. Infrared is a technology that was developed
by IRDA, which stands for the Infrared Data Association. The term infrared actually means
below red. It's a wireless technology where data is transmitted in rays of light, rather
than using radio waves. Many companies have now utilize this technology to transmit and
receive data in their products. However the
53:00 - 53:30 drawbacks of infrared, is that it requires
a direct line of sight. If any object comes in between the two infrared devices, the communication
will be blocked. And also infrared does not work in direct sunlight. If this happens the
communication will be weakened and most likely will be blocked.
53:30 - 54:00 Bluetooth is a short-range radio that provides
a way to connect and exchange information between devices such as laptops, cell phones,
and tablets. It operates at 2.4 gigahertz and is capable of transmitting both voice
and data. The latest and of the Bluetooth has a transfer speed of 24 Mbits per second
and has a maximum range of approximately 100
54:00 - 54:30 meters. Here is how you get the MAC address of a Windows
computer. The MAC or media access control
54:30 - 55:00 address is an identifier that every network
device uses to uniquely identify itself on a network. So no two devices anywhere in the
world have the same MAC address. It s made up of a 6 byte hexadecimal number that is
burned into every NIC by its manufacturer. The MAC address can contain any number and
it also contains alphabets from A through
55:00 - 55:30 F. The MAC address is broken up into two parts.
The first 3 bytes of the MAC address identifies the manufacturer of the NIC, for example Linksys,
Netgear, or Belkin. And the last 3 bytes are a unique number from the manufacturer that
identifies each device on a network.
55:30 - 56:00 In order for network communication to take
place, there needs to be a set of standards, and that's why the OSI model was developed.
The OSI model describes how information from software in one computer, moves through a
network to reach software in another computer, and it does this by breaking down this huge
task of data communication into 7 different
56:00 - 56:30 layers, giving control of the data being sent
from one layer to another. And these layers are numbered from 1 to 7, starting from the
bottom. These layers are the physical, data link, network, transport, session, presentation,
and application. This illustration shows how data flows through
the OSI model. When two computers want to
56:30 - 57:00 communicate, the data flows down the OSI model
and when the data crosses over the network media, such as the internet, it flows back
up the OSI model to its destination. The top layer of the OSI model is the application
layer. And this layer, as you might have guessed,
57:00 - 57:30 deals with applications. The purpose of this
layer is to manage communications between applications. It supports application protocols
such as email, HTTP, and FTP. At this layer, data still resembles something that you can
actually read. The presentation layer is where data is first
converted into a form that can be sent over
57:30 - 58:00 a network. Data is compressed or decompressed,
and encrypted or decrypted. This layer is sometimes referred to as the translation layer. The session layer controls the dialogue during
communications. It establishes, manages, and terminates the connections between local and
remote applications. This layer is also known
58:00 - 58:30 as a traffic cop, because it directs network
traffic. The transport layer provides the transfer
of data between end users. It's responsible for resending any packets that do not receive
an acknowledgement from the destination, ensuring that the data packets were received by the
destination. This layer can guarantee that
58:30 - 59:00 the packets are received. The network layer is responsible for routing
the data packet based on its logical IP address. It fragments and reassembles the packets and
it instructs data and how to find its ultimate destination. The data link layer is responsible for sending
data to the physical layer. Data packets are encoded and decoded into bits. It handles
flow control and frame synchronization and
59:00 - 59:30 it's also divided into two sublayers: the
media access control layer, and the logical link control layer. The bottom of the OSI model is the physical
layer. And this layer defines the network standards and physical characteristics of
a network, such as the connectors, media types,
59:30 - 60:00 cables, voltages, etc. This layer defines
the topology of a network. An IP address is a numeric address. It's an
identifier for a computer or device on a network.
60:00 - 60:30 Every device has to have an IP address for
communication purposes. The IP address consists of two parts, the first part is the network
address, and the second part is the host address. There are also two types of IP addresses.
The first one is the most common one, it's called IP version 4. And the second type is
IP version 6. IP version 4 is the current version of IP
addresses. It's a 32-bit numeric address written
60:30 - 61:00 as four numbers separated by periods. Each
group of numbers that are separated by periods is called an octet. The number range in each
octet is 0 - 255. This address version can produce over 4 billion unique addresses. IPv4 is made up of 4 sets of 8 binary bits.
And these sets are called octets. The bits
61:00 - 61:30 in each octet are represented by a number.
So starting from the left, the first bit has a value of 128, then 64, then 32, and so on,
all the way down to 1. Each bit on the octet can be either a 1 or a 0. If the number is
a 1, then the number that it represents counts. If the number is a 0, then the number that
it represents does not count. So by manipulating
61:30 - 62:00 the 1s and the 0s in the octet, you can come
up with a range from 0 - 255. So for example the first octet in this IP
address is 66. So how do we get a binary number out of 66? First you look at the octet chart,
and you would put 1s under the numbers that would add up to the total of 66. So you would
put a 1 in the 64 slot. So now you already
62:00 - 62:30 have 64, so we need 2 more. So let s put a
number 1 in the 2 slot. So now if we can all the numbers that we have 1s underneath them,
you will get a total of 66. All of the other bits would be 0s because we don't need to
count them since we already have our number. So this number here is the binary bit version
of 66. So we'll put that number down here.
62:30 - 63:00 So let's do the next number which is 94. So
let's put a 1 under 64, 16, 8, 4, and 2. So if we were to add all the numbers that we
have 1s underneath them, we will get a total of 94. And since we don't want to count any
of the other numbers, we just put zeros under
63:00 - 63:30 the rest. So the next number is 29. So let s put a 1
under 16 ,8 ,4, and 1. And when you add all the numbers up, you get 29. And our last number is 13. So let's select
8, 4, 1, and when you add those up you get
63:30 - 64:00 13. When the internet was first developed, programmers
didn't realize how big it would become. They thought that IPv4, which produced over four
billion addresses, would be enough. But they were wrong, IPv6 is the next generation of
IP addresses. The main difference between
64:00 - 64:30 IPv4 and IPv6 is the length of the address.
The IPv4 address is a 32-bit numeric address, whereas IPv6 is a 128 bit hexadecimal address.
Hexadecimal uses both numbers and alphabets in the address. So with this type of address,
IPv6 can produce an unbelievable 340 undecillion
64:30 - 65:00 IP addresses. That's the number 340 with 36
digits after it. So as you might have guessed, IPv6 is more than enough for the foreseeable
future. So as stated before, IPv6 is a 128 bit hexadecimal
address. It s made up of 8 sets of 16 bits,
65:00 - 65:30 with the 8 sets separated by colons, as you
can see here. So in a similar way that we converted an IPv4 address to a binary number,
this is how we convert a binary number to a hexadecimal address. In an IPv6 IP address,
each hexadecimal character represents 4 bits. So we have to convert 4 bits at a time to
get 1 hexadecimal character.
65:30 - 66:00 So starting from the beginning, we convert
the first 4 bits and put those bits up there against our 4 bit chart which includes an
8, 4, 2, and a 1. So if we count the numbers that we have ones underneath them, you'll
wind up with a 2. So a 2 is the first hexadecimal character in this IPv6 address.
66:00 - 66:30 So let's do the next 4 bits and put those
under our 4 bit chart. So if we count all the numbers that we have ones underneath them,
we have a 4 and a 2, and if we add those up we get 6.
So a 6 is the second hexadecimal character in this IP address. So let's do our next set of 4 bits, and if
we add all the numbers that we have ones underneath
66:30 - 67:00 them, we get a total of 13. But the problem
is, since 13 is a double digit number, we cannot use a double digit number to represent
4 bits, and that's because in a hexadecimal format, double digit numbers have to be represented
with a single alphabet, which is A through F. So in this case we have to use another
chart for any 4 bits that the sum is 10 or
67:00 - 67:30 higher. So in this chart up here, if the sum
was 10, then we would use the letter A, or if the sum was 11, then we would use a B.
But in this case our sum is 13. So now for the third character in our binary number,
we would put a D.
67:30 - 68:00 So in our last example, let's do the fourth
set of bits. And if we add those up we get 11. So we have a double-digit character again,
which means that we have to convert it to a single character alphabet. So if we look
at our chart up here, 11 converts to a B. So the first 16 bits of this binary IPv6 address,
convert to the hexadecimal address as 26DB.
68:00 - 68:30 As stated previously, an IP address has two
parts, one part is designated for the network, and the remaining is designated for the host.
So the way to tell which portion belongs to either the network or the host, is where the
subnet mask comes in. A subnet mask is a number
68:30 - 69:00 that resembles an IP address. It reveals how
many bits in the IP address are used for the network by masking the network portion of
the IP address. So in this subnet mask, the first two octets are 255. So if we were to
look at this subnet mask in binary form, the first two octets would be all 1s, because
when you count all the numbers in an octet, it will equal 255. Now let's go ahead and
add our IP address with its binary form. So
69:00 - 69:30 the way to tell which portion of this IP address
is the network portion, is when the subnet mask binary digit is 1, it will indicate the
position of the IP address that defines the network. So we'll cross out all the digits
in the IP address that line up with the 1s in the subnet mask, and when you do this it
will reveal that the first two octets are the network portion, and the remaining is
the host portion.
69:30 - 70:00 Here is a chart of the default subnet masks
for a class A, B, and C, IP addresses. Notice the change of the locations of the network
and host portions between them. You should memorize these default subnet mask classes.
70:00 - 70:30 IP addresses are assigned to different organizations
in blocks. And these blocks are divided into five classes. But for the exam you only need
to know 3 of them. They are class A, class B, and class C, and you can tell by the number
in the first octet which class an IP address belongs to. So a Class A IP range is from
1 - 126. This class supports 16 million hosts
70:30 - 71:00 on 126 networks. This class is mainly given
to large organizations because of the tremendous amount of IP addresses it can give out. And a Class B IP range is from 128 - 191,
and this class supports 65,000 hosts on 16,000 networks. This class is given to medium-sized
organizations. And a Class C IP range is from 192 - 223.
This class supports 254 hosts on 2 million
71:00 - 71:30 networks. And this class is given to small
organizations. You're also going to need to memorize the default subnet masks for each
of these classes. Now if you noticed we skipped over the 127
range and that's because this number cannot be used for a network, because the number
127 address is reserved for internal loopback
71:30 - 72:00 functions. Public IP addresses are publicly registered
on the internet. Which basically means that if you have a public IP address, you have
access to the internet. But private IP addresses are different. A private IP is not publicly
registered, so you cannot directly access the internet with a private IP. So for example
let's say you have a small business and you
72:00 - 72:30 need 10 public IP addresses so your employees
can access the internet. Now you could contact your ISP and ask them for these additional
IP addresses, but that would be very expensive and unnecessary. So that's where private IP
addressing comes in. In private IP addressing, you can create these ten private IP addresses
and just have one publicly registered IP address from your ISP. These ten private IPs would
then be translated into the one public IP
72:30 - 73:00 so your employees can have access to the internet.
This not only saves money but it also helps prevent having a shortage of public IP addresses.
The RFC - 1918 standard created private IP addressing to prevent a shortage of public
IP addresses available to ISPs and subscribers.
73:00 - 73:30 Private IP addresses are typically used on
local networks such as homes, schools, and businesses. And these private IP ranges have 3 classes.
Class A starts with a number 10. Class B starts with the number 172. And class C starts with
the number 192.
73:30 - 74:00 The word subnet is short for subnetwork. Which
means a smaller network within a larger one. Subnetting is basically breaking down a large
network into smaller networks or subnets. It's mainly done to make your network more
manageable. So for example, let's say you have a company with 3,000 employees and your
ISP assigned you with a Class B IP address
74:00 - 74:30 with a default subnet mask. So as you know
from the previous lesson, a Class B IP address will allow you approximately 65,000 IPs for
all your computers. Now you could put all of your employees in one large network, and
if you had a small business then this would be fine. But if you had a fairly large business,
with for example 3,000 computers, then this could be a problem because of traffic issues
caused by so many broadcasts. And if a problem
74:30 - 75:00 word to occur, it'll be very hard to pinpoint
on one large network. Or in another scenario what if your business was scattered into three
different geographical locations, then this would also be a problem. So a better way would
be to break down your network into smaller ones or subnets. Subnetting is basically done by changing the
default subnet mask by borrowing some of the
75:00 - 75:30 bits that were designated for hosts and using
them to create subnets. So a default Class B subnet mask is 255.255.0.0. The first two
octets are for the network, the last 2 octets are designated for hosts. So let's say we
want to break down this network into three smaller ones. The formula we would use is
2 to the n power -2, where n equals the number
75:30 - 76:00 of bits we need to borrow from the host portion
of the subnet mask. So we need to make a custom subnet mask that is equal to at least 3 subnets
or larger. So if we put 2 in the place of n, then 2 times
2 equals 4 minus 2 equals 2. So 2 is not going to work because we need at least 3 subnets.
So let's try 3 and see if that works for us.
76:00 - 76:30 So 2 times 2 times 2 equals 8 and 8 -2 would
equal 6. So borrowing 3 bits will give us 6 subnets. Which will be fine because we need
at least 3 subnets.
76:30 - 77:00 So our new custom subnet mask is 255.255.224.0
which will give us 8,000 hosts per subnet. And now our network is broken down into 3
subnets.
77:00 - 77:30 Every computer on a network has to have an
IP address for communication purposes and there are two ways that a computer can be
assigned an IP address. It could be done either by using a dynamic IP, or a static IP. A dynamic
IP is where a computer gets an IP address automatically from a DHCP server. DHCP stands
for dynamic host configuration protocol. A
77:30 - 78:00 DHCP server automatically assigns a computer
with an IP address, and in addition to an IP address, it can also assign a subnet mask,
default gateway, and a DNS server. Here we have the TCP/IP properties window
open for the network interface card on a Windows machine. And as you can see this computer
is set to obtain an IP address automatically. So when you choose this option and press OK,
the computer will send out a request for an
78:00 - 78:30 IP address. Then the DHCP server will assign
an IP address from its pool and deliver it to the computer. Dynamic IP addressing is
the best choice because it makes managing a network a lot easier. You can also assign a computer with an IP
address manually, and this is called a static IP. A static IP is where a user manually assigns
an IP address for the computer. So there is
78:30 - 79:00 no need for a DHCP server. And this kind of
IP addressing is also known as permanent, because unlike dynamic addressing, where the
IP address can change automatically, a static IP only changes if a user decides to. When a computer is set to automatically obtain
a dynamic IP address, it gets the IP from
79:00 - 79:30 a DHCP server. But what happens if this computer
cannot reach a DHCP server? For instance what happens if a DHCP server goes down or if the
connection to the server is lost. If this happens then the computers that are running
Microsoft Windows 98 or later, the computer itself will assign its own IP address. This
IP address will be in the 169.254.0.0 network.
79:30 - 80:00 And this type of self-assigned addressing
is called APIPA, which stands for automatic private IP address assignment. Computers running
Microsoft Windows 98 or later do this so they can still be able to communicate with other
computers on the same network that also have self-assigned IP addresses. If a DHCP server
later becomes available, the computer changes
80:00 - 80:30 its IP address to one that's obtained from
a DHCP server. A DHCP server
assigns IP addresses to computers on a subnet from its scope. A scope is a group and a consecutive
IP addresses for computers that automatically gets their IP address from a DHCP server.
So for example, here we see a scope of IP
80:30 - 81:00 addresses from a DHCP service that's built
into a Netgear router. The range starts with this IP address and ends with this IP address.
These values can be customized to either increasing or decreasing the range. If you wanted a computer on your network to
have a specific IP address all the time, you
81:00 - 81:30 can create a reservation on the DHCP server.
A reservation ensures that a specific computer or device, identified by its MAC address,
will always be given the same IP address when that computer accesses the DHCP server. So
for example, on this router, if I create a reservation from my computer, the DHCP service
on the router will recognize my MAC address
81:30 - 82:00 and will always give me this specific IP address.
Reservations are not typically given to regular computers. They are typically given to special
devices or computers such as network printers and servers that require using the same IP
address constantly. When computers obtain an IP address from a
DHCP server, the DHCP server assigns the IP
82:00 - 82:30 address as a lease. So the computer doesn't
actually own the IP address, it's actually a lease, and a lease is the amount of time
an IP address is assigned to a computer. The lease duration could be a day or more depending
upon lease settings of the DHCP server. So for example if I do an ipconfig /all in a
command prompt on my computer, you can see
82:30 - 83:00 that the DHCP service on my router has assigned
my computer an IP address with a lease of 1 day. Typically a DHCP server will automatically
renew the IP address for you. So you won't have to do anything or even notice that the
IP address is being renewed, you can just continue on like normal and go about your
business.
83:00 - 83:30 As stated previously, when a computer needs
an IP address, it will broadcast its request to a DHCP server. And if a DHCP server is
on the same subnet as the computer, in other words if they are using the same IP address
settings, then the DHCP server will receive the request and assign the computer an IP
address. However if the computer and the DHCP server are not on the same subnet, in other
words they are not using the same IP address
83:30 - 84:00 settings, then the DHCP server will not receive
the request because broadcasts cannot go outside their own subnet. So that's where a DHCP relay comes in. A DHCP
relay or IP helper, is a service that is enabled
84:00 - 84:30 on a router that will relay a DHCP broadcast
it receives and forwards it. So now the computer will broadcast a request for an IP address
and once the DHCP relay on the router receives the broadcast, it will forward the broadcast
to the DHCP server. And then the DHCP server will send the IP address back to the computer.
84:30 - 85:00 Transmission control protocol is one of the
main protocols used in a TCP/IP network. Now this is a connection oriented protocol, which
basically means that it must first acknowledge a session between two computers that are communicating.
And it does this by using a three-way handshake.
85:00 - 85:30 The first step is that a computer will send
a message called a SYN, S.Y.N. Then the receiving computer will send back an acknowledgement
message telling the sender that it has received the message. And finally the sender computer
sends another acknowledgment message back to the receiver. And once this has taken place,
data can be delivered. Another important thing
85:30 - 86:00 to remember about TCP, is that it guarantees
the delivery of the data. So if a data packet goes astray and doesn't arrive, then TCP will
resend it. Now UDP is very similar to TCP. UDP is also
for sending and receiving data, but the main
86:00 - 86:30 difference is that your UDP is connectionless.
Which means that it does not establish a session and does not guarantee data delivery. So when
a computer sends their data, it doesn't really care if the data is received at the other
end. And that's why UDP is known as a fire and forget protocol, because it sends data
and it doesn't really care what happens to
86:30 - 87:00 it, as this demonstration will show. Another point to remember, is that because
of the less overhead that's involved of not guaranteeing data delivery, UDP is faster
than TCP. FTP stands for file transfer protocol, and
this is the standard protocol that is used by web users to upload and download files
between computers through the internet. So
87:00 - 87:30 if a user wanted to make their files available
to download to other users, all they would have to do is simply upload their files to
an FTP server and then a user can simply download them. Now there are a few ways to transfer files
using FTP. You can use your standard internet browser or you can use special FTP software.
It is also important to note that FTP is a
87:30 - 88:00 connection oriented protocol that uses TCP
for file transfer. TFTP stands for the trivial file transfer
protocol. And this is a very simple transfer protocol. It is not used to transfer files
over the internet like FTP does. It's mainly used for transferring files within the same
network, and it does not provide any security
88:00 - 88:30 during the transfer. And unlike FTP that uses
the TCP protocol for file transfer, TFTP is a connectionless protocol that uses UDP as
its transfer protocol. Now Secure FTP is just like FTP, except that
it adds a layer of security. The data using
88:30 - 89:00 secure FTP is actually encrypted using secure
shell during data transfer. So no sensitive data like passwords are sent in clear text. SMTP stands for simple mail transfer protocol.
Now this, as you might have guessed, is the protocol that is used to send email. A good
way to remember this is by looking at the
89:00 - 89:30 acronym SMTP, and translating that to sending
mail to people . SMTP uses the TCP protocol, and as you know by now, it is connection oriented.
So if an email you send does not reach its destination, you'll get that familiar mail
delivery error in your mailbox, informing you that the email you sent failed. Where SMTP is used for sending email, POP3
is the protocol that is used for receiving
89:30 - 90:00 email. Whenever an email arrives at your mail
server, you can retrieve it using the POP3 protocol and download it to your computer.
The main characteristic about POP3, is that all it does is grab the email from the mail
server and downloads the email to your computer.
90:00 - 90:30 It does not sync any email or folders from
the mail server and your computer like IMAP4 does, which we ll talk about next, it strictly
downloads the email. And typically when your email application using POP3 retrieves the
email from the mail server, the email is removed from the mail server, unless you specify in
your email application to keep a copy on the mail server. POP3 is commonly used with email
applications such as Microsoft Outlook.
90:30 - 91:00 IMAP4 is another protocol that is used for
receiving email. IMAP4 is similar to POP3 because they are both used for retrieving
email from a mail server, but IMAP4 has better features. With IMAP4 you can access and manage
your email on the server from your local computer.
91:00 - 91:30 So if you want to read your email and keep
a copy of it on the server, IMAP4 will allow you to do just that. And unlike POP3, IMAP4
syncs your email and your email folders from the mail server with your computer. And IMAP4
is also commonly used with Microsoft Outlook. HTTP stands for hypertext transfer protocol.
Now this is probably the most widely used
91:30 - 92:00 protocol in the world today. HTTP is the protocol
that is used for viewing web pages on the internet. So when you type in a web address,
for example google.com, you'll notice that HTTP is added at the beginning of the URL,
and this indicates that you are now using HTTP to retrieve this web page.
92:00 - 92:30 In standard HTTP, all information is sent
in clear text. Now normally this would be okay if you were just browsing regular web
sites. But if you were at a website where you had to enter sensitive data, such as passwords
or credit card information, then this would be a problem as far as security. HTTPS stands
for secure hypertext transfer protocol, and
92:30 - 93:00 this is HTTP with a security feature. HTTPS
encrypts the data that is being retrieved by HTTP. So for example, if you wanted to go to your
bank's website to check your account, you would notice that an S will be added to the
HTTP in the web URL. And this indicates that you are now using HTTPS and have entered a
secure website where sensitive data is going
93:00 - 93:30 to be passed, and that data needs to be protected.
Some other examples where HTTPS is used, would be email servers or e-commerce websites. Telnet is a terminal emulation program that
is used to access remote servers. It's a simple tool that runs on your computer and it will
allow you to send commands remotely. And because
93:30 - 94:00 it only sends commands and not graphics, it's
very fast. But the drawback is that it's not secure. All commands are sent in clear text.
So today, telnet is mainly used to access devices within a local network and not on
the internet. Now SSH or secure shell is a better alternative
to telnet. Secure shell protects the data
94:00 - 94:30 from being attacked or stolen as it's being
transferred over a network. So for example, if you were sending something sensitive, like
a login or password, a potential hacker could be listening and steal the data. And that
s the reason for secure shell. Secure shell acts like a secure tunnel that forms around
the data transfer, and protects it from potential threats. ARP stands for address resolution protocol,
and this is a protocol that is used to resolve
94:30 - 95:00 IP addresses to MAC addresses. Whenever a
computer needs to communicate with another computer on the network, it needs the MAC
address for that computer. So for example, let's say a computer wants to communicate
with another one. Now it will first look at its internal list called an ARP cache to see
if the targeted computer's IP address already
95:00 - 95:30 has a matching MAC address in its table. Now
if it doesn't, it will send out a broadcast message out on the network asking which computer
has the IP address. And the computer that has the matching IP address will respond back
informing that it has the IP it's looking for. Then the original computer will ask for
their MAC address and then once it receives it the communication it will take place between
the two. Now let's go ahead and see a demonstration
95:30 - 96:00 of this.
96:00 - 96:30 Now this is called RARP, which stands for
reverse address resolution protocol, and as you might have guessed this is just the opposite
of ARP. It s used to resolve MAC addresses to IP addresses. NTP stands for network time protocol, and
this is an internet standard that is used
96:30 - 97:00 to synchronize the clocks of computers with
the US Naval Observatory Master Clocks. This protocol runs on each computer and it sends
out periodic requests to the server to make sure the time is in sync. SCP stands for secure copy protocol and this
protocol simply uses secure shell to safeguard data as it's being transferred over a network.
97:00 - 97:30 And this is called simple network management
protocol, and this is a protocol used for network management. It's basically used for
collecting data from various network devices, such as routers, printers, and servers.
97:30 - 98:00 When data is sent over the internet to your
computer, it needs to know how to accept it, and your computer accepts this data using
ports, and these ports are categorized by 2 protocols, TCP and UDP. Now a port is a logical connection that is
used by programs to exchange information. And these ports have a unique number that
identifies them. The number ranges from 0
98:00 - 98:30 to 65535, but for the exam you only need to
know a few of them. So here is a chart of the ports that you need to know for the exam.
Some of these ports are very common and are used every single day, such as port 80, which
is used for bringing up web pages on the internet. Another one is port 443, which is used for
logging into secure web pages that require
98:30 - 99:00 a login and password, and another common one
is port 25, and this is used for sending email from an email application such as Microsoft
Outlook. DNS stands for domain name system. Now this
resolves domain names to IP addresses. In
99:00 - 99:30 the world of networking, computers don't go
by names like humans do, they go by numbers. So if you type in a web address in your web
browser, DNS will transform the name to a number, because all computers know are numbers.
So for a demonstration, when you type in yahoo.com in your web browser, the DNS server will search
through its database to find a matching IP
99:30 - 100:00 address for that domain name, and when it
finds it, it will transform that domain name to the IP address of a yahoo web server. so
DNS basically works like a phone book. When you want to find a phone number, you don't
look up the number first, you look up the name first, then it will give you the number.
100:00 - 100:30 Now WINS stands for windows internet name
service, and this is used on NETBEUI networks. This service is similar to DNS, and as you
recall, DNS resolves domain names to IP addresses but WINS resolves netbios names or computer
names to IP addresses. So if you wanted to communicate with another computer on the same
network, you would do so by using the computer's
100:30 - 101:00 name and then the WINS server would resolve
the name to the IP address of that computer. This is called Network Address Translation
or NAT. And this is a service that is typically used in routers, and this is used to translate
a set of IP addresses to another set of IP addresses. So for example, here we have a
private network, and it's using a set of private
101:00 - 101:30 IP addresses internally. Over here we have
the router with its public IP address, and this router is running the NAT service. If
a computer in this network wants to communicate over the internet, it needs to translate its
private IP address to the internet s public IP address. And this goes both ways. If a
computer on the internet wants to communicate
101:30 - 102:00 with a computer on this private network, then
the public IP address needs to be translated to the private IP address for that computer. Another version of network address translation
is called PAT, which stands for port address translation. Now this translates IP addresses
based on port numbers. Each computer in a private network is issued not only a unique
IP address, but they are also issued a unique
102:00 - 102:30 port number. This is done so that external
data packets from the internet knows which computer on the private network it wants to
talk to. So for example, if a device outside this network wanted to communicate with a
computer on this private network, the IP address along with its port number would be translated
by PAT to find the correct computer.
102:30 - 103:00 SNAT stands for a static network address translation.
And as you recall from a previous lesson, NAT translates a private network s IP addresses
to a public IP address. So in this example here, these private IP addresses will be translated
to this one single public IP address and vice versa. So what SNAT does is that it can link
a public IP address with a private IP address
103:00 - 103:30 permanently. And this is useful when a computer
or server needs to be accessed from outside the network. For example if one of these devices
here was a mail server. Now a proxy service is similar to your web
browser. Whenever you look at a web page, your web browser will store that web page
into cache. So at a later time, if you were
103:30 - 104:00 to look at that web page again, your browser
retrieves it much faster, because it doesn't have to download the contents of that web
page all over again, since it's already stored in your computer. And a proxy server does
the same thing. So for example if a company uses a proxy server, whenever a user wants
to retrieve a web page, the proxy server will retrieve the web page from the internet on
behalf of the user, and then it will store
104:00 - 104:30 that web page into a centralized cached database.
So if another user on a different computer goes to a web page that has been stored in
the proxy database, the proxy server does not have to go out on the internet to retrieve
the web page, it can simply retrieve it from its database and send it to the user. So a
benefit of using a proxy service is speed, since web page retrieval is much faster. Another
benefit is that it saves bandwidth, because
104:30 - 105:00 a proxy server reduces the need to go out
on the internet. And finally it provides security because it reports what web pages are retrieved
to the network administrator. Remote desktop protocol is a technology from
Microsoft to access a remote computer's desktop. RDP is based on Microsoft terminal services,
so if a user wanted to access another computer,
105:00 - 105:30 the user can simply type in an IP address,
along with the proper credentials, and then the user can have the remote computer s desktop
displayed on their own computer screen. When you have a lot of computers on a network
and they're all sending data, the potential for collisions is present, and when you have
collisions, data communication is lost. So
105:30 - 106:00 that's why they developed a protocol called
CSMA/CD, which stands for carrier sense multiple access collision detection. And this is the
access method used on ethernet networks. And this method works by each computer first sensing
if the wire is idle, and if it is, it sends its data, therefore avoiding any collisions.
But if you have two computers trying to send
106:00 - 106:30 data at the same time, a collision will happen,
and if a collision happens the computers will wait a random amount of time and retries to
send their data. CSMA/CA stands for carrier sense multiple
access with collision avoidance. And this is the access method used for carrier transmission
in wireless networks. Now this method is similar to the CSMA/CD, except that when a computer
wants to send its data, it first sends out
106:30 - 107:00 a small data packet to make sure that the
channel is clear before sending out its main data. If the packet is successfully transmitted,
then the computer is clear to send out its main data. The term broadcast refers to when there was
a single transmitter of data and that data is being received by multiple receivers. For
example a wireless router can broadcast its
107:00 - 107:30 wireless signal and be picked up by multiple
computers to access the internet. The difference between unicast and multicast,
is that with unicast, the data packets are sent to a single destination. And with multicast,
the data packets are sent to multiple destinations at the same time.
107:30 - 108:00 For the Network+ exam there are a few routing
concepts and protocols that you're going to need to know, and one of them is called a
loopback interface. A loopback interface is a fake or virtual interface that is created
on a router. It s not a physical interface,
108:00 - 108:30 it's virtual, and this virtual interface is
assigned an IP address of your choice and the purpose of a loopback interface is for
testing and administration purposes. So as an example, let's assign an IP address to
a loop-back interface on a Cisco router. So in a terminal window, and by the way you don't
need to know all this as far as creating one, you just need to know that for the exam that
it's used for administration and testing.
108:30 - 109:00 So back to our terminal and while we are in
configuration mode, we enter int for interface, then loopback0, then an IP address of our
choice, and then a subnet mask, and then you're done. A routing table is a file that contains a
set of rules that shows information on what
109:00 - 109:30 path a data packet takes to its destination.
For example, a router uses routing tables. So as a data packet arrives at the router,
the router looks at its routing table to find out where to forward the data packet along
the best path to its destination. So a basic routing table contains a network
destination, which is an IP address of the final destination. A subnet mask, which determines
which part of the IP address is the host and
109:30 - 110:00 network portion. A gateway, which tells the
router which IP address the data packet should be forwarded to. The interface which is the
outgoing IP address of a device that is sending the data. Next hop, which is the IP address
to which the IP address is forwarded to. And
110:00 - 110:30 a metric, and this determines the best route
among multiple destinations. If you were traveling to a certain destination
anywhere in the world, for example on vacation, most likely you will need directions or a
map on how to get there. Well in the world of networking, it works the same way. In order
for data to travel across a network and reach its destination, it needs a map to determine
the best path to take. And the way it does
110:30 - 111:00 this is by using routing protocols. Routing
protocols collect information about the current network status and map out the best path for
data packets to take to their specific destination. Now there are three different types of routing
protocols. There is distance vector, link state, and hybrid.
111:00 - 111:30 Distance vector protocols factor in distance
to the destination based on how many hops. And a hop refers to how many routers a data
packet has to go through to reach its destination. So for example, for data to travel between
these two end routers here, it would take three hops. One, two, and three. And one of the distance vector protocols is
called RIP which stands for routing information
111:30 - 112:00 protocol. RIP is the oldest routing protocol.
Routers that use RIP, broadcast the routing information to other routers every 30 seconds
regardless if the routing information has changed or not. So as a result of this, as
networks got larger, this caused a lot of unnecessary traffic on a network. So the developers
created RIP version 2, which solved the problem
112:00 - 112:30 of excessive broadcast traffic that RIP version
1 caused. And another distance vector routing protocol
is called BGP, which stands for border gateway protocol. And this is the standard routing
protocol of the internet. It determines routing directions that are based on paths and policies.
112:30 - 113:00 In addition to distance vector protocols,
there is also link state. Link state is a routing protocol that is used by routers to
share information and independently map out the best path on a network. Two examples of
link state protocols are OSPF and IS-IS. OSPF stands for open shortest path first,
and this is a routing protocol that is used
113:00 - 113:30 to determine the correct route for data packets
to take to their destination. It collects information from other routers using IP, and
it creates a topology map of the network. And another link state protocol is called
IS-IS, which stands for intermediate system to intermediate system. And in this system
the routers are organized into a domain. Meaning
113:30 - 114:00 that the routers are organized into groups.
And this is how IS-IS primarily functions, is within these domains. And unlike OSPF,
where it uses IP to communicate, IS-IS uses CLNS instead, which is a connectionless network
service. And another type of routing protocol is called
a hybrid, and in this case we re talking about
114:00 - 114:30 EIGRP, which stands for enhanced interior
gateway routing protocol. And this is a combination of distance vector and link state protocols,
and it only runs on Cisco routers. It is fast, it has less overhead, and it can support many
network layer protocols.
114:30 - 115:00 SIP stands for session initiation protocol.
And this protocol is used for establishing communication sessions over the Internet.
For example, voice over IP, which is a term that is used for voice communications over
IP networks. It is also used for services such as instant messaging and conferencing.
And SIP operates at the application layer
115:00 - 115:30 in the OSI model. RTP stands for real-time transport protocol,
and this protocol is the internet standard for transporting real-time data such as streaming
audio and video. RTP is often used over UDP, so it doesn't guarantee data delivery. RTP
is also used with RTCP, which stands for real-time
115:30 - 116:00 transport control protocol, and this enables
you to monitor the quality of the data being delivered. And lastly RTP can be used to send
data in both unicast and multicast.
116:00 - 116:30 When data is sent across a network, it is
not sent as one large piece. The data is actually divided into smaller pieces or data packets,
and then they are sent individually. These data packets are sent using two different
methods, packet switching and circuit switching. In packet switching, the data packets take
different routes to their destination. And once all the data packets their destination,
they are recompiled into the original message.
116:30 - 117:00 This method of communication is also known
as connectionless. The internet mostly uses packet switching technology. Now circuit switching also sends data packets
individually, but unlike packet switching, which sends data on different routes, circuit
switching does the opposite. In circuit switching,
117:00 - 117:30 all the data is sent along the same dedicated
route. A good example of circuit switching would be telephone lines. ISDN stands for integrated services digital
network. This is an international standard for digital transmission over ordinary telephone
lines. In order to use ISDN, users had to install ISDN modems. This was a significant
improvement in speed over the standard modem,
117:30 - 118:00 because a standard modem sends data at a maximum
speed of 56 Kbps. But ISDN sends data at 128 Kbps. But ISDN never really caught on, because
of the faster speeds of DSL and cable. T1 lines are probably the most commonly used
internet service for businesses today. It's
118:00 - 118:30 a dedicated connection that supports data
rates of 1.544 Mbits per second. A T1 line consists of 24 individual channels that each
carries a rate of 64 Kbps. Each of these channels can carry data or voice traffic. A T3 line is a high-speed internet connection
that supports rates of 43 Mbits per second.
118:30 - 119:00 It consists of 672 individual channels, and
each of these carries a rate of 64 Kbps. T3 lines are mainly used by internet service
providers that connect directly to the backbone of the internet. An E1 line is similar to
a T1 line, but an E1 line is the format that
119:00 - 119:30 is used in Europe for digital transmission.
The speed is 2 Mbits per second and consists of 32 channels that carry 64 Kbps of data. And an E3 line is the European equivalent
of a T3 line. It has a speed of 34 Mbits per second, and has fewer channels than a T3 line.
119:30 - 120:00 OCx stands for optical carrier. These are
levels that describe the speed of networks that can be carried on SONET, which stands
for synchronous optical network. It s a fiber-optic technology that delivers voice, data, and
video, at high speeds. The OC levels are calculated by multiples of 51.84 Mbits per second. These levels are shown on the following table,
and you can get the speeds by multiplying the level X 51.84.
120:00 - 120:30 DSL stands for digital subscriber line. And
this is a popular technology that is used
120:30 - 121:00 by homes and businesses to access broadband
data over the internet. The advantage of DSL is that they can carry both voice and data
at the same time. It has a DSL modem that uses common telephone lines to carry its data.
It s a high-speed connection that is much faster than your regular dial-up modems.
121:00 - 121:30 There are a few different forms of DSL, and
one is called a ADSL, which stands for asymmetric digital subscriber line, and this is called
asymmetric because the download speed is considerably faster than the upload speed. This type of
DSL is typically used in homes and is the cheapest form of DSL. SDSL stands for symmetric digital subscriber
line, and as the name implies, the download
121:30 - 122:00 and upload speeds are the same. This type
is typically used in businesses. And VDSL stands for very high bit DSL, and
this is a very fast form of DSL. It has download speeds of over 50 Mbits per second over a
copper wire. But because it uses copper wire,
122:00 - 122:30 it's only made for short distances. For long
distances, it can also use fiber optic cable. Another popular technology that is used to
access the internet is broadband cable. Cable is by far becoming the technology of choice
by many homes to access the internet. It uses a cable modem with an attached coaxial cable,
which provides a link to the internet service
122:30 - 123:00 provider. Like DSL, cable is very fast, with
speeds of 50 Mbits or more. Cable is typically provided by the same provider that provides
cable television to their customers. POTS/PSTN stands for plain old telephone service
and public switched telephone network. And these are just your plain old telephone lines.
And these are slowly becoming obsolete by
123:00 - 123:30 people who use the internet because of their
slow speeds. So if you have ever used a high-speed internet such as broadband, you will never
go back to using the slow speeds of 56 K, which is the speed of a standard dial-up modem.
However telephone lines do have an advantage, and that is that they are basically everywhere
and they are fairly cheap to use.
123:30 - 124:00 Satellite communication is pretty expensive
and it's mainly used where no other services are provided, like phones, cable, or DSL.
But because of the increasing availability of these other options, satellite is rarely
used. The speed of satellite has increased throughout the years, with speeds maxing out
around 15 Mbits per second, with only a fraction
124:00 - 124:30 of that in upload speeds. Another method of connecting to the internet
is by using mobile hotspots. And mobile hotspots are portable devices that use cellular networks
to connect wireless devices to the internet. So if there are wireless devices within 30
feet of the mobile hotspot, they can join it and then they will have access to the internet.
Mobile hotspots come in two forms. They will
124:30 - 125:00 either be a free-standing device like you
see here, or they can come as a feature built into a smartphone. And mobile hotspots are
available through cell phone carriers, such as Verizon, AT&T, T-Mobile, and Sprint. Another broadband internet technology is called
WiMAX. And much like your home wireless network, where it covers your home, WiMAX covers much
larger areas. WiMAX is basically a super wireless
125:00 - 125:30 network that can cover entire cities or countries.
WiMAX works with WiMAX towers that are scattered in different geographical locations, and these
towers directly connect to an internet service provider typically with a T3 line. Each Tower
covers a certain area just like a cell phone tower does. And to pick up the transmission
of these towers, you need a receiver in your
125:30 - 126:00 home or computer to receive the signal, and
once that is done, you can now access the internet. WiMAX does have the potential of
replacing DSL and cable service because it can provide internet access to places where
cable and DSL can't reach. Metro ethernet is simply a metropolitan area
network or MAN, that is based on ethernet
126:00 - 126:30 standards. And it s basically used to connect
businesses and residential users to a larger network, such as the internet, using ethernet.
Metro ethernet is fairly simple and cheaper to use because it doesn't require any specialized
cabling or equipment like other expensive technologies require. It only uses equipment
and cabling related to ethernet, which is
126:30 - 127:00 by far the most common internet technology
today. So even though end users are not sure what technology their internet service provider
is providing in the middle, what matters is, is that on both ends, it's using ethernet
connectivity.
127:00 - 127:30 The word PAN stands for personal area network.
And this is a type of network that is used on a personal level. It's a small network
that is basically used for connecting things like mobile phones, PDAs, and laptops to each
other, using bluetooth. PANs are generally used for transferring small files, such as
music, photos, calendar appointments, and so on.
127:30 - 128:00 Now a LAN stands for local area network. And
a local area network is a group of devices such as computers, servers, and printers that
are basically located in the same building. In other words, in close proximity to each
other. The most common type of LAN is an ethernet LAN where two or more computers are connected
to CAT 5 ethernet cables using a switch. A MAN stands for metropolitan area network.
Now this is a larger network than a LAN. It
128:00 - 128:30 s a network that spans over several buildings
in a city or town. MANs are typically connected using a high speed connection such as fiber
optic cable. And finally there s the wide area network
or WAN. And a WAN is the largest type of network.
128:30 - 129:00 It s a network that spans over a large geographical
area such as a country, continent, or even the entire globe. A good example of a wide
area network is the internet. Stands for supervisory control and data acquisition.
And this is software that is used for controlling and monitoring equipment that is used in industrial
facilities such as power plants, water treatment
129:00 - 129:30 plants, or refineries. SCADA communicates
with sensors and systems in real-time that are out in these industrial facilities and
those sensors and systems send back information to PLCs or programmable logic controllers
and RTUs or remote terminal units, which then sends it to the SCADA computers to be analyzed.
And this information could be things like
129:30 - 130:00 how to reduce waste, or how to improve efficiency,
or if there are any problems. SCADA is also often referred to as ICS which stands for
industrial control system, which is a general term that encompasses SCADA systems. Cell phones also access the internet and make
phone calls by using radio systems such as
130:00 - 130:30 a GSM and CDMA. GSM stands for global system
for mobiles and is the largest radio system that is being used around the world, including
major carriers such as AT&T and T-Mobile and it's widely used in Europe. GSM works by changing
your voice into a digital form and that data is assigned a time slot. Then as the data
is received on the other end the assigned
130:30 - 131:00 time slot of data puts the call back together.
And CDMA which stands for code division multiple access is another radio technology that is
not as widely used as GSM, but it's the system that is used by major carriers such as Verizon
and Sprint. And CDMA works by data being encoded with a unique key.
131:00 - 131:30 4G LTE which stands for 4th generation long
term evolution is a technology that was developed by the 3rd generation partnership project.
Currently it offers the fastest wireless communication speed available with speeds of over 100 Mbits
per second which is many times faster than the speed of 3G or 3rd generation. 3G technology
offers speeds anywhere from 384 kbps to 2
131:30 - 132:00 Mbits per second. And prior to 3G was Edge
and Edge stands for enhanced data rates for GSM evolution. Edge is a painfully slow technology
that has speeds not much different than using a regular dial-up modem with speeds starting
around 75 kbps.
132:00 - 132:30 Remote access service is a technology that
enables you to connect to a computer from a remote location, for example from your home
to your job. It allows the services which would be available on a remote network to
be accessed over a dial-up connection. RAS
132:30 - 133:00 was originally developed by Microsoft and
built into their Windows NT line of service software and it works with major network protocols
such as TCP/IP, NETBEUI, and IPX/SPX. SLIP stands for serial line internet protocol.
This is a protocol for communication between two computers using a serial connection such
as a typical phone line. But SLIP is rarely
133:00 - 133:30 used anymore because it's not a secure protocol.
During a dial-up connection it says all data including sensitive data like passwords in
clear text. So SLIP falls short because security is a major issue in today's world. SLIP also
does not provide any error checking and is limited to using only the TCP/IP protocol.
So a better protocol was needed to address
133:30 - 134:00 these issues and that protocol was PPP. PPP stands for point-to-point protocol. And
this is a standard remote access protocol that is used today. It was developed to replace
SLIP s limitation and security, error checking, and protocol support. And like SLIP, this
is a protocol that's used for communication between two computers using a serial connection
such as a typical phone line. But unlike SLIP
134:00 - 134:30 this is a secure protocol. Most internet service
providers use this protocol for their customers who want to access the internet using a dial-up
connection. Point-to-point protocol over ethernet is exactly
what its name implies. This protocol uses PPP over ethernet. It works by encapsulating
PPP frames and ethernet frames. People who
134:30 - 135:00 use this protocol have a DSL, broadband, or
wireless connection to the internet. It s also used for connecting multiple users on
a local area network to a remote site sharing a common device. This is called point-to-point tunneling protocol.
And this technology is used for creating virtual
135:00 - 135:30 private networks or VPNs. In fact this is
the default protocol associated with VPNs. This ensures that the transfer of data between
one device to another is secure by creating a secure tunnel between the two points. GRE or generic route encapsulation is a protocol
that is used with point-to-point tunneling
135:30 - 136:00 protocol in creation of a VPN network. GRE
is what actually creates the tunnel and PPTP. It is used to encapsulate the data in a secure
manner. A VPN is a virtual private network. It's a
private network that uses a public network, such as the internet, to establish a remote
connection. The data is encrypted as it is
136:00 - 136:30 sent and decrypted when received. It provides
a dedicated link between two points over the internet. Now the way a VPN is created and managed is
by using a VPN concentrator. A VPN concentrator is a device that creates the VPN connections
and manages the delivery of the messages between the VPN computers and devices. It also authenticates
users and encrypts and decrypts the data and
136:30 - 137:00 assigns tunnel IP addresses to users. However
VPN concentrators are not always needed to manage and create VPNs. They are mainly used
in organizations that are going to use a lot of VPN connections and they need a device
to handle the heavy traffic that VPNs create. If an organization is only going to use a
small amount of VPN connections then they
137:00 - 137:30 can just use the VPN software that is built
into the router or firewall rather than using a VPN concentrator. Now there are 3 different types of VPN connections.
And one type is called site-to-site. And this is when an organization has two offices in
different geographical locations and they
137:30 - 138:00 want those offices to be networked and share
data with each other over the public internet. So they would just need to set up a site-to-site
VPN connection and the VPN will encrypt the data as it goes through the internet and then
decrypt the data as it enters the organization's private network. Creating a site-to-site VPN
creates an alternative to an internet leased
138:00 - 138:30 line at a much cheaper cost. Another type of VPN connection is called host
to site. So for example, if you're at home with your computer and you need to connect
to your office at a different location so you can access files, then you would need
to set up a host to site VPN connection. Now generally this type of connection doesn't
require any additional hardware on your end
138:30 - 139:00 at home to establish this type of connection.
You would basically just need your computer's operating system to connect to your office
s VPN hardware. And once the connection is made then you can access your office s network
over the internet. So all the special VPN hardware would be on the office or the site
side of the connection, and not at your home.
139:00 - 139:30 And lastly there is the host to host VPN connection.
And this is simply when you want to establish a VPN connection between two computers over
the internet. Now this type doesn't require any additional VPN hardware at either end.
It only requires the software on each computer to create a simple host-to-host VPN connection.
139:30 - 140:00 Authentication is confirming something that
is authentic or true. In computers, authentication is the process of verifying the identity of
a user such as a username or password. In the world of networking there are several
protocols that are used to achieve authentication.
140:00 - 140:30 So the first protocol we're going to discuss
is called PAP or password authentication protocol. Now this is a very simple authentication protocol.
In fact it's so simple that it is compatible with just about everything. But the downside
is that it is not very safe. All sensitive data like usernames and passwords are sent
in clear text.
140:30 - 141:00 Challenge handshake authentication protocol
for CHAP is a better alternative to PAP because it encrypts usernames and passwords. This
protocol authenticates by the server asking or challenging the client to validate Itself
by using a three-way handshake. So after a connection has been made, the server sends
a challenge to the client, then the client responds by using a one-way hash function
with the answer. Then the server checks the
141:00 - 141:30 response against its own calculation, and
if the value matches, then the authentication is passed. Now MS-CHAP is Microsoft's version of CHAP.
There are two versions of MS-CHAP, there is MS-CHAP and MS-CHAP 2. MS-CHAP is basically
CHAP. So it only authenticates the client. But MS-CHAP 2 offers mutual authentication.
Both the client and the server are authenticated.
141:30 - 142:00 So it's more secure. Now radius is a protocol that enables a single
server, such as a domain controller, to handle all authentication. It allows a company to
store user access data in a central location. Users log into the radius server and that
makes the request on the user's behalf after
142:00 - 142:30 authenticating. Kerberos is an authentication protocol that
was developed by MIT. And it authenticates by using tickets. In order for a client to
access network resources, it first authenticates itself with the Kerberos server. Then after
authentication, the client is issued a ticket which then gives the client access to the
network resources
142:30 - 143:00 And EAP stands for extensible authentication
protocol. And this is an extension to PPP. It s a general protocol that supports many
methods of authentication. And the most common one that is associated with is smart cards.
143:00 - 143:30 If you re already a network administrator,
then the most common tool that you ve probably used is the wire crimper. And this tool is
used to make custom length network cables. It crimps adapters such as the RJ-45 to twisted
pair cables. So after you have attached your RJ-45
adapter to your cable, you just place it into
143:30 - 144:00 the crimper, give it a squeeze, and the cable
is done. A punch down tool is a tool that resembles
a screwdriver. And this is simply used to connect or punch wires to a punch-down block.
144:00 - 144:30 Another network tool is a media tester. So
after making a custom length cable using your wire
crimper, it's a good idea to test the cable to make sure it's wired correctly. So you
would just connect both ends of the cable into the tester,
and then the tool will check the cable for you. The plastic shielding around a network cable
must be removed in order to crimp a connector.
144:30 - 145:00 And this is done by using a cable stripper.
The cable is then inserted into the tool and then the outer plastic shielding is removed. A time-domain reflector is a piece of electronic
equipment used to test cables such as unshielded twisted pair and coaxial cable. This test
is done by transmitting a signal through a cable and then the signal is reflected back
to the TDR. The TDR then analyzes the reflected
145:00 - 145:30 signal and from there is able to pinpoint
if there are any problems. And these problems include conductors, loose connectors, shorts,
crimps, bends, and so on. An optical time-domain reflector or OTDR does
the same thing as a TDR. But it is used on
145:30 - 146:00 fiber optic cable. Instead of transmitting
a signal, it transmits light through the cable to detect problems. A multimeter is a device that is used to test
electrical circuits. It's a popular tool that is used for many different trades. It can
measure voltage, resistance, current, and
146:00 - 146:30 continuity, just to name a
few. And it comes in both analog and digital versions. A lot of telephone technicians carry a piece
of equipment called a butt set. And a butt set is a device that resembles a telephone
and it is used to test and monitor telephone lines. The technician will hook up the device,
and as its name implies, butt into a line
146:30 - 147:00 to hear a conversation to determine if there
are any problems such as noise or something simple like just detecting if there is a dial
tone. A voltage event recorder is a device that
is used to collect data about the quality of electrical power. The tool is inserted
into a power outlet where it checks for electrical
147:00 - 147:30 sags, swells, and variations in frequency.
It comes with software that is installed on a computer. And the data about the power quality
is downloaded and analyzed. And this tool is called a tone generator.
And this is also known as a fox and hound.
147:30 - 148:00 Now this tool is used for locating cables
from one end to the other. So for example, if you suspect that you have a bad cable that
was grouped with a lot of other cables, and that group was stretched over a long distance,
it would be very difficult to isolate one end of the cable from the other.
So that's where a tone generator comes in. So you just connect the tool at one end, and
then it would generate a tone through the cable, where the other part of the tool would
detect the sound and pinpoint the cable.
148:00 - 148:30 A protocol analyzer is also known as a packet
sniffer. And this is a software or hardware tool, and this is used to troubleshoot and
analyze traffic on a network, such as logs, data packets, broadcasts, and so on. It can
detect network problems, intrusion attempts,
148:30 - 149:00 and monitor networking issues, so a technician
can correct the problem. A very common software protocol analyzer is called Wireshark, and
it can be downloaded for free at wireshark.org. A virus is a harmful program that is written
to alter the way a computer operates. Most of the time users do not know that they have
a virus until it's too late. Most viruses
149:00 - 149:30 are transferred from the internet such as
websites, downloadable programs, and email. If a computer virus is not detected and removed
it could spread and cause serious damage to computers and servers in a network. So that's
why today network administrators need to use antivirus software. Antivirus software is
the number one protection against viruses. It s a software program that scans for viruses
on your computer's hard drive, targets them,
149:30 - 150:00 and destroys them before any damage can be
done. It is also important to remember to always keep your antivirus software updated.
Most updates, if not all, can be downloaded over the internet. In order to maintain optimum
protection against viruses, you need to scan your computers on your network on a regular
basis. When working on a computer it's important
to not do any damage to the computer components
150:00 - 150:30 that could be caused by ESD which stands for
electrostatic discharge. And ESD happens when two objects of the opposite charge such as
your hand and a computer part, come in contact with each other. And when this happens a sudden
charge of electricity flows through the two objects. And this sudden charge of electricity
can damage computer components. So to prevent
150:30 - 151:00 this from happening it's important to wear
an ESD wrist strap. By wearing an ESD wrist strap it can stop the buildup of static electricity
in your body by safely grounding you. One end of the ESD strap fits around your wrist
and the other end is grounded. The grounded end can be either attached to the ground pin
in a power outlet or clipped onto the metal case of the computer.
151:00 - 151:30 Another thing you can do to protect against
ESD is by using an ESD mat. An ESD mat is typically placed on a desk where assembly
takes place. And the mat removes any electrical charge from the components that are placed
on it. And just like an ESD wrist strap and ESD mat is also connected to a ground. When dealing with our environment it's important
to understand what is the proper way to dispose
151:30 - 152:00 certain pieces of equipment so that it doesn't
affect the environment in a negative way. And computer-related equipment is no exception.
For example computers contain lead and harmful chemicals such as mercury that is harmful
to the environment and for this reason they must be disposed of in a proper way. And if
you're not sure how to dispose it, there is
152:00 - 152:30 a datasheet you can find called the MSDS which
stands for material data safety sheet. And this will tell you the proper way to dispose
that particular piece of equipment. The MSDS would typically be offered by the manufacturer
or you can download a copy of it from the EPA. As a computer technician it's always important
to quit safety as a priority when doing any kind of repair work. And if you put certain
safety rules into practice, you'll save yourself
152:30 - 153:00 a lot of time, money, and potential physical
harm. So for example, always be sure to turn off the power and unplug the power cable before
doing any hardware repair work. This should be your first step before doing anything.
This will protect you from being shocked and prevent damage to the computer. Another precaution
you can take is to remove any hand jewelry
153:00 - 153:30 that you might be wearing such as rings, bracelets,
or wrist watches. Because these can potentially conduct electricity. Another tip is to always
take note where a fire extinguisher is located and how to use it properly in case a fire
happens. And in the computer field, a class C fire extinguisher is what you need because
a class C is made for electrical fires. It
153:30 - 154:00 uses a dry chemical powder to extinguish the
flame. Another safety tip is cable management. Maintaining
a safe work environment is a major part of any job and tripping hazards is a vital part
of it. So if you have cables running across walkways, you could be in a high risk for
a tripping accident. So the quickest way to fix this is to simply relocate any cables
that go across any walkway and move them somewhere
154:00 - 154:30 else. Or if by some reason this can't be done,
then you can always use something like a cable manager cover which neatly organizes the cables
in a way where you can't be tripped by them and high traffic walking areas. And another tip is proper lifting. So if you
have to lift a heavy object it's important
154:30 - 155:00 that you lift the object properly to avoid
any injury. You never use your back to lift a heavy object. You always use your legs.
So start out with your feet shoulder-width apart, squat down, maintain good posture by
keeping your back straight at all times, and slowly lift by straightening out your legs
155:00 - 155:30 The traditional way a business operates is
by using different machines or servers to run different services according to what the
business needs. For example, a business would use a server to run their database, another
server will be used to run their website, another server would be used to run their
email service and so on. And these servers
155:30 - 156:00 also could be running different operating
systems. One could be running Linux, the other could be running Solaris, and the other one
could be running Windows. So needless to say, running a server environment like this can
be expensive. Not only do you have to pay for the server hardware, but you have to pay
for the floor space, the management and the maintenance of the equipment. But there is a new trend that is happening
in the world of I.T., and this is called virtualization.
156:00 - 156:30 And virtualization is basically consolidating
all of these physical servers, with their different operating systems and applications,
and running them on just one physical server in a virtual environment. So now this one
server is running all of the different applications like databases, web services, and email, all
running side-by-side on one machine. And not
156:30 - 157:00 only the applications but also run the different
operating systems side-by-side. So users that interact with a virtual server would interact
the same way as if they were still on multiple physical servers. They won't be able to tell
the difference. So needless to say, virtualization saves money. Not only does it save money on
hardware but also on storage space, maintenance,
157:00 - 157:30 and management. In addition to virtual servers there are other
virtual devices such as virtual switches. And a virtual switch is not a physical switch
but it's a software switch that's created in a virtual environment. So for example,
if you wanted your virtual database server to be able to network and communicate to your
virtual web server, you can just add a virtual
157:30 - 158:00 switch to do that. And once the switch is
added then those two virtual servers can now communicate with each other. And there is also a virtual router. And a
virtual router performs just like a physical router. It can route data packets between
your virtual servers and the internet according to what the business needs are. And lastly there is a virtual firewall which
is another virtual device that can filter
158:00 - 158:30 network traffic and monitor that traffic for
your virtual servers just like a physical firewall does. Now the term cloud computing refers to data
and applications being stored and run on remote servers rather than being on your local computer.
Then this data and applications that are on these remote servers are accessed and run
via the internet. So the workload is no longer
158:30 - 159:00 on your local computer, it's on the cloud.
So back in the old days before cloud computing and as an example, we ll use email. So at
your home or office, if you wanted to use email, you would have your own physical email
server. So you would have a server, and an operating system, and email software like
Microsoft Exchange, then you would be able
159:00 - 159:30 to use email. But the problem is that if anything
goes wrong such as a hardware failure or a software problem or if the operating system
crashes, well then you would be responsible for fixing the problem. Not to mention any
maintenance that is needed to keep the server running. But now you have the option of eliminating
all the hassle and upkeep of your own email server and have a company host all your email
on their servers on the cloud for you. Like
159:30 - 160:00 for example, Hotmail and Gmail. But email
is just one example of cloud computing. There are also other services such as productivity
software, web servers, databases, and so on Now there are three different types of cloud
computing. There's infrastructure-as-a-service or IAAS, platform-as-a-service or PAAS, and
software-as-a-service or SAAS. Now these three
160:00 - 160:30 vary in control and flexibility. So it's up
to the user as to decide what suits their needs. So the first one is infrastructure-as-a-service.
And this type is basically when you're going to let the third party vendor manage a portion
of your business which is going to be the hardware portion. The third party vendor will
manage the servers, storage, virtualization,
160:30 - 161:00 and the networking portion. You on the other
hand will still have control over the software portion, such as the applications, data, operating
system, middleware, and run time. A good example of IAAS would be a web service company like
Amazon Web Services.
161:00 - 161:30 The next one is called platform-as-a-service.
And PAAS like IAAS allows the third party to manage a portion of your business but the
third party has more control. In a PAAS the third party vendor not only manages the hardware
such as servers, storage, and networking, but they also manage the operating system,
middleware, and runtime. You are only responsible
161:30 - 162:00 for the applications and the data. And a good
example of a PAAS would be Microsoft Azure which is a cloud computing platform from Microsoft. And lastly there's software-as-a-service or
SAAS. And this type is probably the most common cloud service so far. All the applications
are hosted by a third party vendor on the internet. There is no software to install
on your computer. No hardware to manage. You
162:00 - 162:30 just simply access and run the application
from your computer when you connect to the cloud service via the internet. So the third
party vendor manages all the hardware, software, networking, operating system, and storage.
And Google Apps as a great example of SAAS. If you want to store data in a centralized
location, where it can be accessed from all
162:30 - 163:00 of your other devices on your network, you
can do this by using a network attached storage device. A network attached storage device
is a storage device that is used strictly for storing data. And it doesn't do anything
else besides storing data. Typically an NAS will have multiple hard drives in a RAID configuration
for redundancy and a network interface card
163:00 - 163:30 that directly attaches to a switch or router
so that the data can be accessed over a network. And then once it's on the network it can be
accessed from other devices such as desktops, laptops, and tablets, through a shared folder. Now a SAN or a storage area network is a special
high-speed network that stores and provides
163:30 - 164:00 access to large amounts of data. And this
network consists of multiple disk arrays and servers that access this data as if it was
a local hard drive, because that's how operating systems recognize a SAN. It s recognized as
a local attached hard drive rather than a shared drive like on a NAS. SANs are independent
of servers. They are not limited or owned
164:00 - 164:30 by a single server. In fact, multiple servers
are attached to a SAN. So all the data is available to all the servers simultaneously. SANs are also easily expandable and they are
very redundant because all the data is shared among several disk arrays. So if a disk array
fails then the data is not lost because the data will be stored in multiple areas. And
as I mentioned before a SAN is a high-speed
164:30 - 165:00 network and that's because in a SAN all the
devices are interconnected using fiber channel which is a standard for SAN that has network
speeds starting at over 2000 Mbits per second. And as an alternative to using fiber channel
there is iSCSI. And iSCSI stands for internet small computer system interface which is a
data storage protocol that transports iSCSI
165:00 - 165:30 requests over standard TCP/IP. A 66 block is a punch down block where wires
are inserted. The wires are inserted using
165:30 - 166:00 a punch down tool and then they are punched
down into the block. 66 blocks are considered outdated and they are not used much anymore. A modern day punch down block is called a
110 Block. It s better than a 66 block because it can support higher frequencies and use
less space. It also meets the standard that
166:00 - 166:30 is needed for category 5e UTP cable. A patch panel is a panel that has multiple
cable connections and connects incoming and outgoing patch cables in a local area network.
It allows network administrators the convenience of arranging or rearranging circuits if necessary.
For example, here we have a patch panel that has several UTP patch cables attached.
166:30 - 167:00 The demarc or demarcation is the point where
a customer s and network equipment meets with the service provider s network equipment.
It defines where the service provider s responsibility for their equipment ends and where the customer's
responsibility for their equipment begins. And if the demarc needs to be extended further
inside the customer s building, then this
167:00 - 167:30 is known as a demarc extension. A smart jack is also known as a network interface
unit or NID. And it's often located at the demarcation point and its job is to terminate
the T carriers service wires at the customer s building. In addition, smart jacks are used
for monitoring a network for errors and connectivity issues. They also have LEDs that indicate
errors to a network technician.
167:30 - 168:00 The term cross-connect refers to points in
a building where cables and wires connect together. So a vertical cross-connect is the
main backbone that runs vertically and spans between floors. And a horizontal cross-connect
is where cables are run horizontally from
168:00 - 168:30 cable closets to wall outlets. 25 pair is a cable that has 25 pairs of smaller
wires inside. The wires are color coded to identify the individual conductors. Each pair
of wires is uniquely colored giving the cable 25 different 2- color combinations.
168:30 - 169:00 And 100 pair has 100 pairs of wires inside.
And these are used for larger industrial jobs compared to 25 pair. Each pair of wires are
also uniquely colored to give 100 different 2-color combinations. MDF stands for main distribution frame. And
this is the main wiring frame that is used
169:00 - 169:30 as a distributing point for all the wiring
in a building. All of the internal lines in a building connect to the MDF and from there
the external lines connect also, thus completing the circuit. There is also the intermediate distribution
frame. And these are smaller distribution frames that are located in various locations
in a building. And these provide better flexibility
169:30 - 170:00 to distribute wires to the main distribution
frame. VLAN stands for virtual LAN. A VLAN is a logical
area network that can control network traffic
170:00 - 170:30 regardless of the physicalities of their location.
So for example, let's say you have a three-story office building and you have different departments
mixed in with others on the same floor. Now suppose you wanted to separate the network
broadcast activity between the departments from each other. So that the accounting department
does not see any traffic from support, support doesn't see any traffic from accounting, and
so forth. Now one way to solve this is to physically move the computers to their proper
floor and put them on the same subnet with
170:30 - 171:00 a router. But there is an easier way to accomplish
this and that way is to use a VLAN switch. By installing a VLAN switch you can logically
create several virtual networks to separate network broadcast traffic. So now the three
departments don't see any traffic created by the other departments, they only see their
own. There's also a couple of ways that VLANs can be created. They can be created by ports
on a VLAN switch or they can be created by
171:00 - 171:30 using the MAC addresses of the computers. An intranet is a private network that belongs
to an organization. This is usually an internal website that only the employees of that organization
can access. The website usually contains information
171:30 - 172:00 about the company, for example company sales,
inventory, or history. And this website is also behind a firewall, so no one outside
the company can access it. Now an extranet is similar to an intranet
in that they are both private networks within an organization. But an extranet is different
from an intranet because an extranet is accessible from outside the organization on a restricted
basis. So for example, here we have two companies,
172:00 - 172:30 company B contains a private network that
contains a website with their company's information. Now suppose company A is a business partner
with them and they need to access certain information. So what happens is that company
B will grant company A access to their website to effectively do business.
172:30 - 173:00 A bandwidth shaper is used to control network
traffic. You can use it to set upload and download limits on less important data such
as recreation. And you can also prioritize important data like business needs and make
sure that it has the highest upload and download limits. And the term traffic shaping is similar
to what a bandwidth shaper does. It prioritizes
173:00 - 173:30 applications and guarantees bandwidth for
more important services. A load balancer is a piece of hardware or
software that is used to evenly distribute data activity across a network so that no
single server or computer becomes overwhelmed with the workload. For example, here we have
a network and one of the servers is getting
173:30 - 174:00 more network activity than the other server.
So to resolve this we can add a load balancer so that both servers are sharing the network
activity evenly. Qos stands for quality of service. And in
computer networking this is a term that is used to provide a guarantee of data delivery
within a certain period of time.
174:00 - 174:30 Port blocking is one of the ways to provide
security to a network. Port blocking is done on the firewall, and as a network administrator
you can control which ports should be open or closed, depending upon the application.
So for example, we learned that FTP uses port 21, HTTP uses port 80, and incoming email
uses port 110. These ports need to be open if these services are to function. But what
would happen if we were to close some of these
174:30 - 175:00 ports? For example, port 80 and port 110.
If we close these ports, then our network would not be able to receive any web pages
from HTTP or email. But since we kept port 21 open, then FTP functions normally. So port
blocking can be a great way to keep your network safe. But it can also cause problems if you
mistakenly close the wrong ports.
175:00 - 175:30 And high availability is a term that is used
to guarantee a period of uptime of continual operation. In order to keep a network in constant
operation you need to make sure that it always has power. But unfortunately in our world
this doesn't always happen. Power outages can happen for several reasons such as storms
and blackouts. So in order to prevent a disruption
175:30 - 176:00 in network operation from a loss of power
you need to use a UPS. UPS stands for uninterrupted power supply. It s a battery backup that supplies
power to your equipment if a power outage were to happen. So as an example, if we were
to disconnect the AC power from this computer, the computer will remain on because it's connected
to a UPS and it is now running from battery
176:00 - 176:30 power from the UPS. In addition to supplying
backup power, UPS also protects against surges and spikes. Link redundancy is having the ability to have
a continuous connection to the network in the event of a failure. So for example, if
you are using a broadband connection, you can have an ISDN line as a backup if the broadband
line were to fail. Or you can also have a
176:30 - 177:00 secondary network card by having one as a
primary and the other as a secondary. So if the primary card were to fail, the secondary
card would automatically kick in, so you would still have a continuous connection. There's also backup services. And this could
be defined as having backup servers to keep your network in constant operation. For example,
a standby server. A standby server is a secondary
177:00 - 177:30 server with the exact configuration as the
primary server. Now this server is not actually being used, but its data is constantly being
updated with the primary server. So if something were to happen to the primary server, the
standby server would immediately take over. And another type of backup service would be
server clustering. And server clustering is
177:30 - 178:00 when a company has a group of servers used
for load balancing and fault tolerance. In this setup the servers would share the workload
if one of the servers fails. And this type of setup works best if the servers were in
different geographical locations. So if some kind of natural disaster were to happen at
one location, it would not affect the other servers.
178:00 - 178:30 Fault tolerance can be defined as the prevention
of data loss if a network component fails. But in the event that fault tolerance fails,
then disaster recovery would be our last option. Disaster recovery is the process of rebuilding
an organization's data after a disaster has happened, such as data loss. So even if we
implemented fault tolerance measures, we still need to back up our data. There are three different types of data backups.
Full, incremental, and differential.
178:30 - 179:00 In a full backup all the data is simply copied
and backed up into one tape. So as you might have guessed, this is the simplest form of
backup. Because only one tape is used. And if you ever need to restore the data, then
that one tape is all you would need for restoration. But let s say that your organization has a
large amount of data, then performing a full backup daily would not be efficient, because
the disadvantage of using a full backup is
179:00 - 179:30 that it takes the longest to perform. Which
brings us our next alternative backup method. Now in an incremental backup, the only data
that is backed up is the data that has been changed since the last full or incremental
backup. So for example, let's say you have a company that does a full backup on the weekend,
and does incremental backups Monday through Friday. The only data that is copied to tape,
is the data that has been changed since the
179:30 - 180:00 last incremental backup. Which is each weekday.
So Monday will only copy Monday s data. Tuesday will only copy Tuesday s data, and Wednesday
will only copy Wednesday s data and so on. So as you can see on this illustration, each
backup tape only copies the data that was changed for that weekday.
Now the way an incremental backup knows which data has been changed is by what's called
an archive bit. This bit informs which files
180:00 - 180:30 have been changed since the last full backup
and it clears the archive bit when the backup is done. When you have to restore an incremental backup
you have to restore the full backup along with the incremental backups and you have
to restore the incrementals in the same order as you back them up. So for example, here
we have a full backup tape and a week's worth
180:30 - 181:00 of incremental backups. We'll go ahead and
restore the full backup tape first and then we'll restore the incrementals from Monday
through Friday in the correct order. And now we have a full restore of our data for that
week.
181:00 - 181:30 In a differential backup the data that is
backed up is the data that has been changed since the last full backup. So going back
to our example, a company does a full backup on the weekend and does differential backups
on weekdays. As data is being added to the database each weekday the differential backup
will back up the data that has been changed since the last weekend full backup. So Monday
will copy Monday's data, Tuesday will copy
181:30 - 182:00 Mondays and Tuesday's data, Wednesday will
copy Monday, Tuesday, and Wednesday's data, and so on. So as you can see on this illustration
each backup tape copies data not only from their own day but also from the previous days
as well since the last full backup which was done on the weekend. The differential backup also uses the archive
bit but it's important to note that when a
182:00 - 182:30 differential backup is done it does not clear
the archive bit. Now after a differential backup if you ever needed to restore the data
the procedure is that you would need to restore the last full backup and the last differential
backup to completely restore your data.
182:30 - 183:00 Offsite storage is where you can backup your
data and have it stored on a different geographical location for safety purposes. So for example,
let's say your main office is in Miami and you chose to have an offsite storage database
in New York. If some kind of natural disaster were to happen in Miami, let s say for example
a hurricane, and your main office was destroyed, you would still have a copy of all your data
in New York where it is safe.
183:00 - 183:30 Now a hot spare is defined as equipment that
can be swapped out without the need of turning off the power. So for example, if you had
a server with multiple hot swappable hard drives and if a hard drive were to fail, you
wouldn't need to shut down the server. You would just simply remove the hard drive and
replace it with a new one while the power is still on. Now a cold spare is similar to a hot spare.
But with a cold spare, you must turn off the
183:30 - 184:00 power first in order to replace that piece
of equipment. IPsec is a set of protocols for security at
the network layer of the OSI model. It encrypts the data when communication is happening between
two computers. But in order to use IPsec,
184:00 - 184:30 both sender and receiver must share a public
key. This key is what locks and unlocks the data that is being communicated as it travels
across a network. This ensures that the date I cannot be red or tampered with. In addition
to encryption IPsec also verifies the data to make sure the data is received exactly
as when it was sent. And IPsec also has two modes: transport and tunnel. In transport
mode only the message portion of the data
184:30 - 185:00 packet is encrypted. But in tunnel mode the
entire data packet is encrypted. Layer 2 tunneling protocol is a combination
of Cisco's layer 2 forwarding and point-to-point tunneling protocol. And this protocol authenticates
in two ways using digital certificates. It authenticates both the computer and the user
and it does this to ensure that the data is
185:00 - 185:30 not tampered with during the authentication
process which is known as man-in-the-middle attack. SSL or secure socket layer is the protocol
that is used to ensure security on the internet. SSL uses public-key encryption to secure data
and it's commonly associated with HTTP. So
185:30 - 186:00 for example, if you were to go to an e-commerce
website you would notice that an S has been added to http which indicates that you are
now using SSL in your web browser. And SSL provides protection in three ways: it authenticates
the server, the client, and it encrypts the data.
186:00 - 186:30 Transport layer security is the latest industry
standard SSL protocol. It's the successor to SSL and it's based on the same specifications.
Like SSL, it also authenticates the server, client, and encrypts the data. And TLS is
made up of two layers: the first layer is the TLS record protocol which provides connection
security by making sure the connection is private and reliable. And the second layer
is a TLS handshake protocol which allows the
186:30 - 187:00 server and client to authenticate each other
and negotiate an encryption algorithm and cryptographic keys before data is sent out.
And the goal for TLS is to make SSL safer and more secure. And our last security protocol is 802.1x.
And this standard is used for both wired and
187:00 - 187:30 wireless networks. And it controls network
access by ports. So if authentication passes, the port is opened, and if the authentication
fails, the port is closed.
187:30 - 188:00 Next we're going to talk about SOHO routers
which stands for a small office / home office router. And these are your common inexpensive
routers that are used in homes and small businesses. These are fairly easy to set up but if you
don't configure the router correctly you will not have access to the network.
To set up and configure your SOHO router you need to go into the router s built-in configuration
web page. So you would just open up a web
188:00 - 188:30 browser and in the address field you would
type in the router's IP address. So for example, our router has an IP address of 192.168.2.1.
And once you type that in, you press enter on your keyboard and now you're in. So here's an example of the configuration
page for a Cisco SOHO router. And this is
188:30 - 189:00 where you would set up the router with custom
settings to make it work for your particular network. So for example, like most SOHO routers
this one has a DHCP server built into it. And as you recall, a DHCP server automatically
assigns an IP address to each computer on your network because all computers need an
IP address to function on a network. So by default the DHCP server is enabled. But if
you want to, you can disable the DHCP server
189:00 - 189:30 by pressing this button here and then just
save your settings. Also in a router's web page there are the
wireless settings. Now in here you can configure the wireless settings for your network. For
example, you can set the SSID which stands for service set identifier which is basically
the name of your wireless network. The SSID
189:30 - 190:00 is shared among all wireless devices in your
network. The SSID is customizable and you can call it whatever you want and as you can
see here this SSID is called my wireless . So as an example, when a wireless laptop scans
for wireless networks to join in the vicinity of this router, the laptop will see the router
s SSID broadcast called my wireless and if
190:00 - 190:30 it has the proper credentials it can join
the network. Also in here you can set the channel for your
wireless network. And channels are used to avoid interference with other wireless networks
nearby. So if you are experiencing any connectivity issues to your wireless router, there might
be interference with another nearby wireless
190:30 - 191:00 network that's operating on the same channel
as yours. So in this case you can try changing to a different channel and see if it solves
your problem. And if you click on the wireless security
section you can configure the security of your wireless network. So here you can choose
to disable security and have your network wide open or you can choose to secure your
network with one of these security modes.
191:00 - 191:30 And as you can see this router supports the
following security options such as WEP, WPA, and WPA2. Wired equivalent privacy is one of the security
protocols that are used for wireless networks and as its name implies, it's meant to supply
the same security to wireless networks as
191:30 - 192:00 it did for wired networks. But this turned
out not to be the case. After time it was found out that the 40 bit encryption key the
WEP used was not secure and it was easily hackable. So a better security protocol was
needed for wireless. WPA is another wireless security protocol
that was developed to solve the security problems
192:00 - 192:30 of WEP. WPA is far better than WEP in two
ways, first it uses a stronger encryption method using TKIP which stands for temporal
key integrity protocol, which dynamically changes keys as it's being used. This ensures
data integrity. And secondly WPA uses EAP which verifies authorized network users.
192:30 - 193:00 Building on the security of WPA, WPA2 was
developed to provide even stronger security than WPA. And it does this by requiring the
use of a stronger wireless encryption method. While WPA uses temporal key integrity protocol
for encryption which is known to have some limitations, WPA2 uses CCMP for encryption.
And CCMP is more secure because it uses an
193:00 - 193:30 enhanced data cryptographic encapsulation
mechanism. And since 2006 WPA2 is available on all certified Wi-Fi hardware. And our last wireless security protocol is
WPS. WPS stands for Wi-Fi protected setup and this security protocol was designed for
users who know little about wireless networks
193:30 - 194:00 to make it as easy as possible for them to
join a secure wireless network. So here's an example of a WPS configuration
page for our router. And as you can see there are three different WPS methods that you can
use to join this wireless network. So you could use method 1 if your client has a Wi-Fi
protected setup button, you would just press that button then within 2 minutes you would
press the WPS button here on this page or
194:00 - 194:30 you can just press the physical WPS button
on the router itself and then you'll be connected. You can also use method 2 if your client has
a WPS pin number. You would just enter that number in here and press register. Or you
can use method 3 if your client asks for the router's pin number and you would just enter
this number into your device and then you'll be connected. So as stated before WPS is the
easiest way to join a wireless network and
194:30 - 195:00 a lot of manufacturers are building their
wireless products with WPS to make it as simple as possible for their customers to join their
device to a wireless network. Another wireless security is the MAC filter.
Every wireless adapter has a MAC address. A MAC address is a hexadecimal number that
uniquely identifies each device on a network.
195:00 - 195:30 And with a MAC filter you can either prevent
or permit access by using the device's MAC address. So in this example, once we enable
the MAC filter, we can choose the option to prevent devices that are listed below from
accessing the wireless network. So all of these devices listed here are now blocked
from joining the network. Or the other option,
195:30 - 196:00 we can choose the permit option and this will
allow only the devices listed below access to the network. There is also what's called the DMZ. And DMZ
stands for demilitarized zone. And the DMZ allows a designated computer on your network
to be fully exposed to the internet. And it
196:00 - 196:30 does this by the router forwarding all ports
at the same time to the designated DMZ computer. So while these computers here on our internal
LAN are protected inside the firewall, the DMZ computer is outside the firewall and is
not protected. The DMZ is typically used for testing purposes. So if you just set up a
computer that you want to be accessed from the internet and if you're having a problem
configuring the firewall and applications
196:30 - 197:00 so that it can be accessed from the internet,
you can simply bypass all firewall security and put the computer in the DMZ temporarily
to make sure everything is working until you can pinpoint a problem you're having, such
as a firewall setting. It s also important to note that the DMZ computer must be assigned
a static IP address and not automatically from a DHCP server.
197:00 - 197:30 Another option on a configuration page is
port forwarding. And on this page you can customize port services for certain applications.
So when a user sends these types of requests to your network from the internet, the router
will forward those requests to the appropriate computer. So for example, let's say a friend
of yours wants to access one of your computers in your home network using RDP or remote desktop
protocol. And as you know from an earlier
197:30 - 198:00 lesson that RDP services uses port 3389. So
what happens is when your friend starts up their RDP service on their computer, they
put in the public IP address of your router and once that request hits your router, your
router needs to know which computer on your network to forward that request to so your
friend can access the correct computer. So
198:00 - 198:30 that's where port forwarding comes in. Here
on the port forwarding configuration page you have to forward the RDP port to the correct
computer. So you type in the RDP port number which is 3389 and then you have to point it
to the IP address of the computer that you want your friend to access which is 192.168.2.3.
And once that s done, the router knows where
198:30 - 199:00 to forward that request and the connection
is now complete. A feature that's built into most wireless
routers is called a guest network. And a guest network is a separate wireless network that's
built into a wireless router that your guests can join so they can have access to the internet.
The guest network will have its own SSID and
199:00 - 199:30 it's typically the same name as your main
network SSID, but by default may have a minus guest suffix added to the SSID. The ping command is the most widely used of
all network utilities. It s a tool that is
199:30 - 200:00 used to test issues such as network connectivity
and name resolution. For example, let's go ahead and ping a host IP address. So at a
command prompt you would type ping, space, then the IP address and then press enter.
Now it's going to send out four data packets to the destination IP address we chose. Then
the destination will send the data packets back to us as a reply and these replies are
called echo reply requests and these replies
200:00 - 200:30 will inform you about what's happening with
the destination host we pinged. For example, if we received a reply then that means that
there is general network connectivity between us and the destination. But if we did not
get a reply then that means that there is no reply from the host and it could mean that
there is no network connectivity between us.
200:30 - 201:00 But if we ping the host and we got a message
that says request timed out then that could mean that the host is down or that it's blocking
all ping requests. Or after we pinged and we got a message that says destination host
unreachable then that message is coming from a router and it means that a route to the
destination cannot be found.
201:00 - 201:30 The ping command can also be used to test
DNS name resolution issues. For example, before we use the ping command with an IP address.
But we can also use it with a domain name. For example, we could type ping, space, then
the domain name yahoo.com. So if by pinging the domain name and if we got the same successful
result as typing the IP address, then this
201:30 - 202:00 would indicate that the name resolution by
DNS is working fine. But let's just suppose that the domain name ping failed. Then the
next step will be typing the IP address instead. So if by typing the IP address, and if the
ping was successful this time, then we now know that we are having a problem with DNS. The ping command can also be combined with
other subcommands called switches and switches
202:00 - 202:30 are used to alter the parameters of the ping
utility. And you can view a full list of these switches by typing ping, space, forward slash,
and then a question mark. And pathping is another Windows network utility
that combines the functionality of ping and tracert. So at a command prompt just type
in pathping and then the IP address or the
202:30 - 203:00 domain name and then press enter. And the
pathping output shows the details of the path a data packet takes between two devices. And
it also gives ping-like statistics for each device that the data packet takes on its way
to its destination. So for example, if we try to ping a destination
and the ping command failed, we can use the tracert utility to find out where the data
packet is failing along its path. So let's go ahead and traceroute this IP again, and
let s suppose that this time there was a problem. So let's type in tracert then the IP address.
And as a data packet goes on its path, it'll tell us at which area the problem lies. And
the data packet stops right here. So the tracert utility has isolated that the problem is somewhere
between these two routers. If you want to check a device using the regular
ping command and if you fail to get a response
203:00 - 203:30 because the firewall on the device has blocked
all ping requests, you can use the ARP ping command instead. The ARP ping command uses
ARP data packets to ping network devices. And since it uses ARP packets, a firewall
will not block any ARP data because ARP data is never blocked or should be never blocked
on a LAN. And the ARP ping command cannot
203:30 - 204:00 be used on the internet. The data is not routable.
So it only works on a local area network. Our next utility is called tracert which stands
for traceroute. And this is used to find out the exact path the data packet is taking on
its way to the destination. So for example, let's go ahead and trace the route from our
computer to another computer. So at a command
204:00 - 204:30 prompt we would type tracert, space, and then
the IP address and press enter. Now the data packet will find its way to the destination
and each time it reaches a router on its path, it will report back information about that
router, such as the IP address and the time it took between each hop. So the tracert utility
is a great tool that can be used to pinpoint
204:30 - 205:00 where a problem lies on a network if a data
packet cannot reach
205:00 - 205:30 the destination. And this is the Nbtstat utility. And this
is used to resolve Netbios names to IP addresses.
205:30 - 206:00 So at a command prompt just type in nbtstat
and here is an example of the result. This is probably the least common utility that
you will ever use. And our next utility is called ARP. And as
you might recall from an earlier lesson, ARP is used to resolve IP addresses to MAC addresses.
In order for a computer to communicate with
206:00 - 206:30 another computer it needs to know the MAC
address for that computer. So the first thing the computer does is check its ARP cache to
see whether it already has the MAC address for that computer. In fact we can check this
ourselves at a command prompt by using the ARP utility by typing ARP with a minus A switch.
And as you can see it has no entries at all.
206:30 - 207:00 So now it will ask the computer with the corresponding
IP address for its MAC address. And once it has the MAC address it will store
this information in the ARP cache. So let's do the same command as before and now you
can see that the IP address and matching MAC
207:00 - 207:30 address have been added to the ARP cache.
So the ARP utility is a good way to manually check which IP address is associated with
a certain MAC address. Our next utility is called netstat. Now this
is a very useful tool. And it s used to display current network connections to your computer.
So in our example here we can visually see
207:30 - 208:00 that our computer is currently communicating
with an FTP server and two HTTP web servers. And we can verify this by using the netstat
utility. So at a command prompt we type netstat, and in this case we're going to use a minus
A switch and then press enter. Now in our display we can see the two HTTP servers and
the FTP connection. So even if you're not
208:00 - 208:30 sure what connections your computer currently
has, you can use the netstat utility to find out. And in addition to connections it also
displays which ports are open and listening for a connection. The ipconfig utility is very common. This
utility is a powerful tool used to display network configuration for our computer. And
this information can be used for problem solving.
208:30 - 209:00 So for example, if we open up a command prompt
and type in ipconfig along with the forward slash ALL switch, then this will display the
full TCP/IP configuration for our computer, such as our computer name, MAC address, IP
address, default gateway - which is the router, DNS servers and so on. And by using this information
we can find solutions if we are experiencing
209:00 - 209:30 problems. For example, if we had a problem
with our IP address we can see from this information that DHCP is enabled which means that this
computer is getting its IP address for a DHCP server. And it also tells us the IP address
for the DHCP server. It also tells us the IP address for the DNS server. So if we're
experiencing any problems browsing the internet
209:30 - 210:00 with domain names then there might be a problem
with the DNS server itself. Using the ipconfig utility by itself displays
the IP address, subnet mask, and default gateway. But using this utility when combined with
subcommands called switches, changes the output slightly. So for example, when we use ipconfig
combined with a forward slash ALL, which we
210:00 - 210:30 just used in our previous slide, it displays
the full TCP/IP configuration for our computer. When we use ipconfig/renew this releases and
renews the IP address lease given to us from the DHCP server. And ipconfig/release releases
the IP address but does not renew it.
210:30 - 211:00 To see a complete list of all the switches
that can be used with ipconfig or any command utility, just type in the name of the utility,
space, and put a forward slash and a question mark and that'll show you all the switches
that are available. And similar to the ipconfig utility that's
used in Windows, there is also the ifconfig utility. And the ifconfig utility is a command
that's used in Unix and Linux operating systems.
211:00 - 211:30 And it displays configuration information
from the network interface card such as the IP address, subnet mask, how many packets
it has received and sent, any errors, and so on. And like ipconfig it can also be combined
with switches on the end to alter the output.
211:30 - 212:00 And our last utility is called nslookup. This
name is short for name server lookup. And this utility is used to look up DNS information.
So for example, at a command prompt if you type in nslookup along with a domain name
such as yahoo.com, the result will give you the DNS information for the Yahoo domain. And the dig command is a Unix version of nslookup,
it does the same thing.
212:00 - 212:30 As far as the way a network is designed, there
are two main types: wired and wireless. Networks don't have to use one or the other solely
but they can also be combined. In fact if
212:30 - 213:00 you have a wireless network, at some point
there is a wired connection. Most businesses today use a combination of wired and wireless
networks. So it's important to understand as a network administrator how to diagnose
problems related to wired and wireless issues. And one of those problems is the media. And
in a wired network this involves copper cables and overtime cables can be worn out or damaged
and that's when shorts can happen.
213:00 - 213:30 It s also important to remember to use the
right type of cable depending on what kind of network you're using. For example, if you
are using copper cabling it's important to recognize the environment around the cable
because certain electronic equipment such as fans, fluorescent lights, or air conditioners,
can interfere with the copper media and therefore
213:30 - 214:00 altering or reducing the strength of the signal
which is known as attenuation. And another factor is the length of the cable.
If the cable exceeds the maximum recommended length then this could also cause a problem.
Or if you are using the wrong type of cable this can also affect your network. For example,
if you are using a crossover cable, when you should be using a straight cable.
214:00 - 214:30 Antennas are another factor that affects a
wireless service. Since the wireless devices operate using radio waves the antenna is a
big factor that can determine the range and speed of a signal. One type of antenna is
the omnidirectional antenna and this happens to be the most common type as well. This type
of antenna transmits the signal in all directions. So every wireless device in all directions
can pick up the signal as long as they're
214:30 - 215:00 in range. And another type of antenna is the
directional antenna and this type directs the signal in one direction and that direction
is wherever you point the antenna to. They're also problems that can arise in a
wireless environment. And one of these is interference. Microwave ovens can cause interference
and certain wireless devices can interfere
215:00 - 215:30 with a wireless signal such as cell phones
and bluetooth devices such as a wireless keyboard and mouse. The waves that are produced by
these devices can alter the signal of a wireless network. And a cordless phone is another device that
can interfere with a wireless network. And that's because a lot of cordless phones operate
at the same frequency as wireless routers
215:30 - 216:00 do which is at 2.4 gigahertz. In fact I had
a situation one time where one of my customers was complaining that every time her phone
rings she would lose internet connection on her laptop and this is because her cordless
phone and her wireless router were using the same wireless channel. So to quickly resolve
this I just logged into the router's configuration page and changed the channel on her wireless
signal which quickly solved the problem.
216:00 - 216:30 And also the structure of a building is another
factor that can affect a wireless signal. Depending upon the structure of the building
like concrete walls, window film, and metal studs, can all affect wireless signals. So
in this case you may have to consider where you are placing your wireless router to avoid
these kinds of structural interference issues.
216:30 - 217:00 So you may have to test out certain areas
in your home or office to make sure that all your devices can use your wireless network. And using the wrong type of encryption could
also prevent wireless devices from joining your network. For example, if you're using
a later wireless encryption method such as WPA2 on your wireless router, but if you're
using an older laptop that can only use WEP
217:00 - 217:30 or WPA, well then that laptop wouldn't be
able to join the wireless network because you're using a later encryption method that
your laptop cannot recognize. Similar issues can happen in fiber optic networks
as well such as signal loss or attenuation.
217:30 - 218:00 Other factors include using the wrong type
of cable, wavelength mismatches, fiber type mismatches, dirty connectors, connector mismatches,
bending the cable too much, and exceeding the cable length limitations. Problems can also happen in DHCP. For example,
what would happen if a DHCP server was removed?
218:00 - 218:30 If this were to happen, then certain computers
that have an expired IP address would not be able to renew their IP lease because there
is no longer a DHCP server present. So these computers won't be able to access the network.
This would also affect when new computers are added. They will not be able to access
the network without an IP address. It s important to remember that this is only the case if
the computers were configured to obtain an
218:30 - 219:00 IP address automatically. So this would have
no effect if they were configured for a static IP. So in another scenario, if another DHCP server
was added to the network? So it's important to remember that if you're going to add another
DHCP server to the network, that it must be configured properly. For example, you're going
to have to make sure that the two DHCP servers
219:00 - 219:30 do not give out the same IP address to a computer
because all IP addresses must be unique and if the second DHCP server assigns an IP address
that is already in use, an IP address conflict will happen. So to avoid this you must configure
the address pool correctly.
219:30 - 220:00 Problems can also happen in DNS also. And
as we discussed earlier DNS resolves domain names to IP addresses. The main impact that
this service would have on a network if DNS was not working properly is basically accessing
web pages using domain names. For example yahoo.com will be resolved to the IP address
66.94.234.13 by a DNS server. But if a DNS
220:00 - 220:30 server was not present you would not be able
to access the Yahoo website using the domain name yahoo.com. You would only be able to
access a Yahoo website by typing in the IP address instead. Link LEDs are very simple indicators that
are used to tell us basic information about a network device. For example, on a network
interface card if you were to plug in a network
220:30 - 221:00 cable you wouldn't notice that the green LED
turns on. The green LED is called the link light and this indicates that there is a successful
network connection. However if the LED does not light up after a cable is plugged in then
this indicates a problem such as a bad cable or something simple such as maybe the computer
is turned off. The blinking yellow LED on
221:00 - 221:30 the other hand indicates that there is network
activity happening. Whether the blink rate is medium or slow this indicates normal operation. Another thing you're probably the most obvious
to check is physical connectivity. Is your computer connected to the network? If it is,
is the link LED on the network card turned on? Or is the cable that you were using good?
So if you did not say the link LED and you know that the cable is good then you might
want to check the switch. Is the switch even
221:30 - 222:00 turned on? Are there any LEDs on the switch?
And you might also want to check if the network cable is loose on either the NIC or the switch
connection. And then there are certain procedures for
solving network problems. And here are some
222:00 - 222:30 of the steps to do that. So the first step
is to identify the symptoms and potential causes. This step is where you gather information
about the problem such as what exactly is the problem? When did the problem occur? Were
there any specific error messages? And does it happen all the time or intermittently?
So by gathering as much information as possible in the beginning it'll greatly enhance that
diagnosing process and ultimately fixing their
222:30 - 223:00 problem a lot faster. And the next step is to identify the affected
area. So a good question to ask is is the problem isolated at one particular location
or is it spread across several locations? So for example,
let's say that everyone on a LAN cannot access the network. So one of the first places to
look would be the switch because we all know
223:00 - 223:30 that all computers connect to this single
device and if this device was not working properly it would affect everyone. Or what
if the problem was isolated at one particular computer. Then in this case we would not check
the switch but a good place to start is that we would check the cable and connection for
that particular computer. So when this step is done correctly it will dramatically cut
down on the diagnosing process and save a lot of time.
223:30 - 224:00 So after you identify the area the next step
is to establish what has changed. Problems don't occur at random, they happen for a reason.
So the next question to ask is did anything change just prior to the problem happening?
Was there any hardware removed or added? Was there any software installed or uninstalled?
Or did the user download anything?
224:00 - 224:30 And the next step is to select the most probable
cause. So try to keep this step simple. Always look for the simple and the obvious solutions
before digging deeper. For example, see if the computer or device is even turned on.
Check to see if the cables are plugged in. Check the simple LEDs. And you'll be amazed
how the simplest solutions will fix most network problems. And the next step is to implement an action
plan and solution including potential effects.
224:30 - 225:00 Now this step is the cautious phase. So before
taking any action to solve the problem you must know what effect this will have on the
network. For instance, if you were to take a device offline, how will this affect the
rest of the network? By doing this, does this distract everyone else or be isolated at one
area?
225:00 - 225:30 And the next step is to test the result. Now
this step is where you actually take action to solve the problem. This is where you would
know if your plan of action has solved the problem or not. And after you test a result the next step
is to identify the results and effects of the solution. Has your plan of action solved
the problem or not? And if it has what effect did it have on everyone else? Do the results
show a temporary fix or a permanent one?
225:30 - 226:00 And the last step is to document the solution
and process. Now this step is a very important one. Now that the problem is solved it's very
important to document the problem and the solution so that if it ever happens again
you or anyone else will know not only how to solve the problem as fast as possible but
also to take preventive measures so that the
226:00 - 226:30 problem will never happen again. So the things
to include in the documentation are: the problem itself, what actually caused the problem,
and how did you fix it. So by following all these steps carefully you can be assured to
diagnose and solve problems effectively as a (CompTIA Certified) NETWORK ADMINISTRATOR
:)