You are on page 1of 218

Local Area Networks (LANs)

Copyright 2012
Welcome
Introductions
Instructor
Class members
Facility layout
Restrooms
Lunch
Copyright 2012
CCNT Certificate Program
Telecommunications and IT professionals are
increasingly expected to understand data networking
as well as telecom and computer telephony,
collectively known as "convergent technologies"
CCNT (Certified in Convergent Network Technologies)
is an industry-standard training and certificate program
that teaches and validates the prerequisite knowledge
required to pursue careers selling, servicing and
installing convergent technologies
Copyright 2012
How to Earn a
CCNT Credential
To earn this industry-valued credential,
you must pass six competency tests:
Basic Telecommunications
Basic Data Communications
Computer-Telephone Integration (CTI) Essentials
Local Area Networks (LANs)
Broadband Technologies
Voice over IP (VoIP) Essentials
Copyright 2012
Local Area Networks (LANs)
Course Lessons
Lesson 1: Overview of Local Area Networks
Lesson 2: Wide Area Networks (WANs)
Lesson 3: Networking and the Internet
Lesson 4: LAN Topologies
Lesson 5: Networking Models, Traffic and Devices
Lesson 6: Transmission Media
Lesson 7: LAN Standards, Wireless Networking and
Name Resolution
Lesson 8: Network Management
Copyright 2012
1. In a centralized computing model, what is situated at the
center of the network?
a. A node
b. A host
c. A mainframe
d. A client
2. There is no centralized management of network resources
in which type of network?
a. A peer-to-peer network
b. A server-based network
c. A mainframe network
d. A domain-based network
3. What are two characteristics that describe a local area
network (LAN)?
Lesson 1
Pre-Assessment Questions
Copyright 2012
Lesson 1
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright 2012
Defining a Network
Figure 1-1: A sample network
Copyright 2012
Lesson 1
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright 2012
Evolution of Networking Models
Figure 1-2: Mainframe model
Copyright 2012
Lesson 1
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright 2012
Server-Based Networks
Figure 1-3: Server-based network
Copyright 2012
Peer-to-Peer Networks
Figure 1-4: Peer-to-peer network
Copyright 2012
Lesson 1
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright 2012
Introduction to
Local Area Networks (LANs)
Figure 1-5: Local area network (LAN)
Copyright 2012
Lesson 1
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright 2012
Network Interface Card (NIC)
Figure 1-6: Network interface card (NIC)
Copyright 2012
Wired Connections
Figure 1-7: Home network example
Copyright 2012
Wired Connections (cont'd)
Figure 1-8: Small LAN
Copyright 2012
Lesson 1
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright 2012
Lesson 1
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright 2012
MAC Addresses
Figure 1-9: MAC address
Copyright 2012
Lesson 1
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright 2012
Lesson 1
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright 2012
IPv4 vs. IPv6 Addresses
Figure 1-10: IPv6 address portions
Copyright 2012
Lesson 1
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright 2012
1. What are the main architectural components of a
LAN?
2. Describe the function and characteristics of a network
operating system (NOS)
Lesson 1 Review
Copyright 2012
Consider the following situation

Ilsa and her husband Edouard have both been given the option to
work at home
They want to set up one room in their house as a shared office
Both require Internet access, e-mail, and access to a
printer/scanner
They currently have a cable Internet connection in their home

Lesson 1
Application Project
Copyright 2012
Now answer the following questions

What will their home network look like?
Can they set up a peer-to-peer network, or will they require a
server-based network?
Will they be able to share their Internet access and their printer?
What type of additional equipment, if any, might they need to
purchase?
What factors will affect their home networking decisions?
Lesson 1
Application Project (cont'd)
Copyright 2012
Match each term with the correct definition
Activity 1-1: Reviewing
networking terminology
1. hexadecimal A. A central connection point for wireless
network clients
2. IP address B. A central connection location for incoming
and outgoing lines of a LAN
3. MAC address C. A base-16 numbering system that uses the
digits 0 through 9 and the letters A through F
4. wireless access
point (AP)
D. A permanent address burned into a network
interface card (NIC)
5. patch panel E. A unique numerical address assigned to a
device or computer on a network on a leased
basis
Copyright 2012
Local Area Networks (LANs)
Course Lessons
Lesson 1: Overview of Local Area Networks
Lesson 2: Wide Area Networks (WANs)
Lesson 3: Networking and the Internet
Lesson 4: LAN Topologies
Lesson 5: Networking Models, Traffic and Devices
Lesson 6: Transmission Media
Lesson 7: LAN Standards, Wireless Networking and
Name Resolution
Lesson 8: Network Management
Copyright 2012
1. Which of the following is faster than T1?
a. E1
b. ISDN BRI
c. DS0
d. DS1
2. Which type of transmission uses a single channel?
a. Broadband
b. Digital Subscriber Line (DSL)
c. Baseband
d. Cable modem
3. How are digital signals measured?
Lesson 2
Pre-Assessment Questions
Copyright 2012
Lesson 2
Introduction to Wide Area Networks (WANs)
Signaling Terminology
Circuit Switching and Packet Switching
WAN Connections
Dial-Up Connections
Direct Connections
Synchronous Optical Network (SONET)
Asynchronous Transfer Mode (ATM)

Copyright 2012
Introduction to Wide Area Networks
Figure 2-1: WAN example
Copyright 2012
Lesson 2
Introduction to Wide Area Networks (WANs)
Signaling Terminology
Circuit Switching and Packet Switching
WAN Connections
Dial-Up Connections
Direct Connections
Synchronous Optical Network (SONET)
Asynchronous Transfer Mode (ATM)

Copyright 2012
Analog and Digital Signals
Figure 2-2: Analog signal
Copyright 2012
Analog and Digital Signals (cont'd)
Figure 2-3: Digital signal
Copyright 2012
Digitizing
Figure 2-4: Analog signals are easily digitized
Copyright 2012
Multiplexing
Figure 2-5: Signals in different frequency bands
Copyright 2012
Digital Signal Hierarchy (DSH)
Table 2-1: Digital Signal Hierarchy
Digital Signal Level Data Rate Equivalent To
DS0 64 Kbps
DS1 1.544 Mbps 24 DS0 channels
DS2 6.312 Mbps 96 DS0 channels
DS3 44.736 Mbps 672 DS0 channels
DS4 274.176 Mbps 4,032 DS0 channels
Copyright 2012
Lunch
Be back in
45 minutes!
Lunch Break
Copyright 2012
Lesson 2
Introduction to Wide Area Networks (WANs)
Signaling Terminology
Circuit Switching and Packet Switching
WAN Connections
Dial-Up Connections
Direct Connections
Synchronous Optical Network (SONET)
Asynchronous Transfer Mode (ATM)

Copyright 2012
Lesson 2
Introduction to Wide Area Networks (WANs)
Signaling Terminology
Circuit Switching and Packet Switching
WAN Connections
Dial-Up Connections
Direct Connections
Synchronous Optical Network (SONET)
Asynchronous Transfer Mode (ATM)

Copyright 2012
WAN Connections
Figure 2-6: WANs use many different connection methods
Copyright 2012
Lesson 2
Introduction to Wide Area Networks (WANs)
Signaling Terminology
Circuit Switching and Packet Switching
WAN Connections
Dial-Up Connections
Direct Connections
Synchronous Optical Network (SONET)
Asynchronous Transfer Mode (ATM)

Copyright 2012
Plain Old Telephone Service (POTS)
Figure 2-7: WAN connection over PSTN using modems
Copyright 2012
Lesson 2
Introduction to Wide Area Networks (WANs)
Signaling Terminology
Circuit Switching and Packet Switching
WAN Connections
Dial-Up Connections
Direct Connections
Synchronous Optical Network (SONET)
Asynchronous Transfer Mode (ATM)

Copyright 2012
T-Carrier
Table 2-2: North American T-carrier
DSH T-Carrier Data Rate Comments
DS0 N/A 64 Kbps
DS1 T1 1.544 Mbps
DS2 T2 6.312 Mbps
Equivalent to four T1 channels;
not available to the public
DS3 T3 44.736 Mbps Equivalent to 28 T1 channels
DS4 T4 274.176 Mbps Equivalent to 168 T1 channels
Copyright 2012
T-Carrier (cont'd)
Figure 2-8: International WAN using T1 links
Copyright 2012
T1 Connection
Figure 2-9: T1 connection using a single channel
Copyright 2012
T1 Connection (cont'd)
Figure 2-10: T1 connection using separate channels
Copyright 2012
Fractional T1/T3
Figure 2-11: Bandwidth comparison
Copyright 2012
Statistical Multiplexing (stat mux)
Figure 2-12: Statistical multiplexing saves bandwidth
Copyright 2012
Multiplexing
Figure 2-13: FT1 requiring two DS0 channels
Copyright 2012
Figure 2-14: Usage of voice and data lines
Copyright 2012
Statistical Multiplexing
Figure 2-15: Voice and data lines use same channel
Copyright 2012
E-Carrier
Table 2-3: E carrier speeds
Level
Data Rate
(Mbps)
Voice
Channels
Comments
E1 2.048 30
E2 8.448 120 Equivalent to four E1 circuits
E3 34.368 480 Equivalent to 16 E1 circuits
E4 139.264 1,920 Equivalent to 64 E1 circuits
E5 565.148 7,680 Equivalent to 256 E1 circuits
Copyright 2012
Cable Internet
Figure 2-16: Cable modem
Copyright 2012
Digital Subscriber Line (DSL)
Figure 2-17: ADSL modem
Copyright 2012
Digital Subscriber Line (DSL)
Table 2-4: xDSL speeds
Type Max Downstream Max Upstream
ADSL 8 Mbps 640 Kbps
ADSL2
12 Mbps 1 Mbps
ADSL2+
24 Mbps 3 Mbps
VDSL
55 Mbps 4 Mbps
VDSL2
100 Mbps 100 Mbps
Copyright 2012
Connecting Cable and DSL Modems
Figure 2-18: Residential broadband connection
Copyright 2012
Lesson 2
Introduction to Wide Area Networks (WANs)
Signaling Terminology
Circuit Switching and Packet Switching
WAN Connections
Dial-Up Connections
Direct Connections
Synchronous Optical Network (SONET)
Asynchronous Transfer Mode (ATM)

Copyright 2012
SONET
Figure 2-19: Synchronous Payload Envelope (SPE) in frame
Copyright 2012
SONET
Table 2-5: SONET speeds
Synchronous Transport
Signal (STS) Frame Format
Optical Carrier (OC) Level Speed (in Mbps)
STS-1 OC-1 51.84
STS-2 OC-2 103.68
STS-3 OC-3 155.52
STS-9 OC-9 466.56
STS-12 OC-12 622.08
STS-18 OC-18 933.12
STS-24 OC-24 1244.16
STS-36 OC-36 1866.24
STS-48 OC-48 2488.32
STS-96 OC-96 4976.64
STS-192 OC-192 9953.28
Copyright 2012
Benefits of Using SONET
Figure 2-20: Multiplexing different data streams
Copyright 2012
SONET and SDH
Table 2-6: Comparison of SDH and SONET
Synchronous Digital
Hierarchy (SDH) Level
SONET Speed (Mbps)
STM-0 STS-1 (OC-1) 51.84
STM-1 STS-3 (OC-3) 155.52
STM-2 STS-6 (OC-6) 311.04
STM-3 STS-9 (OC-9) 466.56
STM-4 STS-12 (OC-12) 622.08
STM-8 STS-24 (OC-24) 1244.16
STM-16 STS-48 (OC-48) 2488.32
STM-32 STS-96 (OC-96) 4976.64
STM-64 STS-192 (OC-192) 9953.28
STM-256 STS-768 (OC-768) 39,813.12
Copyright 2012
Lesson 2
Introduction to Wide Area Networks (WANs)
Signaling Terminology
Circuit Switching and Packet Switching
WAN Connections
Dial-Up Connections
Direct Connections
Synchronous Optical Network (SONET)
Asynchronous Transfer Mode (ATM)

Copyright 2012
Asynchronous Transfer Mode
(ATM)
Figure 2-21: 53-byte ATM cell
Copyright 2012
ATM (cont'd)
Figure 2-22: Video and voice require constant data rate
Copyright 2012
1. What is a T1 circuit?
2. A statistical multiplexer provides each user
with ______________
3. What does a SONET add/drop multiplexer do?
4. Describe an ATM cell
5. Which technologies provide affordable high-speed
connections for home-based networks?
Lesson 2 Review
Copyright 2012
Suppose that you are about to set up a home office for
yourself and another user

At the very least, you will each require Internet access and
e-mail
You will likely be transferring files to and from various
customers as part of your business tasks
You will probably participate in online training from time to
time to keep current on your job skills

What factors should you consider when determining the type
of Internet access to purchase?


Lesson 2
Application Project
Copyright 2012
1. SONET A. A central connection point for wireless network clients
2. ISDN PRI
B. A central connection location for incoming and
outgoing lines of a LAN
3. ATM
C. A base-16 numbering system that uses the digits 0
through 9 and the letters A through F
4. T1
D. A permanent address burned into a network
interface card (NIC)
5. cable modem
E. A unique numerical address assigned to a
device or computer on a network on a leased basis
6. DSL
F. A connection-oriented technique that can transport
uniform 53-byte cells
Match each technology with the correct description
Activity 2-1: Reviewing
WAN technology concepts
Copyright 2012
Local Area Networks (LANs)
Course Lessons
Lesson 1: Overview of Local Area Networks
Lesson 2: Wide Area Networks (WANs)
Lesson 3: Networking and the Internet
Lesson 4: LAN Topologies
Lesson 5: Networking Models, Traffic and Devices
Lesson 6: Transmission Media
Lesson 7: LAN Standards, Wireless Networking
and Name Resolution
Lesson 8: Network Management
Copyright 2012
1. If you want to establish a DMZ using only one firewall, how
many network interface cards (NICs) does the firewall need?
a. One
b. Two
c. Three
d. Four
2. Which of the following was the first global computer network?
a. ARPANET
b. NSFnet
c. The World Wide Web
d. CompuServe
3. What are two ways in which internal LAN security can be
accomplished?
Lesson 3
Pre-Assessment Questions
Copyright 2012
Lesson 3
Networking and the Internet
The Need for Security
Firewalls, Proxies and Security Zones
Internet, Intranets and Extranets
Remote Access and Virtual Private Network (VPN)
Availability, Fault Tolerance, Backup and Recovery
Copyright 2012
Networking and the Internet
Figure 3-1: Multiple connections among servers
Copyright 2012
Lesson 3
Networking and the Internet
The Need for Security
Firewalls, Proxies and Security Zones
Internet, Intranets and Extranets
Remote Access and Virtual Private Network (VPN)
Availability, Fault Tolerance, Backup and Recovery
Copyright 2012
Perimeter and Core Networks
Figure 3-2: Perimeter and core
Copyright 2012
Lesson 3
Networking and the Internet
The Need for Security
Firewalls, Proxies and Security Zones
Internet, Intranets and Extranets
Remote Access and Virtual Private Network (VPN)
Availability, Fault Tolerance, Backup and Recovery
Copyright 2012
Firewalls
Figure 3-3: Firewall
Copyright 2012
Demilitarized Zone (DMZ)
Figure 3-4: DMZ using two firewalls
Copyright 2012
Lesson 3
Networking and the Internet
The Need for Security
Firewalls, Proxies and Security Zones
Internet, Intranets and Extranets
Remote Access and Virtual Private Network (VPN)
Availability, Fault Tolerance, Backup and Recovery
Copyright 2012
Extranet
Figure 3-5: CTP+ Partners and Instructors login page -- extranet
Copyright 2012
Lesson 3
Networking and the Internet
The Need for Security
Firewalls, Proxies and Security Zones
Internet, Intranets and Extranets
Remote Access and Virtual Private Network (VPN)
Availability, Fault Tolerance, Backup and Recovery
Copyright 2012
Remote Access Server (RAS)
Figure 3-6: Remote access
Copyright 2012
Virtual Private Network (VPN)
Figure 3-7: VPN tunnel
Copyright 2012
Lesson 3
Networking and the Internet
The Need for Security
Firewalls, Proxies and Security Zones
Internet, Intranets and Extranets
Remote Access and Virtual Private Network (VPN)
Availability, Fault Tolerance, Backup and Recovery
Copyright 2012
Fault Tolerance RAID
Figure 3-8: Redundant array of inexpensive disks (RAID) 5
Copyright 2012
RAID 1: Disk Mirroring
Figure 3-9: Disk mirroring
Copyright 2012
RAID 1: Disk Mirroring (cont'd)
Figure 3-10: Mirror set
Disk 1 Disk 2
File 1
File 2
File 3
Copyright 2012
Disk Duplexing
Figure 3-11: Disk duplexing
Copyright 2012
RAID 5: Disk Striping with Parity
Figure 3-12: RAID 5 uses at least three hard disks
Copyright 2012
RAID 5: Disk Striping with
Parity (cont'd)
Figure 3-13: Disk striping with parity
Disk 1 Disk 2 Disk 3
Parity
File 1
File 2
File 3
Copyright 2012
Disaster Recovery Planning
Table 3-1: Alternate site types
Site Type Description
Hot
A site that is already connected to the Internet or to the company network,
and which is ready to operate. Servers and systems are functional and
ready to provide the services normally provided by the original site.
Requires minimal preparation time (e.g., 30 minutes) to activate
Warm
The site usually has all necessary data, but is not actively connected to
the Internet. Requires more time (e.g., 2 hours) to obtain all necessary
data (from backups) and configure network connections
Cold
Requires extended configuration in order to go live. Time can include
several hours to a day or more. Servers may need to be moved into the
site or configured. Network and telephony connections may also require
considerable time before the site can go live
Copyright 2012
1. What is an extranet?
2. Describe the function of a firewall
3. Which tunneling protocols are commonly used by
VPNs?
4. Describe a differential backup
5. What is authentication?
Lesson 3 Review
Copyright 2012
Suppose that you work in the IT department for a university

The university has multiple campuses in various locations
Professors and other faculty need to be able to easily post
questions, schedules and other documents to share in a secure
environment

Using the knowledge you gained in this lesson, suggest a solution
that would meet their requirements
Lesson 3
Application Project
Copyright 2012
Match each technology with the correct description
Activity 3-1: Reviewing
secure communication techniques
1. demilitarized
zone (DMZ)
A. Security barrier that controls the flow of information
between the Internet and a private network
2. virtual private
network (VPN)
B. Trusted devices within a LAN
3. firewall
C. An internal or in-house Web site and network
used only by employees within a company
4. intranet
D. A mini-network that resides between a company's
internal network and the public network; adds an
extra layer of security to the LAN
5. core network
E. An encrypted tunnel that allows secure
communications between two hosts across the Internet
Copyright 2012
Local Area Networks (LANs)
Course Lessons
Lesson 1: Overview of Local Area Networks
Lesson 2: Wide Area Networks (WANs)
Lesson 3: Networking and the Internet
Lesson 4: LAN Topologies
Lesson 5: Networking Models, Traffic and Devices
Lesson 6: Transmission Media
Lesson 7: LAN Standards, Wireless Networking
and Name Resolution
Lesson 8: Network Management
Copyright 2012
1. Which of the following is a disadvantage of bus topologies?
a. Difficult troubleshooting
b. Non-standard topology
c. Absence of support for Ethernet networks
d. Moderate data speed

2. Which of the following is a disadvantage of wireless (cell)
topologies?
a. Cannot be integrated with other topologies
b. Requires excessive amounts of cable
c. Opens security risks
d. Has no defined standards
Lesson 4
Pre-Assessment Questions
Copyright 2012
3. Which of the following uses coaxial cable terminated at
each end?
a. Busa
b. Ring
c. Star
d. Mesh
Lesson 4
Pre-Assessment Questions (cont'd)
Copyright 2012
Lesson 4
Network Topologies
Physical LAN Topologies
Media Access Methods
Copyright 2012
Lesson 4
Network Topologies
Physical LAN Topologies
Media Access Methods
Copyright 2012
Bus Topology
Figure 4-1: Bus topology
Copyright 2012
Ring Topology
Figure 4-2: Ring topology
Copyright 2012
Ring Topology (cont'd)
Figure 4-3: Token Ring network
Copyright 2012
Ring Topology (cont'd)
Figure 4-4: FDDI
Copyright 2012
Star Topology
Figure 4-5: Star topology
Copyright 2012
Lunch
Be back in
45 minutes!
Lunch Break
Copyright 2012
Hybrid Topology
Figure 4-6: Star bus
Copyright 2012
Mesh Topology
Figure 4-7: Partial mesh
Copyright 2012
Mesh Topology (cont'd)
Figure 4-8: Full mesh
Copyright 2012
Wireless (Cell) Topology
Figure 4-9: Wireless topology
Copyright 2012
Lesson 4
Network Topologies
Physical LAN Topologies
Media Access Methods
Copyright 2012
Carrier Sense Multiple Access (CSMA)
Figure 4-10: Ethernet collision detection
Copyright 2012
1. What are two methods that Carrier Sense Multiple
Access (CSMA) employs to handle messages that
are sent simultaneously?
2. Which topology would you use when unable to install
network cable?
3. What is inherent in mesh topologies that enable them
to provide high reliability?
4. What are advantages of star topologies?
5. Compare the two modes supported by wireless
topologies
Lesson 4 Review
Copyright 2012
Suppose that you work in the IT department of a financial services
company

The company has four offices, each of which provides a specific
type of financial service
The company officers have made it clear that all the offices must
be connected and able to communicate with one another at all
times

Using the knowledge you gained in this lesson, suggest a network
topology that would meet their requirements
Lesson 4
Application Project
Copyright 2012
1. In this section, consider each description (A through G). Which
topology does it describe? For each item, write one of the following
answers:
Bus Ring Star
Hybrid Mesh Wireless (cell)

A. Fiber Distributed Data Interface (FDDI) uses this topology
B. Uses an access point when part of a hybrid topology
C. Nodes connect to a central hub or switch
D. Combines two or more standard topologies
E. Uses a hub or media access unit (MAU) in a central location
F. Supports bandwidths of 100 Mbps or more over twisted-pair
G. Uses token passing as an access method
Activity 4-1: Reviewing
LAN topology concepts
Copyright 2012
2. In this section, answer the question in short essay form


Describe the basic features of physical star topologies
Activity 4-1: Reviewing
LAN topology concepts (cont'd)
Copyright 2012
Local Area Networks (LANs)
Course Lessons
Lesson 1: Overview of Local Area Networks
Lesson 2: Wide Area Networks (WANs)
Lesson 3: Networking and the Internet
Lesson 4: LAN Topologies
Lesson 5: Networking Models, Traffic and Devices
Lesson 6: Transmission Media
Lesson 7: LAN Standards, Wireless Networking
and Name Resolution
Lesson 8: Network Management
Copyright 2012
1. A mode of communication in which data can flow in two directions,
but in only one direction at a time is called:
a. Simplex
b. Half-duplex
c. Full duplex
d. Broadcast
2. Which of the following is true about switches?
a. Switches are used to implement virtual LANs (VLANs)
b. Switches translate protocols between dissimilar networks
c. Switches provide the connection point between a
computer system and the network cable
d. Switches operate at Layer 1
3. What is the function of a router?
Lesson 5
Pre-Assessment Questions
Copyright 2012
Lesson 5
Introduction to Networking Models
The OSI Reference Model
The TCP/IP Four-Layer Model
Traffic on the LAN
Local Networking Components
Copyright 2012
Lesson 5
Introduction to Networking Models
The OSI Reference Model
The TCP/IP Four-Layer Model
Traffic on the LAN
Local Networking Components
Copyright 2012
The OSI Reference Model
Table 5-1: OSI/RM layers
Layer Number Description
Application 7
The interface to the user resides at this layer. Web browsers and e-mail clients
function here. This is also the only layer that a user sees; the functions of the
other layers are transparent
Presentation 6
User input and other information is transformed at this layer into a standardized
format recognized by all operating systems
Session 5
Connections between communicating systems are set up and torn down at this
layer. This layer also adds traffic flow control and synchronization information
Transport 4
This layer is responsible for the accuracy of data transmission, and mechanisms
that operate here ensure that data is sent and received accurately and completely
Network 3
Data is organized into discrete units called packets at this layer. In addition to the
original data, each packet includes addressing information that is required to
deliver the packet to its intended destination
Data link 2
At this layer, packets are divided into discrete units called frames before being
sent across the transmission medium. This layer also controls access to the
transmission medium
Physical 1
This layer controls how data is transmitted and received across the media. Here,
frames are transmitted across the transmission medium in a bitstream (i.e., as a
series of 1s and 0s)
Copyright 2012
Data Encapsulation
Figure 5-1: Encapsulation and De-encapsulation
Copyright 2012
Data Encapsulation (cont'd)
Figure 5-2: Data at various stages of encapsulation
Copyright 2012
Packet Creation
Figure 5-3: Adding headers
Copyright 2012
Lesson 5
Introduction to Networking Models
The OSI Reference Model
The TCP/IP Four-Layer Model
Traffic on the LAN
Local Networking Components
Copyright 2012
The TCP/IP Four-Layer Model
Figure 5-4: Comparison of OSI and TCP model
Copyright 2012
Lesson 5
Introduction to Networking Models
The OSI Reference Model
The TCP/IP Four-Layer Model
Traffic on the LAN
Local Networking Components
Copyright 2012
Traffic on the LAN
Figure 5-5: Collision domains and broadcast domains
Copyright 2012
Traffic on the LAN (cont'd)
Table 5-2: Communication modes
Mode Description
Simplex
Data travels in only one direction, similar to a public
address (PA) system
Half-duplex
Data travels in two directions, but in only one direction at a
time, similar to a walkie-talkie

Traditional shared Ethernet uses half-duplex transmissions
Full-duplex
Data travels in two directions simultaneously, similar to a
phone conversation

Full-duplex Ethernet (or switched Ethernet) supports full-
duplex transmissions in a switched environment
Copyright 2012
Lesson 5
Introduction to Networking Models
The OSI Reference Model
The TCP/IP Four-Layer Model
Traffic on the LAN
Local Networking Components
Copyright 2012
Hubs
Figure 5-6: Hub connecting workstations
Copyright 2012
Bridges
Figure 5-7: Bridge between network segments
Copyright 2012
Switches
Figure 5-8: Ethernet 50-port switch
Copyright 2012
Routers
Figure 5-9: Router and subnets
Copyright 2012
Table 5-3: Routing protocols
Routing Protocol Type Protocol Name Protocol Description
Interior routing
protocols
Routing
Information
Protocol (RIP and
RIPv2)
Efficient for small networks (two or
three routers) with a relatively static
structure. RIP maintains only the best
route to a destination. Regular routing
table updates are sent across the
network
Open Shortest
Path First (OSPF)
Used in larger networks where multiple
alternative routes are available.
Routing decisions can take available
bandwidth and multiple paths into
consideration. Routing table updates
occur only when necessary
Exterior routing
protocols
Border Gateway
Protocol (BGP)
The exterior routing protocol used on
the Internet
Routing Protocols
Copyright 2012
Gateways
Figure 5-10: Gateway
Copyright 2012
1. Describe the three modes of communication
available on a network
2. List the seven layers of the OSI model, including both
layer number and name for each
3. Describe a protocol data unit (PDU)
4. List three practical functions of the OSI model
5. Describe a collision domain
Lesson 5 Review
Copyright 2012
Suppose that you work in the IT department for ABC Company

The company has an old shared Ethernet network that has grown
over the years
Network performance is slow
Management wants you to remedy the situation

Using the knowledge you gained in this lesson, suggest ways in
which you can replace or add networking devices in order to
improve network performance
Lesson 5
Application Project
Copyright 2012
Match each OSI layer with the correct description
Activity 5-1:
Reviewing the OSI model
7. Application A. Provides an interface to the user
6. Presentation
B. Transmits frames across the transmission medium
in a bitstream
5. Session
C. Controls access to the transmission medium and
encapsulates packets into frames
4. Transport D. Translates data into a standardized format
3. Network
E. Ensures that data is accurately and completely
sent and received
2. Data Link F. Creates packets and handles addressing
1. Physical G. Sets up, maintains and tears down connections
Copyright 2012
Local Area Networks (LANs)
Course Lessons
Lesson 1: Overview of Local Area Networks
Lesson 2: Wide Area Networks (WANs)
Lesson 3: Networking and the Internet
Lesson 4: LAN Topologies
Lesson 5: Networking Models, Traffic and Devices
Lesson 6: Transmission Media
Lesson 7: LAN Standards, Wireless Networking
and Name Resolution
Lesson 8: Network Management
Copyright 2012
1. What are the two main categories of transmission media?
a. Cable and free space
b. Cable and cellular
c. Wire and cellular
d. Wire and free space

2. True or False, and explain:
Future growth of a network is not a factor when
selecting transmission media

3. What device transmits signals to and from a satellite from
Earth?
Lesson 6
Pre-Assessment Questions
Copyright 2012
Overview of Transmission Media
Cable Transmission
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Lesson 6
Copyright 2012
Overview of Transmission Media
Cable Transmission
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Lesson 6
Copyright 2012
Overview of Transmission Media
Cable Transmission
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Lesson 6
Copyright 2012
Wire Diameter and Signal Attenuation
Figure 6-1: American Wire Gauge (AWG) standard
Copyright 2012
Shielded and Unshielded Twisted Pair
Figure 6-2: Shielded twisted pair (STP) cable
Copyright 2012
Shielded and Unshielded
Twisted Pair (cont'd)
Figure 6-3: Unshielded twisted pair (UTP) cable
Copyright 2012
Twisted-Pair Categories
Table 6-1: Twisted-pair cable categories (Cat 5 through Cat 7)
Cable Grade Bandwidth Specific Network(s)
Category 5
-100 Mbps
-Can sustain rates up
to 100 MHz
Can be used for both standard Ethernet (10 Mbps) and
Fast Ethernet (100 Mbps). A popular implementation
Category 5e
-1 Gbps (1,000 Mbps)
-Can sustain rates up
to 100 MHz
Can be used for Fast Ethernet and Gigabit Ethernet and
other high-speed networks. Has largely replaced Cat 5 in
many implementations
Category 6
-2.5 Gbps
-Can sustain rates up
to 250 MHz
Supports Gigabit Ethernet. Unlike other categories of
twisted pair, Cat 6 is not particularly durable and can
cease to function if it is improperly bent
Category 6E
-10 Gbps
-Can sustain rates up
to 500 MHz
Suitable for 10-Gigabit Ethernet and faster, more
powerful networks
Category 7
-10 Gbps
-Can sustain rates up
to at least 600 MHz
An emerging standard. Shielded. Contains four
individually shielded twisted pairs inside an overall shield,
and supports data transmission up to 10 Gbps. Rated at
600 MHz
Copyright 2012
Overview of Transmission Media
The Cable Plant
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Lesson 6
Copyright 2012
Coaxial Cable
Figure 6-4: Coaxial cable
Copyright 2012
Overview of Transmission Media
The Cable Plant
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Lesson 6
Copyright 2012
Fiber-Optic Cable
Figure 6-5: Fiber-optic cable
Copyright 2012
Modes of Optical Fiber
Figure 6-6: Single and multimode fiber
Copyright 2012
Modes of Optical Fiber (cont'd)
Table 6-2: Single-mode vs. multimode optical fiber
Single-Mode Fiber Multimode Fiber
One transmission path Multiple transmission paths
No smearing Smearing
More pulses per second Fewer pulses per second
High transmission speeds Low transmission speeds
Long-distance transmissions Short-distance transmissions
Copyright 2012
Light Sources
Table 6-3: LED vs. laser as fiber-optic light source
LED Laser
Lower output power Higher output power
More diffuse beams Less diffuse beams
For shorter distances For long distances
Multimode fibers Single-mode fibers
Less expensive More expensive
Does not require special operating
conditions
Requires special operating
conditions
Copyright 2012
Overview of Transmission Media
The Cable Plant
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Lesson 6
Copyright 2012
Overview of Transmission Media
The Cable Plant
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Lesson 6
Copyright 2012
Overview of Transmission Media
The Cable Plant
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Lesson 6
Copyright 2012
Overview of Transmission Media
The Cable Plant
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Lesson 6
Copyright 2012
Overview of Transmission Media
The Cable Plant
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Lesson 6
Copyright 2012
Microwave
Figure 6-7: Distance limits of microwave transmissions
Copyright 2012
Microwave (cont'd)
Figure 6-8: Microwave transmission between buildings
Copyright 2012
Overview of Transmission Media
The Cable Plant
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Lesson 6
Copyright 2012
Satellite
Figure 6-9: Components of satellite network
Copyright 2012
Satellite (cont'd)
Figure 6-10: Orbits of GEOs, MEOs, LEOs
Copyright 2012
Satellite (cont'd)
Figure 6-11: Transponders in satellite
Copyright 2012
Satellite (cont'd)
Figure 6-12: Transmission process in satellite network
Copyright 2012
1. What are the two main categories of transmission
media?
2. What is the difference between standard voice-grade
cabling and data-grade cabling?
3. True or false: A diameter of a 22AWG twisted-pair
cable is smaller than a 26AWG twisted pair cable
4. In which frequency bands to do short-range wireless
transmission operate?
Lesson 6 Review
Copyright 2012
5. What are the two types of light source used to
transmit signals over optical fiber?
6. What is the fastest, most accurate way to optically
transmit data over long distances?
7. What medium does infrared technology use to
transmit signals?
8. True or false: Bluetooth is a good example of short-
range wireless transmission

Lesson 6 Review
Copyright 2012
9. True or false: Microwave signals are line-of-sight
transmissions
10. Which forms of free-space transmission do NOT
require line of sight?
Lesson 6 Review
Copyright 2012
Consider the following situations and decide which
transmission technology is the best choice for each

a. A large company needs to transmit large amounts
of data to remote offices on a regular basis
b. A hospital in a remote area needs a dependable remote
connection to a large research hospital
c. A user wants a convenient way to transfer data between a
laptop PC and a smartphone
d. A company wants to have laptop PCs remain connected
as users move around the building
Lesson 6
Application Project
Copyright 2012
Consider the following situations and decide which
transmission technology is the best choice for each

e. A company is implementing a small LAN and wants to
keep the expense at a minimum
f. A radio station wants to increase its range to cover several
hundred miles
g. A user wants to print to a printer that is located near, but
not connected to, his or her workstation
Lesson 6
Application Project (cont'd)
Copyright 2012
Activity 6-1: Reviewing
transmission media concepts
A. In this section, consider each description (1 through 7). Which
transmission medium does it describe? For each item, write one of
the following answers:
Microwave Satellite Infrared
Short-range wireless Coaxial cable
Twisted-pair cable Fiber-optic cable

1. The devices that send and receive the signals are usually contained
within the same room
2. The cable is made of concentric layers that include core, cladding
and sheath
3. This free-space technology makes it possible to transmit information
between two stations that are not within the line of sight of each other
Copyright 2012
Activity 6-1: Reviewing
transmission media concepts (cont'd)
A. Which transmission medium does it describe?
Microwave Satellite Infrared
Short-range wireless Coaxial cable
Twisted-pair cable Fiber-optic cable

4. Two copper wires twisted around each other in a double helix,
usually in plastic sheathing
5. Signals are sent by line-of-sight transmission via parabolic antennas
mounted on towers
6. The cable typically consists of four layers: core, foam/dielectric
insulator, metal jacket of braided copper or aluminum, and a
polyethylene cover
7. LAN connectivity method that allows laptop users to move freely
around an office building
Copyright 2012
Activity 6-1: Reviewing
transmission media concepts (cont'd)
B. In this section (8 through 9), answer the questions in short essay
form



8. Describe microwave transmission

9. Describe twisted-pair cable as a transmission medium
What types exist, and what are their advantages and disadvantages?
Copyright 2012
Local Area Networks (LANs)
Course Lessons
Lesson 1: Overview of Local Area Networks
Lesson 2: Wide Area Networks (WANs)
Lesson 3: Networking and the Internet
Lesson 4: LAN Topologies
Lesson 5: Networking Models, Traffic and Devices
Lesson 6: Transmission Media
Lesson 7: LAN Standards, Wireless Networking
and Name Resolution
Lesson 8: Network Management
Copyright 2012
1. Which of the following statements is true of NetBIOS
names?
a. They can be used across the Internet
b. They are supported by UNIX, Linux and MacOS
operating systems
c. They can be discovered by querying a domain name
server
d. They are recognized only within a Windows LAN


2. How are domain names structured?
Lesson 7
Pre-Assessment Questions
Copyright 2012

3. Which of the following technologies use(s) the CSMA/CD
access method?
a. 802.3 and 802.3u
b. 802.5
c. 802.11a and 802.11n
d. 802.12


Lesson 7
Pre-Assessment Questions (cont'd)
Copyright 2012
Lesson 7
Networking Standards Organizations
The IEEE and LAN Standards
IEEE 802.3: Ethernet Standards
IEEE 802.11: Wireless LAN Standards
Wireless LAN Operations
Resolving System Names
Copyright 2012
Lesson 7
Networking Standards Organizations
The IEEE and LAN Standards
IEEE 802.3: Ethernet Standards
IEEE 802.11: Wireless LAN Standards
Wireless LAN Operations
Resolving System Names
Copyright 2012
IEEE Committees
Figure 7-1: IEEE 802.x committees develop
standards for OSI Layers 1 and 2
Copyright 2012
IEEE Committees (cont'd)
Table 7-1: IEEE committees
IEEE
Committee
Subject Description Committee Notes
802.1
LAN/MAN
architecture
Internetworking, network
management and bridging

802.2
Logical Link Control
(LLC)

This committee is in
hibernation
802.3 CSMA/CD (Ethernet)
Includes Ethernet (802.3), Fast
Ethernet (802.3u), Gigabit Ethernet
(802.3z, 802.3ab) and 10-Gigabit
Ethernet (802.3ae)

802.4 Token bus
A standard for implementing the
Token Ring protocol over a "virtual
ring" on a coaxial bus
This committee is
disbanded and that
standard has been
withdrawn
802.5 Token Ring A standard for token passing
This committee is in
hibernation
Copyright 2012
IEEE Committees (cont'd)
Table 7-1: IEEE committees (cont'd)
IEEE
Committee
Subject Description Committee Notes
802.6
Distributed queue
dual bus (DQDB)
A standard for using fiber in MANs
This standard has been
withdrawn and the
committee is
disbanded. Most MANs
now use SONET or
ATM
802.7 Broadband LAN
A standard for broadband local
area networks
This standard has been
withdrawn and the
committee is disbanded
802.8
Fiber Distributed
Data Interface
(FDDI)
A standard for fiber-optic media in
token-passing ring networks
This committee is
disbanded
802.9
Evolving marriage of
LAN and ISDN
A standard formerly known as
isoEthernet that combined 10-
Mbps Ethernet and 96 64-Kbps
ISDN "B" channels
Fast Ethernet pushed
isoEthernet out of the
market place and this
committee is disbanded
Copyright 2012
IEEE Committees (cont'd)
Table 7-1: IEEE committees (cont'd)
IEEE
Committee
Subject Description Committee Notes
802.10 LAN security
A former standard for security
functions that could be used in
both LANs and MANs
This standard has been
withdrawn (largely
replaced by 802.1q in
VLANs and 802.11i in
WLANs) and the
committee is disbanded
802.11 Wireless LANs
Includes 802.11a/b/g/n networks,
as well as the 802.11e and
802.11h amendments

802.12 100VG-AnyLAN
A standard for the 100-Mbps
transport of both Ethernet and
Token Ring frames using a media
access method called demand
priority, which allows voice and
video packets to be given high
priority
Today, this protocol is
obsolete and the
committee is disbanded
Copyright 2012
IEEE Committees (cont'd)
Table 7-1: IEEE committees (cont'd)
IEEE
Committee
Subject Description Committee Notes
802.14 Cable TV broadband
This committee is
disbanded
802.15
Wireless personal
area networks
(WPANs)
Includes standards for Bluetooth,
co-existence of WPANs with other
wireless devices, high-rate and
low-rate WPANs, and mesh
networking

802.16
Broadband wireless
networking (WiMAX)
A standard for wirelessly delivering
(via microwave) high-speed
Internet service to large
geographical areas

802.17 Resilient packet ring
A standard designed to optimize
the transport of data traffic over
optical-fiber ring networks
This committee has no
current active projects
Copyright 2012
IEEE Committees (cont'd)
Table 7-1: IEEE committees (cont'd)
IEEE
Committee
Subject Description Committee Notes
802.20
Mobile Broadband
Wireless Access
(MBWA)
A standard for mobile wireless
Internet access networks
This committee is
currently inactive
802.21
Media Independent
Handoff
A standard for handover and
roaming between 802.11 networks
and 3G cellular networks

802.22
Wireless Regional
Area Network
A standard for using the unused
spaces in the television frequency
spectrum to bring broadband
access to hard to reach low-
density population areas

802.23
Emergency Services
Working Group
A standard to provide location
information for VoIP clients for
purposes of securing emergency
(911) services

Copyright 2012
Lunch
Be back in
45 minutes!
Lunch Break
Copyright 2012
Lesson 7
Networking Standards Organizations
The IEEE and LAN Standards
IEEE 802.3: Ethernet Standards
IEEE 802.11: Wireless LAN Standards
Wireless LAN Operations
Resolving System Names
Copyright 2012
Ethernet Standards
Table 7-2: Ethernet vs. Fast Ethernet
Characteristic Ethernet Fast Ethernet
Speed 10 Mbps 100 Mbps
IEEE standard IEEE 802.3 IEEE 802.3u
Access method CSMA/CD CSMA/CD
Topology Bus/star Star
Cable support Co-ax/twisted pair/fiber Twisted pair/fiber
UTP link distance
(maximum)
100 meters 100 meters
Copyright 2012
Lesson 7
Networking Standards Organizations
The IEEE and LAN Standards
IEEE 802.3: Ethernet Standards
IEEE 802.11: Wireless LAN Standards
Wireless LAN Operations
Resolving System Names
Copyright 2012
Wireless LAN Standards
Table 7-3: 802.11 wireless LAN flavors
IEEE
Specification
Theoretical
Top Speed
Frequency Comments
802.11a
54 Mbps 5 GHz -Indoor range of 35 meters; outdoor range of 120 m
-Includes error correction
-Offers strong encryption and authentication
-Not compatible with 802.11b or 802.11g
802.11b
11 Mbps 2.4 GHz -Indoor range of 38 m; outdoor range of 140 m
-Subject to interference from microwave ovens, cordless
phones and Bluetooth devices, which operate in the same
frequency band
802.11g
54 Mbps 2.4 GHz -Indoor range of 38 m; outdoor range of 140 m
-Backward compatible with 802.11b (but only at 802.11b
speed)
-Offers encryption and authentication features similar to
802.11a
802.11n
300 Mbps 2.4 GHz and
5 GHz
-Indoor range of 70 m; outdoor range of 250 m
-Offers high speed and twice the range of 802.11g
-Supports streaming technologies
Copyright 2012
Lesson 7
Networking Standards Organizations
The IEEE and LAN Standards
IEEE 802.3: Ethernet Standards
IEEE 802.11: Wireless LAN Standards
Wireless LAN Operations
Resolving System Names
Copyright 2012
Wireless Networking Modes
Figure 7-2: Wireless networking modes
Copyright 2012
Lesson 7
Networking Standards Organizations
The IEEE and LAN Standards
IEEE 802.3: Ethernet Standards
IEEE 802.11: Wireless LAN Standards
Wireless LAN Operations
Resolving System Names
Copyright 2012
Domain Name Structure
Figure 7-3: Typical domain name
Copyright 2012
DNS Name Space
Figure 7-4: Domain name space hierarchy

.(root)
se com mx
user1
xyz
net ch ie
ftp
iso
user2 www
Copyright 2012
1. Define fast Ethernet
2. What type of cable can you use for Fast Ethernet?
3. What does IEEE 802.15 define?
4. Which access method is used in wireless LANs?
5. What is the frequency band used in an IEEE 802.11n
network?
Lesson 7 Review
Copyright 2012
Suppose you are part of the IT staff at a small
business

Management has expressed the desire to include
wireless connectivity throughout the office space
They want to enable traveling sales personnel to easily
connect to the LAN whenever they drop in, regardless of
whether a dedicated "office space" is available
They think it would be beneficial for the non-traveling
employees to have wireless access as well

Lesson 7
Application Project
Copyright 2012
Consider the following questions

How will the IT staff decide upon which wireless
standard to implement?
What factors should be taken into consideration?
What type of security challenges might the wireless
solution cause?
How will the IT staff plan to meet those challenges?
Lesson 7
Application Project (cont'd)
Copyright 2012
Match each IEEE 802.11 wireless standard with the correct description
Activity 7-1: Reviewing 802.11
wireless standards
1. 802.11e
2. 802.11a
3. 802.11b
4. 802.11g
5. 802.11i (WPA2)
6. 802.11n
A. Operates at speeds up to 11 Mbps in the 2.4-GHz range and is
subject to interference from cordless phones and Bluetooth
devices
B. Provides Quality of Service (QoS) standards for wireless
networks, enabling them to carry time-sensitive packets, such
as those for Voice over Wireless LAN (VoWLAN) and streaming
media
C. Can operate in either the 2.4-GHz or the 5-GHz band, offering
speeds up to 300 Mbps, and also supports streaming
technologies
D. Specifies security mechanisms with strong encryption for
wireless networks that use other 802.11 specifications
E. Operates at up to 54 Mbps in the 5-GHz band, includes error
correction, and offers strong encryption and authentication
F. Operates at speeds of up to 54 Mbps in the 2.4-GHz band, and
offers encryption and authentication features
Copyright 2012
Local Area Networks (LANs)
Course Lessons
Lesson 1: Overview of Local Area Networks
Lesson 2: Wide Area Networks (WANs)
Lesson 3: Networking and the Internet
Lesson 4: LAN Topologies
Lesson 5: Networking Models, Traffic and Devices
Lesson 6: Transmission Media
Lesson 7: LAN Standards, Wireless Networking
and Name Resolution
Lesson 8: Network Management
Copyright 2012
1. A point in a network where traffic slows considerably is
called a:
a. test point
b. baseline
c. bottleneck
d. network analyzer
2. To which of the following configuration settings might a
network administrator want to restrict access?
a. Network settings
b. Screen resolution settings
c. Desktop wallpaper settings
d. Screensaver settings
3. Describe Platform as a Service (PaaS)
Lesson 8
Pre-Assessment Questions
Copyright 2012
Lesson 8
What Is Network Management?
ISO Functional Areas of Network Management
Network Planning
Monitoring and Analysis Tools and Protocols
Hardware Management
Software Management
Security Management

Copyright 2012
Lesson 8
What Is Network Management?
ISO Functional Areas of Network Management
Network Planning
Monitoring and Analysis Tools and Protocols
Hardware Management
Software Management
Security Management

Copyright 2012
ISO Functional Areas
Table 8-1: ISO functional areas of
network management (FCAPS)
Area Description
Fault
Pertains to maintaining the integrity of network operation, and detecting and
correcting anomalous network behavior
Configuration
Pertains to installing, initializing, modifying and tracking the configuration
parameters of network hardware and software
Accounting
Pertains to resource use, including data, software and licensing; sometimes
referred to as administration, or billing management
Performance
Pertains to developing a baseline of network performance and measuring
ongoing developments accordingly
Security Pertains to access control and data integrity
Copyright 2012
Lesson 8
What Is Network Management?
ISO Functional Areas of Network Management
Network Planning
Monitoring and Analysis Tools and Protocols
Hardware Management
Software Management
Security Management

Copyright 2012
Lesson 8
What Is Network Management?
ISO Functional Areas of Network Management
Network Planning
Monitoring and Analysis Tools and Protocols
Hardware Management
Software Management
Security Management

Copyright 2012
Network Analysis Tools
Figure 8-1: Wireshark packet capture
Copyright 2012
Simple Network Management
Protocol (SNMP)
Figure 8-2: SNMP management station and agents
Copyright 2012
Lesson 8
What Is Network Management?
ISO Functional Areas of Network Management
Network Planning
Monitoring and Analysis Tools and Protocols
Hardware Management
Software Management
Security Management

Copyright 2012
Lesson 8
What Is Network Management?
ISO Functional Areas of Network Management
Network Planning
Monitoring and Analysis Tools and Protocols
Hardware Management
Software Management
Security Management

Copyright 2012
Lesson 8
What Is Network Management?
ISO Functional Areas of Network Management
Network Planning
Monitoring and Analysis Tools and Protocols
Hardware Management
Software Management
Security Management

Copyright 2012
1. What is an operating system patch?
2. Why are some users reluctant to store their files in
network folders?
3. Describe the function of Dynamic Host Configuration
Protocol (DHCP)
4. Why are network drives considered a safe place to
store user documents?
5. Describe a site license
Lesson 8 Review
Copyright 2012
Suppose you are a consultant for a growing company
that is planning to expand and speed up its network
Describe the issues that must be considered to ensure
that the end product meets with user expectations and
needs
Lesson 8
Application Project
Copyright 2012
Match each term with the correct description
Activity 8-1: Reviewing the functional
areas of network management
1. Configuration
management
A. Involves developing a baseline and measuring
ongoing conditions against the baseline
2. Fault management B. Includes ensuring that all software is properly
licensed and tracking which users use which
applications and resources
3. Performance
management
C. Includes scheduling regular backups and using
permissions to restrict access to network
resources
4. Accounting
management
D. Includes setting up corporate systems as DHCP
clients and using remote connection applications
to troubleshoot servers
5. Security
management
E. Involves maintaining ongoing network operation,
and detecting and correcting anomalous network
behavior
Copyright 2012
Thank You
Thank you for attending this course

Local Area Networks (LANs) is the fourth course in the
six-course CCNT series

For information about the CCNT program or taking the
CCNT LANs certificate exam, ask your instructor or
visit the CCNT page at
www.CTPcertified.com/Certification/ccnt.php

You might also like