You are on page 1of 232

Exam Prep:

Microsoft Technology Associate 98-366: Networking


Fundamentals
Course Topics

Network Fundamentals
01 | Understanding Local Area Networking
02 | Defining Networks with the OSI Model
03 | Understanding Wired and Wireless Networks
04 | Understanding Internet Protocol (IP)
05 | TCP/IP Tools
06 | Network Services
07 | Understanding Wide Area Networks
08 | Defining Network Infrastructure and Security
Setting Expectations

• Target Audience
• IT Help Desk staff interested in moving into Network/Systems Administration
• Anyone interested in learning more about networking
• Suggested Prerequisites/Supporting Material
• Exam 98-349: Windows Operating System Fundamentals
Understanding Local Area Networking

Module 1
Objectives
Skills/Concepts Objective Domain Objective Domain
Description Number
Examining Local Area Understand local area 1.2
Networks, Devices and networks (LANS)
Data Transfers
Identifying Network Understand network 1.5
Topologies and topologies and access
Standards methods
Network components and Terminology
• Data • Switch
• Node • Router
• Client • Media
• Server • Transport Protocol
• Peer • Bandwidth
• Network adapter
• Hub
Local Area Network

A Local Area Network (LAN) A LAN is a group of


is group of computers computers or devices that
confined to a small share a common
geographic area, such as a communication medium,
single building such as cabled or wireless
connections
Networks
• Networks are used to exchange data
• Reasons for networks include
• Sharing information
• Communication
• Organizing data
Network Documentation
• Network documentation helps describe, define, and
explain the physical and logical method for
connecting devices
• The documentation phase occurs before a network
is built, or when changes are made to the network
• Microsoft Visio is a tool that can be used to
document networks
Hub
• A Hub is the most basic
central connecting
device •
• Hubs enable computers
on a network to •
communicate
• A host sends data to the
hub. The hub sends the
data to all devices
connected to the hub
Switch
• Switches work the same
was as a hub, but they
can identify the •
intended recipient of
the data •
• Switches can send and
receive data at the same
time
Router
Internet
• Routers enable
computers to 24.136.72.110
communicate and allow
communication between
two networks – such as
your home network and
the Internet
192.168.1.1
• This communications link
between the one
network and the other is
where the LAN ends
Network Adapter and RJ45 Patch Cable
A network adapter, also known RJ45 is the most common type
as a network interface card of network adapter connection
(NIC), is the hardware device
that enables you to send and
receive from your computer

• A network adapter can connect to the network by


using cable (wired) or by air (wireless)
Wireless Access Point
• The wireless access point (WAP) acts as the central
connecting device for the network
• Wireless networks can consist of many types of
devices other than traditional PCs:
• Smart phones
• PDAs
• Tablet computers
• Micro computers
• PCs and laptops equipped with wireless network adapters can connect to these
networks as well
Demo
• Device Manager Showing Network Adapters
• Network Adapter Properties
• IP Address
Serial Data Transfer
• Serial data transfer is the transfer of one bit at a
time—in other words, transfer in a single-bit stream,
like a one lane highway
• On the network cable, data travels in a single bit
stream
Data Transfer Rate
• Data transfer rate defines the maximum bits per
second (bps) that can be transmitted over a network
• Rated in bits, and signified with a lowercase b (for
example, 10 Mbps)
• The lowercase b differentiates this unit from data that
is stored on a hard drive, which uses an upper case B
that stands for bytes (for example 10 MB)
• Types of Transfers
• Broadcast sends data to every other host on the
network
• Unicast sends data to a specific host
IP Address
• Most every computer and many other devices have
an Internet Protocol (IP) address
• An IP address uniquely identifies your device and
the associated network and allows each device to
send and receive information
• A typical example of an IPv4 address would be
192.168.1.1
• Every IP address is broken down into two parts by a
subnet address
• Network ID 192.168.1
• Host ID 1
LAN
• Computers and other devices are connected using
copper-based twisted-pair cables or wireless
equipment
Virtual LAN
• A virtual LAN (VLAN) is a group of hosts with a common set of
requirements that communicate as if they were connected together in
a normal fashion on one switch, regardless of their physical location.
Port 1: VLAN1 Port 6: VLAN1
Port 2: VLAN1 Port 7: VLAN2
Port 3: VLAN2 Port 8: VLAN1
Port 4: Port 9:
Port 5: VLAN1 Port 10:
Network Topology
• A network topology defines the physical connections of hosts in a
computer network.
• There are several types of physical topologies including:
• Bus
• Ring
• Star
• Mesh
• Tree
Star Topology
• Most Common
topology
• Each computer is
individually wired
to a central
connecting device
(hub, switch or
SOHO router) with
twisted-pair
cabling
Mesh Topology
• Every computer
connects to every
other computer; no
central connecting
device is needed.
Ring Topology
• In a LAN environment,
each computer is
connected to the
network using a closed
loop
• Used by Token Ring
and Fiber Distributed
Data Interface (FDDI)
Token Ring
• A Token Ring network sends data logically in a ring fashion, meaning
that a token goes to each computer, one at a time, and continues on in
cycles
• Physically Token Ring computers are connected in a star fashion
• Namely, all computers in a Token Ring network are connected to a
central connecting device known as a Multistation Access Unit (MAU or
MSAU)
Ethernet
• Institute of Electrical and Electronics Engineers (IEEE) standard (802.3)
that defines how information is sent and received between network
adapters, hubs, switches, and other devices
• Ethernet is the de facto standard and is the most widely-installed local
area network technology
• Common types of Ethernet include:
• 802.3u or Fast Ethernet that runs at 100 Mbps
• 802.3ab or Gigabit Ethernet
Frames
• Computers on Ethernet networks communicate via frames
• A frame is a sequence of bits containing a detectable beginning and
end of a packet in the stream of bits
• A frame is a data packet residing on Layer 2 of the OSI model

frame

preamble crc
(8 bytes) (4 bytes)
Centralized Computing
• Computing is done at a central location using terminals that are
attached to this main system
• Mainframes are a powerful computer and the rest of the devices
connected to the computer are known as terminals (or dumb
terminals)
• Each terminal consisted solely of a keyboard and display with no
processing power
Client/Server Model
• The client/server model is an architecture that distributes applications
between servers and client computers
• Server: System that provides services such as Windows Server 2008 R2
• Client: Device that requests services such as Windows 7
Peer-to-Peer Networking
• Peer-to-peer networking distributes applications or workloads between
computers
• Peers are both service providers and service requestors
Distributed Computing
• Distributive computing includes both client-server and peer-to-peer
networks
• Every device or workstation has its own processing power
Remote Desktop Services and Remote Sessions
• Centralized computing has made a comeback of sorts. Remote
Desktop Services and remote sessions to computers are based off of
the centralized computing model
• Thin-client computers do not have a hard drive and store an operating
system in RAM, to be loaded up every time the device is turned on
• All other applications and data are stored centrally, this system is a
blend of centralized and distributive computing
Servers
• More powerful computers that provide centralized services:
• File
• Print
• Database
• Network controller
• Messaging/Email
• Web
Client and Server Operating Systems
Client Operating Systems Server Operating Systems
Windows 8 Windows Server 2012
Windows 7 Windows Server 2008 R2
Windows Server 2008
Windows Vista Windows Server 2003
Windows XP
Windows 2000 Professional Windows 2000 Server
Windows NT 4.0 Workstation Windows NT 4.0 Server
Windows ME/98/95
P2P
• Peer-to-peer or P2P has recently taking on an additional meaning
• P2P can also refer to file sharing networks
• Examples of file sharing networks
• Napster
• Gnutella
• G2

• Other technologies also take advantage of P2P file sharing:


• Skype
• VoIP
• Cloud computing
Summary
• Understand local area networks (LANs), including but not limited to
LAN elements, design, perimeter networks, IP addressing, and LAN
types
• Understand network topologies and access methods, including
topologies such as star, mesh, and ring; Ethernet architecture; and the
client-server and peer-to-peer networking models
Additional Resources & Next Steps
Instructor-Led Courses
• 40033A: Windows Operating System and Windows
Server Fundamentals: Training 2-Pack for MTA
Exams 98-349 and 98-365 (5 Days)
• 40349A: Windows Operating System Fundamentals:
MTA Exam 98-349 (3 Days)
• 40032A: Networking and Security Fundamentals:
Training 2-Pack for MTA Exams 98-366 and 98-367
(5 Days)
• 40366A: Networking Fundamentals: MTA Exam 98-
Books 366
• Exam 98-366: MTA
Exams &
Networking Certifications
Fundamentals (Microsoft • Exam 98-366:
Official Academic Networking
Course) Fundamentals
Defining Networks with the OSI Model

Module 2
Objectives
Skills Concepts Objective Domain Objective Domain
Description Number

Understanding OSI Basics Understand the OSI 3.1


Defining the Communications Model
Subnetwork
Defining the Upper OSI Layers
Defining the Communications Understand Switches 3.1
Subnetwork
Standards
• Standards are sets of rules that ensure hardware and software released
from different companies work together
• Examples of Organizations that Coordinate Standards:

International
Organization for
Standardization (ISO) –
Federation of standards
organizations from multiple
nations
Open Systems Interconnection (OSI)
• The Open Systems Interconnection (OSI) reference model is used to
define how data communication occurs between devices
• The model is divided into 7 layers, each layer providing services to the
layers above and below
Layer Defines
Layer 7 – Application Layer Enables users and applications to access network services
Layer 6 – Presentation Layer Translates data into a common format
Layer 5 – Session Layer Establishes a communication session between devices
Layer 4 – Transport Layer Manages message fragmentation and reassembly
Layer 3 – Network Layer Manages data routing and creating sub networks
Layer 2 – Data Link Layer Provides error-free transfer of data frames
Layer 1 – Physical Layer Physical network media and signal methods
OSI Model Layers

Layer Protocol Data Unit Layer Protocol Data Unit


(PDU) (PDU)

Application Data Application Data


Presentation Data Presentation Data
Session Data Session Data
Transport Segment Transport Segment
Network Packet Network Packet
Data Link Frame Data Link Frame
Physical Bits Physical Bits

The Wire
Layer 1 – Physical Layer
• Defines the physical and electrical medium for data transfer
• Physical layer components: cables, jacks, patch panels, punch blocks,
hubs, and MAUs
• Physical layer concepts: topologies, analog versus digital/encoding, bit
synchronization, baseband versus broadband, multiplexing, and serial
data transfer
• Unit of measurement: Bits
Ethernet Standards
• LAN standard providing a communication method for high speed data
exchange among devices
• Defined Physical and Data Link Layer
• 100BASE-T
• 100 for 100 Mbps
• BASE for baseband
• T for twisted-pair cabling

• Baseband refers to the fact that devices on the network use digital
signaling over a single frequency
• Broadband systems use analog signaling over a range of frequencies
enabling multiple channels over the same physical medium
Layer 2 – Data Link Layer
• Establishes, maintains, and decides how transfer is accomplished over
the physical layer and ensures error-free transmission over the physical
layer
• Physical addresses (the hexadecimal address that is burned into the
ROM of the NIC), known as the MAC address uniquely identify each
hardware device work at the Data Link Layer
• Data Link Layer components: network interface cards and bridges
• Unit of measurement: frames
Media Access Control Address
• Network adapters on an Ethernet network have unique Media Access
Control (MAC) addresses
• MAC addresses are unique identifiers assigned to network adapters by
the manufacturer
• MAC address is six octets in length written in hexadecimal
Layer 2 Switches
• Layer 2 switches are hardware-based and use the MAC address of each
host computer’s network adapter when deciding where to direct data
frames
• Ports on the switch are mapped to the specific MAC address of the
device attached
Virtual LAN (VLAN)
• Layer 2 switching can also allow for a virtual LAN (VLAN) to be
implemented.
• A VLAN is implemented to segment and organize the network, to
reduce collisions, boost performance
• IEEE 802.1Q is the standard that supports VLANs
• A tag is added to the data frame to identify the VLAN
Layer 3 – Network Layer
• Controls the operations of routing and switching information to
different networks
• Translates logical addresses or names to physical addresses
• Internet Protocol (IP) is a Network Layer protocol
• Devices that work at the network layer are routers and IP switches
• Network Layer components: IP addresses, subnets
• Unit of measurement: packets
Layer 3 Switches
• Switches can also reside on the network layer
• A layer 3 switch determines paths for data using logical addressing (IP
addresses) instead of physical addressing (MAC addresses for a layer 2
switch)
• Layer 3 switches forward packets, whereas layer 2 switches forward
frames
Layer 4 – Transport Layer
• This layer ensures messages are delivered error-free, in sequence and
with no losses or duplications
• Protocols that work at this layer segment messages, ensure correct
reassembly at the receiving end, perform message acknowledgement
and message traffic control
• The Transport Layer contains both connection-oriented and
connectionless protocols
• Unit of measurement used: segments or messages
Connection Oriented Communications
• Require both devices involved in the communication establish an end-
to-end logical connection before data can be sent
• These communications are considered reliable network services
• Packets not received by the destination device can be resent by the
sender
Hello! I am a
PC
Hello! I am a
Server!

I want to send
you something
important!
Ok, I will
watch for it!
Connectionless Communications
• End-to-end connection is not necessary before data is sent
• Every packet that is sent has the destination address in the header
• Sufficient to move independent packets, such as in streaming media
• Datagram delivery is not guaranteed and lost packets cannot be resent

LISTEN TO ME!!!

AAAaaaahhh!!!!….
Connection-based Protocols
• The Transport Layer contains both connection-oriented and
connectionless protocols
• Transmission Control Protocol (TCP) provides a connection-based,
reliable, byte-stream service to programs
• User Datagram Protocol (UDP) provides a connectionless, unreliable
transport service
TCP and UDP
• TCP transport is used for logging on, file and print sharing, replication
of information between domain controllers, transfer of browse lists, and
other common functions. TCP can only be used for one-to-one
communications.
• UDP is often used for one-to-many communications, using broadcast
or multicast IP datagrams

Protocol Type Example

Transmission Control Protocol Connection-oriented Web browser


(TCP)
User Datagram Protocol (UDP) Connectionless Streaming media
Ports
• Ports are a Layer 4 protocol that a computer uses for data transmission
• Ports act as logical communications endpoint for specific program on
computers for delivery of data sent
• There are a total of 65,536 ports, numbering between 0 and 65,535
• Ports are defined by the Internet Assigned Numbers Authority or IANA
and divided into categories
Ports
Layer 5 – Session Layer
• The Session Layer manages session establishment, maintenance and
termination between network devices
• Example: when you log on and log off
• This layer controls the name and address database for the OS
• NetBIOS (Network Basic Input Output System) is a protocol that works
at this layer
Layer 6 – Presentation Layer
• This layer translates the data format from sender to receiver in the
various OSes that may be used
• Presentation Layer concepts include: character code conversion, data
compression, and data encryption
• Redirectors work on this layer, such as mapped network drives that
enable a computer to access file shares on a remote computer
Layer 7 – Application Layer
• Serves as a the window for users and application processes to access
network services
• This layer is where message creation begins
• End-user protocols such as FTP, SMTP, Telnet, and RAS work at this layer
• This layer is not the application itself, but the protocols that are initiated
by this layer
OSI Model Revisited

Layer Protocol Device


7 – Application FTP, HTTP, POP3, SMTP Gateway
6 – Presentation Compression, Encryption N/A
5 – Session Logon/Logoff N/A
4 – Transport TCP, UDP N/A
3 – Network IP, ICMP, ARP, RIP Routers
2 – Data Link 802.3, 803.5 NICs, Switches, Bridges,
WAPs
1 – Physical 100BASE-T, 1000BASE-X Hubs, Patch Panels, RJ45
Jacks
TCP Model
• The TCP/IP model is similar to the OSI model
• This model is composed of only four layers

Layer Description Protocols


Application Layer Defines TCP/IP application protocols HTTP, Telnet, FTP, SMNP, DNS
Transport Layer Provides communication session TCP, UDP, RTP
management
Internet Layer Packages and routes data IP, ICMP, ARP, RARP

Network Interface Details how data is physically sent through Ethernet, Token Ring, Frame
the network Relay
OSI Model compared to TCP Model

OSI Model TCP Model


Application Layer
Presentation Layer Application Layer
Session Layer
Transport Layer Transport Layer
Network Layer Internet Layer
Data Link Layer
Network Access Layer
Physical Layer

• The OSI Physical layer is skipped altogether on the TCP model


Summary
• Understand the OSI model by defining each of the layers from a theory
perspective
• Be able to separate the functions of the lower levels of the OSI model,
from the upper levels where message creation begins.
• Understand the differences between layer 2 and layer 3 switches, and
gain a basic understanding of how they operate.
• Differentiate between the OSI model and the TCP model.
Additional Resources & Next Steps
Instructor-Led Courses
• 40033A: Windows Operating System and Windows
Server Fundamentals: Training 2-Pack for MTA
Exams 98-349 and 98-365 (5 Days)
• 40349A: Windows Operating System Fundamentals:
MTA Exam 98-349 (3 Days)
• 40032A: Networking and Security Fundamentals:
Training 2-Pack for MTA Exams 98-366 and 98-367
(5 Days)
• 40366A: Networking Fundamentals: MTA Exam 98-
Books 366
• Exam 98-366: MTA
Exams &
Networking Certifications
Fundamentals (Microsoft • Exam 98-366:
Official Academic Networking
Course) Fundamentals
Understanding Wired and Wireless Networks

Lesson 3
Objectives

Skills Concepts Objective Domain Objective Domain


Description Number

Recognizing Wired Networks Understand Media 2.3


and Media Types Types

Comprehending Wireless Understand Wireless 1.4


Networks Networking
Twisted-Pair Cable
• the most commonly used cable type in local area networks
• relatively easy to work with, flexible, efficient, and fast
• contains eight wires grouped into four twisted pairs, typically blue,
orange, green, and brown
• The twisted wires reduce crosstalk and interference
Twisted-Pair Cable with the Wires Exposed
Twisted Pair Categories
• Twisted-pair cables are categorized according to the frequency at
which they transmit signals and their data transfer rate

Cable Type Speed

Category 3 (Cat-3) 10 Mbps

Category 5 (Cat-5) 100 Mbps

Category 5e (Cat-5e) 100 Mbps and 1000 Mbps+

Category 6 (Cat-6) 1000 Mbps+


Tools For Twisted Pair Cables
Types of Patch Cables
• Straight through cable
• Most common type of patch cable
• Used to connect a computer to a central connecting device like a switch

• Crossover cable
• Used to direct connect similar devices without the use of a hub
MDI and MDI-X Ports
• Medium dependent interface (MDI) is a type of Ethernet port connection
using twisted pair cabling
• For computers to communicate with other devices, the wires have to cross
somewhere
• Instead of using crossover cables to connect computers to central
connecting devices such as switches, these central connecting devices are
equipped with MDI-X ports (medium dependent interface crossover),
which take care of the cross
Patch Panel and RJ45 Wall Jack
Tools
• The tools necessary to make the connections between patch panels
and RJ45 jacks include a cutting tool, a wire stripper, a punch down
tool, and a testing device known as a continuity tester, which tests all of
the pins of a connection one by one.
Attenuation:
The quantity of information reaching the receiver as compared to the
transmitted quantity of information

• Measured in decibels (dB)


• According to the IEEE 802.3 standard, twisted-pair cables can be run
100 meters. Beyond this the signal degrades to such a point that it
cannot be interpreted by the destination host.
• A signal repeater, a hub, or switch can be used If a cable needs to be
run farther
Interference:
anything that disrupts or modifies a signal that is traveling along a wire

• Electrical Sources
• Lights
• Electrical Outlets
• Motors
• Appliances
• Copper-based cables and network devices should be kept away from
these electrical devices and cables if at all possible
Electromagnetic Interference (EMI)
• Electromagnetic Interference (EMI) disturbance can affect electrical
circuits, devices, and cables due to electromagnetic conduction and
possibly radiation
• Any type of electrical device causes EMI: TVs, air conditioning units,
motors, unshielded electrical cables (Romex)
• Copper-based cables and network devices should be kept away from
these electrical devices and cables to prevent network communication
issues
Radio Frequency Interference (RFI)
• This is interference that can come from AM/FM transmissions and cell
phone towers
• It is often considered part of the EMI family and is sometimes even
referred to as EMI
• Filters can be installed on the network to eliminate the signal frequency
being broadcast by a radio tower, although this will usually not affect
standard wired Ethernet networks
Crosstalk
When the signal that is transmitted on one copper wire or pair of wires
creates an undesired effect on another wire or pair of wires

• When it comes to twisted-pair cabling, crosstalk is broken down into


two categories:
• Near end crosstalk (NEXT) occurs when there is measured interference between two pairs in a single cable,
measured on the cable end nearest the transmitter.
• Far end crosstalk (FEXT) occurs when there is similar interference, measured at the cable end farthest from the
transmitter.
Shielded Twisted-Pair (STP) Cables
• STP cables have an aluminum shield inside the plastic jacket that
surrounds the pairs of wires
Plenum-Rated
• Cables installed inside walls or above drop ceilings where they cannot
be accessed by sprinkler systems in the case of a fire should be plenum-
rated or low-smoke rated
• Plenum-rated cables have a Teflon coating that makes them more
impervious to fire
• They are used in these situations because standard twisted-pair cables
have a PVC jacket, which can emit deadly gas into the air
Fiber Optic Cable
transmits light (photons) instead of electricity over glass or plastic “fibers”

• Very good for high-speed, high-capacity data transmission due to lack


of attenuation
• Single-mode
• meant to carry a single ray of light—one ray of light, one mode
• This type of cable is normally used for higher-bandwidth, longer-distance runs, generally 10-80 km
• More expensive equipment

• Multi-mode
• Cable with a larger fiber core, capable of carrying multiple rays of light.
• This type of cable is used for shorter distance runs, up to 600 meters.
• Though much shorter than single mode fiber runs, this is still six times the distance of twisted-pair cable runs.
• Less expensive equipment
Fiber Optic Cables
Wireless Networks
• Enables connection to the network without using a wired connection
• Provide a degree of portability
• Extend connectivity to a pre-existing wireless network and could be
used to connect entire local area networks to the Internet
• Some wireless devices can be connected directly to each other in a
point-to-point fashion
Wireless Network Adapters
• Wireless network adapters enable connectivity between a desktop
computer or laptop and the wireless access point
• These network adapters come in a variety of shapes and sizes,
including USB, PC Card, and as an internal PCI or PCI Express adapter
card
Wireless Access Point
• A wireless access point (WAP) enables wireless devices to connect to a
wired network
• A wireless router can also acts as a router, firewall, and IP proxy
Wireless Modes
• There several different methods to connect to a wireless network
• Infrastructure – the mode used when wireless clients connect to and are authenticated by a wireless
access point
• Ad-hoc – used when all of the clients communicate directly with each other
Wireless LAN (WLAN)
• Wireless LAN or WLAN is a network composed of at least one WAP
and a computer or handheld device that connect to the WAP
• Usually these networks are Ethernet based, but they can be built on
other networking architectures
• In order to ensure compatibility, the WAP and other wireless devices
must all use the same IEEE 802.11 WLAN standard
• Wireless Fidelity (WiFi ) is a trademark to brand products that belong
to the category of WLAN devices
Other wireless devices
• Wireless Repeater
• used to extend the coverage of a wireless network

• Wireless Bridge
• A wireless bridge is similar to a wireless repeater, but the bridge can connect different 802.11 standards together;
this is known as bridge mode.
WLAN Standards
IEEE 802.11 Standard Data Transfer Rate Frequency
(Max.)

802.11a 54 Mbps 5Ghz


802.11b 11 Mbps 2.4Ghz
802.11g 54 Mbps 2.4Ghz
802.11n 600 Mbps 2.4Ghz and 5Ghz
802.11ac 866.7 Mbps 5Ghz
Wireless Encryption Options
Wireless Encryption Description Encryption Level (Key Size)
Protocol

WEP Wired Equivalent Privacy 64-bit


WPA & WPA2 Wi-Fi Protected Access 256-bit
TKIP Temporal Key Integrity Protocol 128-bit

AES Advanced Encryption Standard 128-, 192- and 256-bit


Service Set Identifier (SSI)
• When utilizing infrastructure mode, the base unit (normally a WAP) will
be configured with a service set identifier (SSID)
• The SSID is the name of the wireless network, and it is broadcast over
the airwaves
• When clients want to connect to the WAP, they can identify it by the
SSID
• For security, the SSID can be hidden from public discovery
Wireless Settings
Summary
• To recognize wired networks and media types. This includes identifying
twisted-pair cable, cabling tools, and testers. You also learned what can
interfere with twisted-pair cabling and how to avoid it, and about a slew of
wiring standards you should know for the real world. You also learned some
of the basics about fiber optic cabling and some of the standards attached to
these extremely quick cables.
• To comprehend wireless networks. This included wireless devices, wireless
settings and configurations, wireless standards, and encryption protocols.
Additional Resources & Next Steps
Instructor-Led Courses
• 40033A: Windows Operating System and Windows
Server Fundamentals: Training 2-Pack for MTA
Exams 98-349 and 98-365 (5 Days)
• 40349A: Windows Operating System Fundamentals:
MTA Exam 98-349 (3 Days)
• 40032A: Networking and Security Fundamentals:
Training 2-Pack for MTA Exams 98-366 and 98-367
(5 Days)
• 40366A: Networking Fundamentals: MTA Exam 98-
Books 366
• Exam 98-366: MTA
Exams &
Networking Certifications
Fundamentals (Microsoft • Exam 98-366:
Official Academic Networking
Course) Fundamentals
Understanding Internet Protocol

Module 4
Objectives

Skills/Concepts Objective Domain Objective Domain


Description Number
Working with IPv4 Understand IPv4 3.2

Working with IPv6 Understand IPv6 3.3


IPv4
• Internet Protocol version 4 (IPv4) is the fourth version of the Internet
Protocol and the first version to be widely deployed
• IPv4 is a frequently used communications protocol and is one of the
core protocols for the Internet
• IP resides on the network layer of the OSI model
IP Addresses
• IP addresses consist of four octets (8-bits), each between 0 and 255.
• Examples include:
• 12.5.24.2
• 127.0.0.1
• 192.168.3.54
• 208.32.56.232

• In order for an IP address to function, there must be a properly


configured IP address and compatible subnet mask
• To connect to the Internet (or any remote network), you will also need
a gateway address and – optionally – a DNS server address
Classful Network Architecture
• The IPv4 classification system is known as a classful network
architecture broken down into five sections: Classes A, B, and C are
commonly used
• An Class A IP address, the first octet is the “network” portion
Class IP Range Default Subnet Network ID / Host ID Networks Usable
(1st Octet) Mask Possible Addresses
A 0 – 127 255.0.0.0 Net.Host.Host.Host 2^7 = 128 2^24 – 2 =
16,777,214
B 128 - 191 255.255.0.0 Net.Net.Host.Host 2^14 = 16,384 2^16 – 2 =
65,534
C 192 – 223 255.255.255.0 Net.Net.Net.Host 2^21 = 2^9 -2 = 254
2,097,151
D 224 - 239 N/A N/A N/A N/A
E 240 - 255 N/A N/A N/A N/A
Loopback Testing
• The range for Class A is 0–127
• The 127 network number isn’t used by hosts as a logical IP address
Instead, this network is used for loopback IP addresses, allowing for
testing
Usable Addresses
• Usable addresses are always going to be two less than the
mathematical amount.
• The first and last addresses cannot be used
• For network 172.24.3.X
• The 0 (in binary) for the host address is the entire network
• 172.24.3.0
• The 1s (in binary) for the host address is the broadcast address
• 172.24.3.255

• Class D and Class E are not used by regular hosts


• Class D is used for what is known as multicasting—transmitting data to multiple computers (or routers)
• Class E was reserved for future use, but this has given way to IPv6 instead
Decimal-to-Binary Conversion
DEMO: Using Calculator to convert base numbering
systems
IP Conflict
• IP conflicts occur when two devices have been assigned the same IP
address
• Windows Error:
There is an IP address conflict with another system on the network
• If there is an IP address conflict, the devices will have problems sending
and receiving data
Public and Private Addresses
• IPv4 addresses are further classified as either public or private. Public
IP addresses are ones that are exposed to the Internet
• Devices connected to the Internet can potentially communicate with them

• Private IP addresses are hidden from the Internet and any other
networks
• Usually behind an IP proxy or firewall device

• Private Address
Class Start of Range End of Range
A 10.0.0.0 10.255.255.255

B 172.16.0.0 172.31.255.255
C 192.168.0.0 192.168.255.255
Static and Dynamic Addresses
• Static IP address are addresses that are manually assigned to a host
• Dynamic IP addresses are more common than static IP addresses,
whereas they automatically obtain an IP address (and other IP
information)
APIPA
• APIPA is an acronym for Automatic Private IP Addressing
• It uses a single Class B network number: 169.254.0.0
• If a Windows client cannot get an IP address from a DHCP server and
has not been configured statically, it will auto-assign a number on this
network
Default Gateway and DNS Server
• For a device to communicate on the Internet, a default gateway and
DNS server must be assigned
• Default gateway – Provides a default route for TCP/IP hosts to use when
communicating with hosts on remote networks
The first IP address of the device that a client computer will look for
when attempting to gain access outside the local network
• DNS Server – The server that provides name resolution of domain
names to IP addresses
DEMO: IP Address Properties, Default Gateway and
DNS Server
Network Address Translation
• Network address translation (NAT) provides a method for translating IPv4
addresses of devices on one network into IPv4 addresses of devices on a
different network
• NAT was developed to provide a temporary solution to the IPv4 address
issue
• Enables one address space (private) to be re-mapped to another address
space, or perhaps re-mapped to a single public IP address
Network Address Translation
Network Address Translation (NAT) is the process of
modifying IP address information in IPv4 headers
while in transit across a traffic routing device
192.168.0.10

192.168.0.11

192.168.0.255 56.72.210.7
Network Address Translation
Subnetting
• Subnetting is the subdivision of your logical IP network
• By default, all computers are on one subnet or network with no divisions
involved.
• My modifying the default subnet mask, you can subnet your network into
multiple smaller networks.

Type Decimal Binary


Class A 255.0.0.0 11111111.00000000.00000000.00000000

Class B 255.255.0.0 11111111.11111111.00000000.00000000


Class C 255.255.255.0 11111111.11111111.11111111.00000000
Subnet IDs
Subnets
IPv6
• IPv6 is the new generation of IP addressing for the Internet
• IPv6 solves many of the limitations of IPv4, including address space and
security
• IPv6 addresses are represented as 8 groups of 4 hexadecimal digits
• IPv6 is not backward compatible with IPv4
• IPv6 is a 128-bit system while IPv4 is only a 32-bit system
• IPv4 allows approximately 4.3 billion IP addresses
• IPv6 allows 3.4 X 10^38 (340 undecillion) addresses
IPv6 Addresses Types
• Unicast address: Packet is delivered to a single network interface
There are two types of unicast addresses:
• Global unicast addresses are routable and displayed directly to the Internet
• Link local address are automatically configured addresses to communicate with devices on the same link (subnet)

• Anycast address: Identifies multiple interfaces, but the packet is delivered


to the nearest of the network interfaces (routing distance)
• Multicast address: Packet is delivered to multiple network interfaces
IPv6 Address Components
• IPv6 addresses are broken down into three parts:
• Site prefix: The first three groups of numbers that define the “network”
• Subnet ID: Defines the individual subnet of the network that the address is
located on
• Interface ID: The individual host IP portion
• IPv6 Address: 2001:4860:0000:2001:0000:0000:0000:0068

Site Prefix Subnet ID Interface ID


2001.4860.0000 2001 0000:0000:0000:0068
48 bits 16 bits 64 bits
DEMO: IPv6
Dual IP Stack
• A dual IP stack exists when there are two Internet Protocol software
implementations in an operating system, one for IPv4 and another for
IPv6
• Dual stack IP hosts can run IPv4 and IPv6 independently, or they can
use a hybrid implementation, which is the most commonly used
method for modern operating systems
IPv4-Mapped Addresses
• IPv4-mapped addresses have the first 80 bits set to 0 (note the double
colon), the next 16 set to 1 (shown as ffff), and the last 32 bits
populated by the IPv4 address
• These addresses look like IPv6 addresses, other than the last 32 bits,
which are written in the customary dot-decimal notation.
• IPv4-mapped IPv6 address for address 10.254.254.1 is
::ffff:10.254.254.1
IPv4 to IPv6 Tunneling
• IPv6 packets can be encapsulated inside IPv4 datagrams.
• In Microsoft operating systems, this is generally done with the Teredo
adapter, which is a virtual adapter or “pseudo-interface,” not a physical
network adapter. An example of one of these addresses would be:
Fe80::5efe:10.0.0.2%2
Summary
• Be able to categorize IPv4 addresses using classifications such as Class A,
B, and C
• You have learned the default gateway and DNS server are and how to
configure them within a network adapter’s TCP/IP properties dialog box.
• Be able to define advanced TCP/IP concepts, such as NAT and subnetting,
and how to create network subnets.
• You have learned the basics of IPv6 and how to configure IPv6 by using
the command line
• You have learned how to define IPv6 dual stack and tunneling
technologies
Additional Resources & Next Steps
Instructor-Led Courses
• 40033A: Windows Operating System and Windows
Server Fundamentals: Training 2-Pack for MTA
Exams 98-349 and 98-365 (5 Days)
• 40349A: Windows Operating System Fundamentals:
MTA Exam 98-349 (3 Days)
• 40032A: Networking and Security Fundamentals:
Training 2-Pack for MTA Exams 98-366 and 98-367
(5 Days)
• 40366A: Networking Fundamentals: MTA Exam 98-
Books 366
• Exam 98-366: MTA
Exams &
Networking Certifications
Fundamentals (Microsoft • Exam 98-366:
Official Academic Networking
Course) Fundamentals
TCP/IP Tools

Lesson 5
Objectives
Skills/Concepts Objective Domain Objective Domain
Description Number
Using basic TCP/IP Understanding TCP/IP 3.6
commands
Working with advanced Understanding TCP/IP 3.6
TCP/IP commands
Common TCP/IP Tools (with Demos)

• command prompt
• ipconfig
• ping
• Tracert
Command Prompt
• The Windows command prompt is Microsoft’s version of a command-line
interface or CLI
• Running the command prompt as an Administrator is also known as
running it in elevated mode
• Tools can be run using the command prompt
ipconfig
• Displays the current configuration of the installed IP stack on a
networked computer using TCP/IP
• The /all switch can be used to view additional details about each
adapter
• Can be used to refresh Dynamic Host Configuration Protocol (DHCP)
and Domain Name System (DNS) settings
ping
• Verifies IP-level connectivity to another TCP/IP device by sending
Internet Control Message Protocol (ICMP) Echo Request messages
• A number of switches can accommodate different testing scenarios
• Can be used to test IPv4 and IPv6 connectivity

Hey, are you awake?

Why yes, yes I am...


tracert
• Determines the path taken to a destination by sending Internet Control
Message Protocol (ICMP) Echo Request messages to the destination
with incrementally increasing Time to Live (TTL) field values
• Used to “trace” a network path from sending to receiving device
• Useful if the local device is testing ok but connectivity can’t be
established
Hey, how do I get
there? Then you’re here!

First you go Second you go


through me... through me...
Advanced TCP/IP Tools (with Demos)

• Netstat • Netsh
• NbtStat • Route (-print)
• PathPing • Net
• Nslookup • Telnet
Netstat
• Displays active TCP connections, ports on which the computer is
listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP,
ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6,
TCP over IPv6, and UDP over IPv6 protocols)
• Used without parameters, netstat displays active TCP connections
NbtStat
• Displays NetBIOS over TCP/IP (NetBT) protocol statistics for local and
remote computers, NetBIOS name tables for both the local computer
and remote computers, and the NetBIOS name cache
• NetBIOS was developed in the 1980s to allow applications to
communicate over a network using the session layer of the OSI model
• NetBIOS establishes logical names on the network, establishes sessions
between two logical names on the network, and supports reliable data
transfer between computers that have established a session
• NetBIOS over TCP/IP sends the NetBIOS protocol within TCP and UDP
sessions
PathPing
• A command-line route tracing tool that combines features of the tools
Ping and TraceRt that includes additional information
• PathPing sends packets to each router on the way to a final destination
over a period of time, and then computes results based on the packets
returned from each hop
• PathPing can show the degree of packet loss at any specified router or
link enabling you to pinpoint links that might be causing network
problems
Nslookup
• Displays information that you can use to diagnose Domain Name
System (DNS)
• The Nslookup command-line tool is available only if you have
installed the TCP/IP protocol
• You should be familiar with DNS before using this tool
Netsh
• A command-line scripting utility that enables you to display or
modify the network configuration of a computer currently
running
• Command works on local or remote computers
• Provides a scripting feature that allows you to run a group of
commands in batch mode against a specified computer
• Enables you to save a configuration script in a text file for
archival purposes or to help you configure other servers
Route
• Displays and modifies the entries in the local IP routing table
• The Route Print command can be used to display routing table for a
Windows machine
This command gives the same result as netstat –r, but it is more commonly used

• The Route command can also be used to add and delete static routes
Net
• Many services use networking commands that begin with the
word net
• Although not specifically part of the TCP/IP command set, the net
command can display various important networking data, and it
enables you to configure various networking options such as services
Telnet
• The telnet commands enables you to communicate with a remote
computer that is using the Telnet protocol
• You can run telnet without parameters in order to enter the telnet context,
indicated by the Telnet prompt (telnet>)
• From the Telnet prompt, use the following commands to manage a
computer running Telnet Client
• A network administrator can connect to a remote computer, server, router,
or switch by typing telnet [IPAddress].
• Telnet is an older, out-of-date protocol, and as such, it should be replaced
with a more secure program such as SSH.
• It can also be used for troubleshooting by adding a port number
• telnet server01 25
Summary
• You have learned basic TCP/IP commands and their functionality.
• You have learned how to use advanced TCP/IP commands.
Additional Resources & Next Steps
Instructor-Led Courses
• 40033A: Windows Operating System and Windows
Server Fundamentals: Training 2-Pack for MTA
Exams 98-349 and 98-365 (5 Days)
• 40349A: Windows Operating System Fundamentals:
MTA Exam 98-349 (3 Days)
• 40032A: Networking and Security Fundamentals:
Training 2-Pack for MTA Exams 98-366 and 98-367
(5 Days)
• 40366A: Networking Fundamentals: MTA Exam 98-
Books 366
• Exam 98-366: MTA
Exams &
Networking Certifications
Fundamentals (Microsoft • Exam 98-366:
Official Academic Networking
Course) Fundamentals
Network Services

Lesson 6
Objectives
Skills/Concepts Objective Domain Objective Domain
Description Number
Setting up common Understanding network 3.5
networking services services
Defining more network Understanding network 3.5
services services
Defining Name Understand Name 3.4
Resolution Techniques Resolution
DHCP
• Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that
enables configured client computers to obtain IP addresses automatically
• The IP information obtained might include the following:
• IP addresses
• Subnet masks
• Gateway addresses
• DNS server addresses
• Other advanced options
• The DHCP Server service provides the following benefits:
• Reliable IP address configuration
• Reduced network administration
DHCP Server

• Before a DHCP server can start leasing IP addresses to client computers, the
following steps must be performed:
1. Install the DHCP service
2. Configure an IP scope
3. Activate the scope
4. Authorize the server
5. Configure advanced IP options (optional)
DEMO: Install and view the DHCP Service (and console)
DORA
• DHCP sessions use a four-step process known as DORA.
• Discovery: The client sends a broadcast to the network to find a DHCP server
• Offer: The DHCP server sends a unicast “offering” of an IP address to the client
• Request: The client broadcasts to all servers that it has accepted the offer
• Acknowledge: The DHCP server sends a final unicast to the client that includes the
IP information the client will use
• DHCP utilizes ports 67 and 68
Hey, are there any DHCP
Servers here? (DHCPDiscover)
Yes, I am a DHCP Server, and here is
an IP Address for you (DHCPOffer)

Thanks, I like that IP and I will


take it (DHCPRequest)
Ok, it’s yours. Pleasure doing
business with you (DHCPAck)
DEMO: Add a DHCP Scope
APIPA
• Automatic Private IP Addressing (APIPA) is a service for assigning
unique IP addresses on small office/home office (SOHO) networks
without deploying the DHCP service
• APIPA can get in the way of a client obtaining an IP address properly
(e.g., when a client attempts to obtain an IP address from a DHCP
server, but the DHCP server is too busy)
Disable APIPA
• APIPA is disabled using Registry Editor

1. Open Registry Editor


2. In Registry Editor, navigate to the
following registry key:
KEY_LOCAL_MACHINE\SYSTEM\CurrentCo
ntrolSet\Services\Tcpip\Parameters
3. Create the following entry:
IPAutoconfigurationEnabled: REG_DWORD
4. Assign a value of 0 to disable Automatic
Private IP Addressing (APIPA) support.
5. Close Registry Editor.
DEMO: Disable APIPA
Remote Desktop Services
• Remote Desktop Services, formerly known as Terminal Services, is a type
of thin-client terminal server computing.
• RDS enables virtual desktop infrastructure (VDI), session-based desktops,
and applications, allowing users to work anywhere
• Thin-client computers and PCs can connect to servers running Remote
Desktop Services
Remote Desktop Services
Remote Desktop Connection (DEMO)

Computer Name Computer Name


Routing and Remote Access Service
• Routing and Remote Access Service (RRAS) supports remote user or site-
to-site connectivity by using virtual private network (VPN) or dial-up
connections.
• RRAS consists of the following components:
• Remote Access. By using RRAS, you can deploy VPN connections to provide end users with remote access
to your organization's network. You can also create a site-to-site VPN connection between two servers at
different locations.
• Routing. RRAS is a software router and an open platform for routing and networking. It offers routing
services to businesses in local area network (LAN) and wide area network (WAN) environments or over the
Internet by using secure VPN connections. Routing is used for multiprotocol LAN-to-LAN, LAN-to-WAN,
VPN, and network address translation (NAT) routing services.
• Microsoft RRAS was formerly known as Remote Access Service (RAS)
Routing and Remote Access Service

Internet/ISP
DEMO: Install and view Routing and Remote Access
Internet Protocol Security (IPSec)
• Protocol within the TCP/IP suite that encrypts and authenticates IP packets
• Ensures private, secure communications over Internet Protocol (IP)
networks, through the use of cryptographic security services
• Designed to secure any application traffic because it resides on the
network layer (or Internet layer for the TCP/IP reference model)
• Used in conjunction with virtual private networks and is an integral part of
IPv6
• IPsec has been defined to work in two different modes:
• Tunnel mode is most often used for site-to-site VPN connections
• Transport mode is most often used for securing IP traffic on private networks
IPSec Protocol Types
Protocol Requirement Usage
Authentication The data and the header need to Use for data integrity in situations where data is not
Header (AH) be protected from modification secret but must be authenticated — for example, where
and authenticated, but remain access is enforced by IPSec to trusted computers only, or
readable. where network intrusion detection, QoS, or firewall
filtering requires traffic inspection.

Encapsulating Only the data needs to be Use when data must be kept secret, such as file sharing,
Security Payload protected by encryption so it is database traffic, RADIUS protocol data, or internal Web
(ESP) unreadable, but the IP addressing applications that have not been adequately secured by
can be left unprotected SSL.

Both AH and The header and data, respectively, Use for the highest security. However, there are very few
ESP need to be protected while data is circumstances in which the packet must be so strongly
encrypted. protected. When possible, use ESP alone instead.
DNS
• Domain Name System (DNS) is a worldwide service that resolves host
names to IP addresses
• DNS architecture is a hierarchical distributed database and an
associated set of protocols that define:
• A mechanism for querying and updating the database
• A mechanism for replicating the information in the database among servers
• A schema of the database

• DNS is part of the application layer of the TCP/IP reference model


• DNS servers use inbound port 53 to accept name resolution requests
WINS
• Windows Internet Name Service (WINS) is a service that resolves
NetBIOS names to IP addresses
• WINS is required for any environment in which users access resources
that have NetBIOS names
• It is Microsoft’s version of the NetBIOS Name Service (NBNS)
combined with a name server
• If you do not use WINS in such a network, you cannot connect to a
remote network resource by using its NetBIOS name unless you use
Lmhosts files, and you might be unable to establish file and print
sharing connections
• WINS and DNS are both name resolution services for TCP/IP
networks
Summary
• Be able to install and configure DHCP to hand out IP addresses to
client computers.
• You have learned the four-step DHCP process known as DORA.
• Be able to install and configure Remote Desktop Services so that client
computers can connect remotely to a server.
• Understand how to install and configure Routing and Remote Access
Service (RRAS) as a LAN router.
• You have learned how to define IPsec and the various protocols that
can be used.
• Understand how DNS and WINS function, how the services are
installed and configured and when WINS is needed on your network.
Additional Resources & Next Steps

Instructor-Led Courses
• 40033A: Windows Operating System and Windows
Server Fundamentals: Training 2-Pack for MTA
Exams 98-349 and 98-365 (5 Days)
• 40349A: Windows Operating System Fundamentals:
MTA Exam 98-349 (3 Days)
• 40032A: Networking and Security Fundamentals:
Training 2-Pack for MTA Exams 98-366 and 98-367
(5 Days)
• 40366A: Networking Fundamentals: MTA Exam 98-
Books 366
• Exam 98-366: MTA
Exams &
Networking Remote Desktop Poster Certifications
Fundamentals (Microsoft • http://www.microsoft.com/en- • Exam 98-366:
Official Academic us/download/confirmation.aspx?id=32 Networking
Course) 62 Fundamentals
Understanding Wide Area Networks

Lesson 7
Objectives
Skills/Concepts Objective Domain Objective Domain
Description Number
Understanding routing Understanding routers 2.2
Defining common WAN Understanding wide area 1.3
technologies and networks (wan’s)
connections
Routing
• Routing is the process of managing the flow of data between network
segments and between hosts or routers
• Data is sent along a path according to the IP networks and individual
IP addresses of the hosts
• A router is a network device that maintains tables of information about
other routers on the network or internetwork
Static and Dynamic Routing
• A static route is a path that is manually configured and remains
constant throughout the router’s operation
• A dynamic route is a path that is generated dynamically by using
special routing protocols

Static Dynamic
Dynamic Routing
• Dynamic routing method has two conceptual parts:
• Routing protocol used to convey information about the network environment
• Routing Algorithm that determines paths through the network

• Common Dynamic routing protocols:


• Distance vector routing protocols: Advertise the number of hops to a network destination (distance)
and the direction a packet can reach a network destination (vector). Sends updates at regularly
scheduled intervals, and can take time for route changes to be updated
• Link state routing protocols: Provide updates only when a network link changes state

• Distance Vector Routing


• Routing Information Protocol (RIP)

• Link State Routing


• Open Shortest Path First (OSPF)
Interior Gateway Protocols (IGPs)
• Routing protocols that enable elements that comprise an autonomous
system (AS) to exchange routing information
• For very large networks it is necessary to divide the internetwork into
entities known as autonomous systems (AS)
• IGPs exchange routing information within a single AS that operates
common routing protocols
• RIP and OSPF are examples of IGPs
AS
RIP RIP
AS OSPF OSPF
Routing Information Protocol (RIP and RIPv2)
• Distance vector routing protocol that enables the exchange of IP
routing information
• Calculates the direction or interface that packets should be forwarded
to, as well as the distance from the destination
• Each router maintains a database of the number of hops to a network
destination (distance) and the direction a packet can reach a network
destination (vector)
• RIP is easy to implement and has a large installed base
• Updates are sent periodically
Open Shortest Path First (OSPF)
• A link-state protocol that monitors the network for routers that have a
change in their link state
• Each router maintains a database of router advertisements called Link
State Advertisements (LSAs)
• An LSA consist of a router, attached networks and their configured
costs
• Updates are sent when the status of a route is updated
Exterior Gateway Protocols (EGPs)
• A routing protocol that was designed and intended for use between
autonomous systems
• Border Gateway Protocol (BGP) is an EGP that enables autonomous
systems (AS) to exchange routing information
• BGP is used to enable routing on the Internet

AS
BGP

AS
RIP RIP
OSPF OSPF
DEMO: Configuring RRAS Server (verify RIP)
Wide Area Network
• Wide area networks (WANs) connect multiple local area networks
together
• WANs connect multiple LANs that can include a home, school, or
buildings
• WANs enable network to function without concern to a location
• WAN technologies can include:
• Packet Switching: Devices transport packets via shared links
• Leased Line: Dedicated point to point connection
• Circuit Switching: Dedicated circuit path is created between end points (dial up)
• Cell Relay: Similar to packet switching but uses fixed packet lengths
Packet Switching
• WANs utilize some type of packet switching technology
• Packet switching services include X.25 and Frame Relay
• Before packet switching, technology such as direct dial-up connections
was used
X.25
• X.25 communications protocol was one of the first implementations of
packet switching
• Data Terminal Equipment (DTEs) or a network device, connect to Data
Communications Equipment (DCEs), a modem is a DCE enabling
communication to the X.25 network
• Dummy terminals can connect to the network using Packet
Assembler/Disassembler (PADs) which connect to the DCE

Modem (DCE) X.25 Network


DTE
Virtual Circuits
• Telecommunication companies have thousands of shared circuits /
connections from which to select a path
• These are known as a circuit set
• The chances of the entire message of packets taking one circuit are slim
• Multiple circuits are being used, and not just one, the entire circuit set is
known as the virtual circuit
• This method of data transmission is the core technology for the Internet
and most LANs
Hops
• There could be several PSE stops along the way
• These PSEs disassemble and reassemble the packets
• These stops are also known as hops
• At the receiving office, the packet is reassembled and the overhead
(header and trailer) is discarded
X.25 Advantages
• If data fails, X.25 automatically recovers and sends it again
• X.25 allows shared access among multiple users on the LAN
• X.25 has full error and flow control
• There is also protection from intermediate link failure
• X.25 is not completely fault tolerant, but it is 70% effective

• Pricing is per shared packet sent, not per minute


• X.25 is a synchronous, digital transmission. There is less overhead per
file
Frame Relay
• Frame Relay is the advancement of X.25 packet switching
• A standardized wide are network protocol using a form of packet
switching designed for faster connections
• It also uses a virtual circuit, but one that is more advanced. Frame
Relay created the “virtual network” that resides in the cloud
Permanent Virtual Circuits
• A permanent virtual circuit is a virtual circuit established for repeated
use
• Frame Relay enables multiple sessions to be run simultaneously on the
same link
• These connections to the cloud are known as permanent logical links
or permanent virtual circuits (PVCs)
• The PVC links the sites together in the cloud, and this is accomplished
by using the PSE (packet switching exchange)
Leased Lines
• Leased lines are a connection contract between a provider and a
customer
• Frame Relay service must be purchased from an Internet services or
telecommunications provider
• With Frame Relay, you must commit to a certain amount of information
over time
• This is the CIR (committed information rate). The CIR is assigned to each PVC that services the
organization’s account
• Because this transmission is full duplex, there can be two CIRs for each PVC
T-Carrier Overview
• A T-carrier or telecommunications carrier system is a cabling and
interface system designed to carry data at high speeds
• The basic data transfer rate of the T-carrier system is 64 Kbps, which is
known as DS0, which is the digital signaling scheme
• DS1 is the digital signaling scheme for the T1-carrier
T-Carrier Systems Comparison
• Countries and their associated T-carrier systems

T-Carrier North America Japan Europe


Level 0 – DS0 64 Kbps 64 Kbps 64 Kbps
Level 1 – DS1 1.544 Mbps (T1: 24 user 1.544 Mbps (J1: 24 1.544 Mbps (E1: 24 user
Channels) user Channels) Channels)

Level 3 – DS3 44.736 Mbps (T3: 672 32.064 Mbps (J3: 34.368 Mbps (E3: 512 user
user channels) 480 user channels) channels)
Level 4 – DS4 274.176 Mbps (T4: 4032 97.728 Mbps (J4: 139.264 Mbps (E4: 2048
user channels) 1440 user channels) user channels)
ISDN
A digital technology developed to offer faster communication speed than
an analog telephone line

• Integrated Services Digital Network (ISDN) is a set of communication


standards enabling simultaneous digital transmission of data, fax, voice
and video
• ISDN can be broken down into two major categories:
• Basic rate ISDN (BRI):
• 128 Kbps - two equal B channels at 64 Kbps each
• Generally, devices that connect to BRI lines can handle eight simultaneous connections to the
Internet.
• Primary rate ISDN (PRI):
• 1.536 Mbps - runs on a T-1 circuit
• 24 equal 64 Kbps B channels for data
ATM
• Asynchronous transfer mode (ATM) is a cell-based switching
technology as opposed to a packet switching technology
• ATM is a high-speed networking technology used to transmit data in
cells of a fixed length containing 53 bytes of information
• ATM is a native connection-oriented protocol comprised of a number
of related technologies for software, hardware and connection-
oriented matter
SONET
• Synchronous Optical Networking (SONET) is a standardized protocol
allowing for the transmissions of signals over optical fiber in North
America
• Synchronous Digital Hierarchy (SDH) is the standard in Europe
• The standard represents a transport vehicle capable of supporting data
rates in the gigabit range, optical interfaces, network management and
testing methods
• Before the standard was released, each manufacturer designed its fiber
terminal device to its own optical signal interface
SONET Signal Hierarchy

Level Line Rate DS3 Channels


OC-1 51.84 Mbps 1
OC-3 155.52 Mbps 3
OC-12 622.08 Mbps 12
OC-24 1.244 Gbps 18
OC-48 2.488 Gbps 48
OC-192 9.953 Gbps 192
FDDI
• Fiber distributed data interface (FDDI) is a standard for transmitting
data on fiber optic cables at a rate of around 100 Mbps
• Supports transmission distances beyond 50 miles
• The original FDDI standard called for a physical double ring topology
• FDDI is primarily a protocol used on backbone networks
DSL
• Digital subscriber line (DSL) is a family of technologies that provides data
transmissions over local telephone networks
• DSL allows for voice and data to be run over the same line
• DSL uses higher frequency bands to transmit data
• xDSL is the standard for the various digital subscriber lines
• ADSL (asymmetric digital subscriber lines) The upload and download speed are
the different or asymmetrical
• SDSL (symmetrical digital subscriber line) The upload and download speed are the
same or symmetrical
Broadband Cable
• Broadband cable is used for cable Internet and cable television using
the cable television network
• It operates at a higher speed than DSL and rates can range from 384
kbps to 20 Mbps +
POTS/PSTN
• POTS/PSTN stands for plain old telephone system/public switched
telephone network.
• This is what we use now for “regular” phone lines, and it has been
around since the 1940s.
• POTS/PSTN is now digital at the switching office and some central
offices, but there analog lines run to people’s homes.
Summary
• The differences between static and dynamic routing.
• How to install and configure RRAS to function as a network router and how to
install the Routing Information Protocol.
• How to define packet switching types, such as X.25 and Frame Relay.
• What T-carrier lines are, the different types of lines, and their Japanese and
European counterparts.
• The basics about various other wide area networking technologies, such as ATM,
SONET, FDDI, and so on.
• An introduction to different personal and small business Internet connectivity types.
Additional Resources & Next Steps

Instructor-Led Courses
• 40033A: Windows Operating System and Windows
Server Fundamentals: Training 2-Pack for MTA
Exams 98-349 and 98-365 (5 Days)
• 40349A: Windows Operating System Fundamentals:
MTA Exam 98-349 (3 Days)
• 40032A: Networking and Security Fundamentals:
Training 2-Pack for MTA Exams 98-366 and 98-367
(5 Days)
• 40366A: Networking Fundamentals: MTA Exam 98-
Books 366
• Exam 98-366: MTA
Exams &
Networking Certifications
Fundamentals (Microsoft • Exam 98-366:
Official Academic Networking
Course) Fundamentals
Defining Network Infrastructure and Security

Lesson 8
Objectives
Skills/Concepts Objective Domain Objective Domain
Description Number
Understanding networks Understanding the 1.1
outside the LAN concepts of the Internet,
Intranet and Extranet
Understanding Security Understanding the 1.1
Devices and Zones concepts of the Internet,
Intranet and Extranet
Internet
• The Internet is a worldwide system of connected computer networks
• Devices that connect to the Internet use the TCP/IP protocol suite
• The Internet contains a lot of information, resources and services:
• World Wide Web (WWW) servers hosting content
• Supporting infrastructure for email
• Connectivity for peer-to-peer networks

Internet
World Wide Web
• The World Wide Web (WWW) is an enormous system of interlinked
hypertext documents that can be accessed by using a web browser
• Interlinked hypertext documents can contain text, graphics and videos
• Currently, the World Wide Web is in a stage known as Web 2.0
• Web 2.0 is an interactive type of web experience compared to the
previous version 1.0
Intranet
• An intranet is a private computer network or single Web site that an
organization implements in order to share data with employees
around the world
• User authentication is necessary before a person can access the
information in an intranet
• Ideally, this keeps the general public out, as long as the intranet is properly secured
Extranet
• An extranet is similar to an intranet except that it is extended to users
outside a company, and possibly to entire organizations that are
separate from or lateral to the company
• User authentication is still necessary, and an extranet is not open to the
general public
Public
Accessing Company Data
Remote Users
Partner

• A company can present information


to different groups:
• Intranet – For internal employees
• Extranet – For partners
• Web Server – For the public
VPN
• A virtual private network (VPN) is a connection between two or more
computers or devices that are not on the same private network
• In order to ensure that only the proper users and data sessions cross
to a VPN device, data encapsulation and encryption are used
• A “tunnel’ is created, through the LANs and WANs that are being used

Internet/ISP
Popular VPN Protocols
• Point-to-Point Tunneling Protocol (PPTP): Encapsulates Point-to-Point
(PPP) frames into IP datagrams for transmission over an IP-based
network (data isn’t encrypted by default)
• Layer Two Tunneling Protocol with Internet Protocol Security
(L2TP/IPSec) is a combination of PPTP and Layer 2 Forwarding (L2F) a
technology from Cisco Systems, Inc, IPSec is used to encrypt the
message
Point-to-Point Tunneling Protocol
• PPTP allows multiprotocol traffic to be encrypted and then encapsulated
in an IP header to be sent across an IP network or a public IP network
• PPTP can be used for remote access and site-to-site VPN connections
• PPTP encapsulates PPP frames in IP datagrams for transmission
• PPTP uses a TCP connection for tunnel management and a modified
version of Generic Routing Encapsulation (GRE) to encapsulate PPP frames
• The payload of the encapsulated PPP frame can be encrypted,
compressed or both
Encrypted
IP Header GRE Header PPP PPP Payload (IP Datagram)
Header

PPP Frame
L2TP with IPSec
• L2TP allows multiprotocol traffic to be encrypted and then sent over any
medium that supports point-to-point datagram delivery
• L2TP relies on IPSec in Transport Mode for encryption services
• Encapsulation for L2TP/IPSec packets consists of two layers:
• L2TP Encapsulation: PPP frame is wrapped with an L2TP and UDP header
• IPSec Encapsulation: The L2TP message is wrapped with an IPSec Encapsulating Security Payload (ESP) header and
trailer, and an IPSec Authentication Trailer

IP UDP L2TP PPP PPP Payload (IP Datagram)


Header Header Header Header

Encrypted by IPSec
IP IPSec UDP L2TP PPP PPP Payload (IP Datagram) IPSec IPSec
Header ESP Header Heade Header ESP Auth
Header r Trailer Trailer
DEMO: Custom RRAS Configuration and show a VPN
connection
Firewalls
• Firewalls are used to help protect a network from malicious attack and
unwanted intrusion
• They are the most commonly used type of security device in an
organization’s perimeter
Security Devices and Zones
• Security devices such as firewalls are the Public
Remote Users
main defense for a company’s networks, Partner
whether they are LANs, WANs, intranets,
or extranets
• Perimeter networks help keep certain
information open to specific users or to
the public while keeping the rest of an
organization’s data secret
Packet Filtering
• Packet filtering inspects each packet that passes through the firewall
and accepts or rejects it based on a set of rules
• Stateless packet inspection does not retain memory of packets that have passed through the firewall
• Stateful packet inspection (SPI) maintain context about active sessions
NAT Filtering
• NAT filtering, also known as NAT endpoint filtering, filters traffic
according to ports (TCP or UDP)
• This can be done in three ways:
• Using basic endpoint connections
• Matching incoming traffic to the corresponding outbound IP address
connection
• Matching incoming traffic to the corresponding IP address and port
Application-Level Gateway
• Application-level gateway (ALG) supports address and port translation
and checks whether the type of application traffic is allowed
• It adds a layer of security; however, it is resource intensive
Circuit-Level Gateway
• Circuit-level gateway works at the session layer of the OSI model when
a TCP or UDP connection is established.
• Circuit-level filtering inspects sessions rather than connections or
packets
• Once the connection has been made, packets can flow between the
hosts without further checking
• Circuit-level gateways hide information about the private network, but
they do not filter individual packets
Proxy Server
• A proxy server acts as an intermediary between a LAN and the
Internet
• By definition, proxy means “go-between,” acting as such a mediator
between a private and a public network
• The proxy server evaluates requests from clients, and if they meet
certain criteria, forwards them to the appropriate server
Caching Proxy
• Caching proxy attempts to serve client requests without actually
contacting the remote server
• Although there are FTP and SMTP proxies among others, the most
common caching proxy is the HTTP proxy, also known as a web proxy,
which caches web pages from servers on the Internet for a set amount of
time
• This is done to save bandwidth on the company’s Internet connection and
to increase the speed at which client requests are carried out
IP Proxy
• IP proxy secures a network by keeping machines behind it anonymous
• It does this through the use of NAT
Internet Content Filter
• An Internet content filter, or simply a content filter, is usually applied as
software at the application layer and it can filter out various types of
Internet activities, such as access to certain Web sites, email, instant
messaging, and so on.
Network Intrusion Detection and Prevention
• A network intrusion detection system (NIDS) is a type of IDS that attempts to
detect malicious network activities (e.g., port scans and DoS attacks) by
constantly monitoring network traffic
• The NIDS will then report any issues that it finds to a network administrator as
long as it is configured properly
• A network intrusion prevention system (NIPS) is designed to inspect traffic,
and, based on its configuration or security policy, it can remove, detain, or
redirect malicious traffic in addition to simply detecting it
Perimeter Network
• A perimeter network is a small network that is set up separately from a company’s
private local area network and the Internet
• It is called a perimeter network because it is usually on the edge of a LAN, but DMZ
is an industry standard term
• A perimeter network allows users outside a company LAN to access specific
services located on the DMZ
• When the perimeter network is set up properly, those users are blocked from
gaining access to the company LAN
• The perimeter network might house a switch with servers connected to it that offer
web, email, and other services
Perimeter Network Configurations
• Back-to-back configuration: This configuration has the perimeter
network situated between two firewall devices, which could be black
box appliances or Microsoft Internet Security and Acceleration (ISA)
Servers
• 3-leg perimeter configuration: In this scenario, the perimeter network is
usually attached to a separate connection of the company firewall.
Therefore, the firewall has three connections—one to the company
LAN, one to the perimeter network, and one to the Internet
Summary
• How to differentiate between the Internet, intranets, and extranets.
• You have learned about firewalls and how to initiate port scans on them to
see whether they are locked down.
• Understand other perimeter devices and zones, such as proxy servers,
internet content filters, NIDS, NIPS, and a perimeter network.
Additional Resources & Next Steps
Instructor-Led Courses
• 40033A: Windows Operating System and Windows
Server Fundamentals: Training 2-Pack for MTA
Exams 98-349 and 98-365 (5 Days)
• 40349A: Windows Operating System Fundamentals:
MTA Exam 98-349 (3 Days)
• 40032A: Networking and Security Fundamentals:
Training 2-Pack for MTA Exams 98-366 and 98-367
(5 Days)
• 40366A: Networking Fundamentals: MTA Exam 98-
Books 366
• Exam 98-366: MTA
Exams &
Networking Remote Desktop Poster Certifications
Fundamentals (Microsoft • http://www.microsoft.com/en- • Exam 98-366:
Official Academic us/download/confirmation.aspx?id=32 Networking
Course) 62 Fundamentals

You might also like