Network+ Important Stuff
Network+ Important Stuff
Broadcast Topologies.
• The LLC (Logical Link Control) Sublayer, which accepts and delivers
packets from the network layer above. It allows more than one network layer protocol
to be used.
• The MAC (Media Access Control) Sublayer, which is responsible for
generating frames appropriate to the particular network interface in use. It allows
more than one network adapter to be supported.
IEEE Standards.
• 802.2 – the IEEE standard for LLC layer. It not only defines an interlink
between the media access methods and the Network layer of the OSI model, but also
provides framing, addressing and error control.
• 802.3 (CSMA/CD) – A MAC layer implementation – usually know as
Ethernet – which defines how various types of cabling work with Ethernet, Fast
Ethernet and Gigabit Ethernet.
• 802.5 – also a MAC layer implementation, it is a specification for Token Ring.
It uses a star configuration at speeds of 4Mbps and 16Mbps.
• These standards now also come under the aegis of ISO e.g. ISO 8802-2.
Bridges
• They examine the header of each frame to determine the source and
destination MAC addresses.
• STA avoids bridging loops by ensuring that some bridge interfaces do not
participate in bridging – they are ‘turned off’. These interfaces can be ‘turned on’
again if another bridge fails and the interface is required to maintain connectivity.
1
Routing vs Bridging.
Brouters.
• 3 – Available (unless used for 2nd serial port [COM2, COM4] or bus mouse).
• 4 – COM1, COM3
• 6 – Floppy-disk controller.
• 7 – Parallel port [LPT1].
• Standard PVC based cable gives off poisonous fumes when it burns. For this
reason, cabling which is to be installed above false ceilings or under floor should be
of Plenum grade.
Cable Descriptions.
Cable Description
2
RG-6 Larger in diameter and rated for higher frequencies than RG-59, but
used for broadband transmissions as well.
RG-62 ArcNet networks.
• Straight-through cables are used to connect end stations, such as PCs and
routers, to hubs.
Cable Categories.
• Category 1 – This refers to traditional UTP telephone cable, which can carry
voice but not data. Most telephone cable prior to 1983 was Category 1 cable.
• Category 2 – This category certifies UTP cable for data transmissions up to 4
Mbps. It consists of four twisted pairs.
• Category 3 – This category certifies UTP cable for data transmissions up to
10 Mbps. It consists of four twisted pairs.
• Category 4 – This category certifies UTP cable for data transmissions up to
16 Mbps. It consists of four twisted pairs.
• Category 5 – This category certifies UTP cable for data transmissions up to
100 Mbps. It consists of four twisted pairs of copper wire.
Structured Cabling.
• The 100m limit on the length of cable between NIC and hub for Ethernet
includes the length of any patch cables used. These should always be included in any
calculations.
Synchronous Modems.
• Because of the higher data rates supported by leased lines, they are generally
used in conjunction with synchronous modems. These modems ensure that sender
and receiver stay ‘in sync’ and so enable longer streams of data to be sent before
being checked for possible corruption.
Asynchronous Modems.
• The cheapest modems are asynchronous. This means that they do not
exchange timing signals, which would involve more expensive circuitry. The lack of a
common clock at either end means that the sender and receiver could get ‘out of sync’
when transferring long streams of data. Data is transferred in short bursts. This also
has the effect of slowing down communications.
3
However, dial-up telephone connections still account for most of the Internet
access even today. The problem with using voice-quality telephone lines is
that they were designed to carry analogue voice signals not digital data
signals.
UART.
RS-232 Connector.
DB-9 Connectors.
Note on Terminology:
Modem Speeds.
4
Standard Bps Introduced Notes
V.22BIS 2400 1984 An old standard. Sometimes included with
the purchase of a computer.
V.32 9600 1984 Sometimes included with the purchase of a
computer.
Kflex56 57,600 1996 Lucent/Motorola, incompatible with x2.
V90 57,600 1998 Emerging 57,600 standard.
Modem Troubleshooting.
Collision Detection.
Before sending data, CSMA/CD stations ‘listen’ to the network to see if it is already
in use. If it is, the station wishing to transmit, waits. If the network is not in use, the
station transmits. A collision occurs when two stations listen for network traffic,
‘hear’ none, and both transmit. In this case, both transmissions are damaged and
this fact is detected by each station, which must retransmit at some later time.
Random back-off algorithms determine when the colliding stations retransmit. The
randomness helps to avoid the situation where both stations try to retransmit at the
same time.
5
Ethernet Limitations.
No more than five segments of Ethernet cable may be connected by four repeaters
(providing that only three segments are active – i.e. have stations attached). This to
aid collision detection described earlier.
TCP.
UDP.
6
Classes of IP Address.
5 Classes – A, B, C, D and E.
• Class A addresses were designed for networks with a very large number of
hosts.
• Class B addresses were designed for medium-sized networks.
• Class C addresses were intended for small networks, such as LANs.
• Class D addresses are used for multicasting to a set of hosts – e.g. all
routers. Only those hosts registered for the multicast address will receive the packet.
• Class E addresses are reserved for experimental use.
Class 1st Octet Bit Pattern 1st Octet Network and Hosts
per Network
A 0XXXXXXX 1 - 126 126 Networks
16,777,214 Hosts
B 10XXXXXX 128 - 191 16,382 Networks
65,534 Hosts
C 110XXXXX 192 – 223 2,097,150 Networks
254 Hosts
D 1110XXXX 224 – 239 Multicast
IP Address Restrictions.
Network ID
Host ID
7
Static vs Dynamic Routing.
• Each router broadcasts its routing table to all other routers on connected
subnets. Each router compares its own routing table with the broadcast from its
neighbour. Should a shorter path to a network be discovered, it then updates its
own table. Routes utilising the least number of hops are considered optimal. A hop
count of 16 is considered unreachable.
• Slow Convergence – failed routes can take a long time to propagate through
the network. Spurious routes (routing loops) can be learnt while the network is
unstable. Hence the needs TTL to kill endlessly looping packets that would otherwise
congest the network.
• Network Traffic – broadcasts are frequent and contain the entire routing
table.
• Scalability – as the network becomes large the size of routing tables increases
proportionately.
• Fixed Subnet Masks – in order to minimise network traffic, subnet masks are
not broadcast along with routes. The protocol relies on the subnet mask being the
same throughout the given class A, B, or C network.
8
OSPF uses a Link State algorithm – each router tells the world (other routers) about
its neighbours.
OSPF does not use undirected broadcasts. Instead it unicasts to other routers using
reliable TCP connections, thus reducing network traffic.
Link state advertisements, (LSAs), consisting of a router’s attached network Ids and
interface costs are exchanged between routers. LSAs are advertised upon startup and
when changes in the internetwork topology are sensed. LSAs are sent using directed
or multicast traffic not broadcasts.
Routers employing link state algorithms build a database of LSAs and use the
database to calculate optimal routes. These are then added to the routing table. All
routing information exchanged between link state routers is synchronised and
acknowledged.
Advantages of OSPF
Also know as supernetting, CIDR may be used to consolidate several class C network
addresses into one logical network. CIDR is described in RFC1518/1519. to use
supernetting, the IP network addresses that are to be combined must share the same
high-order bits, and the subnet mask is shortened to take bits away from the network
portion of the address and add them to the host portion.
To prevent class B network Ids from being depleted ISOC allows ranges of class C
networks to be offered out.
The above scheme would lead to large numbers of network entries on the routers of
Internet Service Providers (ISPs). To avoid this, ISOC supports supernetting, which
offers out ranges of class C addresses as though they were single subnets of class B
networks thus reducing the number of entries in routing tables.
Ipv6.
9
Remote Login (RLOGIN) – as the name implies, this utility allows a user to log in to
a remote system.
Printing Utilities.
A UNIX (or other) server running lpd (line printer daemon) acts as a print server.
Diagnostic Utilities.
• PING (Packet InterNet Groper) – PING is a tool that helps to verify IP-level
connectivity. When trouble shooting, the PING command is used to send an ICMP
echo request to a target name or IP address.
• TRACERT – TRACERT is a route tracing utility. TRACERT uses the IP
TTL field and ICMP error messages to determine the route from one host to another
through a network.
• PATHPING – PATHPING combines the features of PING and TRACERT,
while also showing the packet loss rate at each router between source and destination.
• IPCONFIG and WINIPCFG – IPCONFIG is a command-line utility that
prints out the TCP/IP-related configuration of a host. When used with the /ALL
switch, it produces a detailed configuration report for all interfaces, including any
configured serial ports (RAS). IPCONFIG is used on Windows NT and Windows
2000 systems. WINIPCFG is the Windows 9x implementation.
• FINGER – this connectivity command displays information about a user on a
specified system running the Finger service. Output varies based on the remote
system.
• NSLOOKUP – was added in Windows NT 4.0 and is a very useful tool for
troubleshooting DNS problems, such as a hostname resolution. A query is sent to a
DNS server to resolve a name to an IP address or vice-versa.
• HOSTNAME – returns the local computer host name.
• NETSTAT – displays protocol statistics and current TCP/IP connections.
• NBTSTAT – is a useful for troubleshooting NetBIOS name resolution
problems.
• ROUTE – this diagnostic command manipulates network routing tables.
• ARP – the ARP command is useful for viewing the ARP cache of IP
addresses resolved to hardware addresses.
10
A port number is a 16-bit number used to identify an application on a host. Port
numbers in the range 1 – 1024 are assigned (IANA) to well-known server
applications. They are referred to as well-known port numbers.
• IP Address.
• Protocol Number.
• Port Number.
Multiple Subnets.
• DHCP broadcasts will not pass through routers unless they act as BOOTP
Relay Agents (i.e. unless they support RFC 1542). If a DHCP server is to serve
multiple subnets, the RFC 1542 routers will forward the broadcast requests to the
DHCP server.
• One way of resolving host names or FQDNs is to use a local HOSTS file,
which can be created using any standard text editor. This method is suitable for small
installations, which do not access many internet hosts, as it requires files to be
maintained manually on each computer.
11
which defines the names for local loopback testing.
The file is read sequentially till a match is found for the requested name. Whether the
entries are case-sensitive depends on the operating system.
Computer names can be resolved if the NetBIOS name and IP address mappings are
specified in the LMHOSTS file – a simple text file.
Limitations of Broadcast.
Routers do not usually forward broadcasts. Some routers can be configured to forward
broadcasts for UDP ports 137 and 138, however this might cause network traffic
problems. Therefore name resolution by broadcast is typically confined to the
local subnet only.
• HTML – the Hypertext Markup Language – a plain text language for creating
and formatting documents, based on the principles of non-hierarchical Hypertext
navigation, devised by Ted Nelson in 1965.
• URL – the Uniform Resource Locator – a convention for finding and
accessing such documents on the Web.
• HTTP – the Hypertext Transfer Protocol – a TCP/IP protocol allowing
computers to transmit and request documents.
Firewalls.
12
Proxy Servers.
• The Proxy Server establishes internet sessions on behalf of its clients (using its
valid IP address 200.2.2.31). it communicates with its clients using addresses in a
reserved network, such as 10.0.0.0 (invisible to the Internet).
Using E-mail.
• FTP uses TCP as its transport protocol. In addition to basic file transfer it
provides:
• Interactive Access – allowing users to list files in the remote directories they
need to access.
• Format Representation – allowing users to specify the type and the format of
stored data e.g. binary or text (ASCII or EBCDIC).
• Authentication control – via login name and password (though not
encrypted).
• The Trivial Transfer Protocol is a lightweight file transfer protocol, often used
in devices, which do not have any disk storage. On these devices, software is often
stored in ROM or flash memory so small programs are desirable. Typically, these
devices use TFTP to download operating system and configuration files from servers.
The servers need to be located by broadcast, so UDP rather than TCP must be used
as the transport protocol.
13
• TELNET is a remote terminal protocol that uses TCP as its transport protocol
and allows a user at one site to establish a connection, using well-known port
number 23, to a login server at another site.
Authentication Traps
• If the amount of data is too large to make frequent full backups impractical, a
differential backup strategy can be used. Full backups are performed during slack
times – perhaps the weekend. They may occupy multiple tapes. More frequent
differential backups can be performed daily to back up only the data that has changed
since the last full backup.
• There should be multiple sets of tapes that can be rotated to provide better
resilience against tape corruption.
14
• If data is changing rapidly and there is a lot of it, differential backup may
become impractical, as the size of the backups will increase with time from the last
full backup. Incremental backups only backup data since the last backup. The speed
and size of the backups is reduced. Entire sets of tapes should be considered for
recycling.
• A downside is that in the event of having to restore data, the full backup
tape and all subsequent incremental tapes must be processed. This lengthens the
recovery time. In the case of the differential strategy, only the last full backup
and the latest differential backup tape need to be processed.
Network Troubleshooting.
• A great deal can be learnt about network infrastructure problems through the
use of a standard software. The use of the PING and TRACERT commands can
pinpoint network components – usually hubs, cables or devices such as routers and
bridges – which are causing problems. Once the search has been narrowed down, it is
often necessary to use other tools to determine the exact nature of the problem. Some
of the more common techniques are described below.
Device LEDs.
• Most network devices – including LAN adapters – have one, or more, LED
(Light Emitting Diode) Indicators, which report the status of the device. Check the
documentation that accompanied the device to determine whether the LEDs indicate
that it is functioning correctly.
Hardware Loopback.
• This is a device that connects the transmit pins to the received pins of an
Ethernet 10BaseT NIC, and is supplied by the manufacturers of the NIC if the
diagnostic software supports the hardware loopback option. This device checks the
send and received capabilities of the NIC without sending signals onto the entire
network. It is not possible to fully test a NIC without a hardware loopback connector.
Terminators.
Multimeters.
15
• Separate individual Voltmeters, Ammeters, Ohmmeters etc have been replaced
by devices known as Multimeters capable of operating in different modes measuring,
as a minimum, the following:
• AC Voltage.
• DC Voltage.
• Resistance.
• Continuity of current.
A dial on the multimeter is usually set to select the required sensing function.
Digital multimeters usually provide more test functions than an analogue device –
often including transistor testing, conductivity readings, capacitor efficiency etc.
Digital multimeters are able to measure standard current ranges more accurately but
typically cost more than the analogue devices.
Cable Testers.
• There are a variety of cable testers available. These are used to check for
breaks in the cable, poor signal quality and whether the wires have been correctly
connected to the terminators at each end.
16
• These may be included in protocol analysers or may be provided as separate
products (usually implemented as software running on a network computer). They can
generate packets of specific types (to test particular protocols) and in large numbers
(to test the network under the stress of heavy traffic).
• A Tone Generator puts an electrical signal onto a cable. The associated probe
can pick up emissions from the signal on the cable – even at some distance. This can
be used to check for breaks in cables and to trace the location of cable when they are
in inaccessible places – e.g. under-floor.
• Many network devices have diagnostic commands built into their operating
system software. These can be very useful in identifying problems with the device
itself as well as with attached cables and other devices with which it communicates.
For example, Cisco routers have an extensive range of DEBUG and SHOW
commands.
Point-to-Point Protocol.
• PPP is a Data Link layer 2 protocol, which is widely used in (but not confined
to) switched-circuit network environments.
17
Serial Line Internet Protocol – SLIP.
• SLIP is an earlier Data Link layer protocol, still found in many UNIX
environments. As the name implies, it is limited to encapsulating IP packets. This is
not its only limitation with respect to PPP, as can be seen from the comparison below.
It should only be used in circumstances where one of the systems does not support
PPP.
SLIP PPP
Only supports IP Multiprotocol support
Limited to 56kbps Not limited to 56kbps
Unencrypted Authentication Encrypted Authentication
Does not support Data Compression Supports Data Compression
Does not support Error Correction Supports Error Correction
Requires Configure IP Addresses Supports IP Address Negotiation
Asynchronous Transfer only Asynchronous and Synchronous Transfer
Advantages:
• Lower transmission costs.
• Lower hardware costs, as only the RAS server needs to be connected to the
Internet from the corporate LAN.
• Good security – all connections are encrypted.
• The X.25 specification maps to the Physical, Data Link and Network
layers of the OSI reference model.
• Layer 3 X.25 describes packet formats and packet exchange procedures
between peer Layer 3 entities. Layer 2 X.25 is implemented by Link Access
Procedure, Balanced (LAPB).
18
• Fixed length – fast, large modular switches.
• ATM is a cell-switching and multiplexing technology that combines the
benefits of circuit switching (constant transmission delay and guaranteed capacity)
with those of packet switching (flexibility and efficiency for intermittent traffic).
Novell NetWare.
19