You are on page 1of 24

Ethernet specifications

Max
Designation Cable Type Speed Connector Topology Standard
Length
IEEE
10BASE-T Cat3 UTP 100 m 10 Mbps RJ45 star
802.3i
IEEE
10BASE-FL MMF 2000 m 10 Mbps ST star
802.3j
100BASE- Cat5 UTP, IEEE
100 m 100 Mbps RJ45 star
TX Cat5e FTP 802.3u
412 m 100 Mbps
(half (half
100BASE- duplex) duplex) star, point- IEEE
Micro MMF SC
FX 2000 m 200 Mbps point 802.3u
(full (full
duplex) duplex)
Cat5e / Cat6
1000BASE- IEEE
UTP (4 100 m 1 Gbps RJ45 star
T 802.3ab
pairs)
1000BASE- star, point- IEEE
Twinax STP 25 m 1 Gbps HSSDC
CX point 802.3z
550 m
1000BASE- (50u) IEEE
Micro MMF 1 Gbps SC point-point
SX 275 m 802.3z
(62.5u)
550 m
1000BASE- SMF or (MMF) IEEE
1 Gbps SC, LC point-point
LX MMF 5000 m 802.3z
(SMF)
10 GBASE- 850nm serial IEEE
MMF 300 m 10 Gbps point-point
SR LAN 802.3ae
10 GBASE- 1310nm IEEE
MMF 10,000 m 10 Gbps point-point
LR serial LAN 802.3ae
10 GBASE- 1550nm IEEE
MMF 40,000 m 10 Gbps point-point
ER serial LAN 802.3ae
Network topologies

Topology Description Advantage Disadvantage


All nodes connect to a If hub fails, network down;
Star Inexpensive & easy
single central device maximum nodes = 1024
All nodes connect to a If backbone fails, network down;
Bus Simple & less cables
common backbone both ends must be terminated
Expensive; difficult to
Each node is connected No collisions; less
Ring troubleshoot; proprietary
to two other device signal degeneration
hardware
Each node connects to Redundancy & fault Expensive; complicated; difficult
Mesh
every other device tolerance to troubleshoot

Common networking standards

Access
Standard Description Speed Topology Media
Method
10, 100, physical star, UTP, STP, fiber
802.3 Ethernet CSMA/CD
1000 Mbps logical bus optics
Token physical star,
802.5 Token ring 4, 16 Mbps STP
passing logical ring
1, 11, 54
802.11 Wireless networks CSMA/CA cellular Atmosphere
Mbps
Fiber Distributed Token
FDDI 100 Mbps dual ring Fiber optics
Data Interface passing

Physical media types

Medium Description Types Remarks


Consists of multiple insulated wires UTP,
Twisted Cat3(16MHz), Cat5(100MHz),
that are twisted together in pairs to STP,
pair Cat5e(100MHz), Cat6(250MHz)
prevent crosstalk ScTP
Consists of a center conductor
Coaxial 75Ω, RG-58 (thinnet), RG-8(thicknet),
surrounded by a plastic jacket with
cable 50Ω RG-62(ARCnet)
braided shield
Consists of a center glass core 8~10um(SMF),
Fiber optic SMF ,
surrounded by glass cladding and 50~62.5um(MMF), 125um(clad),
cable MMF
other protective materials EMI immune
Wireless networking technologies

Data
Standard Frequency Transmission Type Topology Range
Speed
IEEE 802.11
2 Mbps 2.4 GHz FHSS or DSSS Point-point 30 m
Legacy
IEEE
11 Mbps 2.4 GHz DSSS with CCK Point-point 30 m
802.11b WiFi
IEEE 802.11a
54 Mbps 5 GHz OFDM Point-point 30 m
WiFi
IEEE >20 Mbps: OFDM, <20
54 Mbps 2.4 GHz Point-point 30 m
802.11g WiFi Mbps: DSSS with CCK
IEEE
540 Mbps 2.4/5 GHz MIMO Point-point 50 m
802.11n WiFi
Bluetooth 2 Mbps 2.45 GHz FHSS Scatternet 10 m
100 kbps~ 100 GHz ~ 1000 Point-point
Infrared Baseband 1m
16 Mbps THz LOS
IEEE 802.16 2 GHz ~ 11 Point-point
75 Mbps BPSK 30 km
WiMax GHz, 66 GHz Cellular

Types of backup tape drives

Data Transfer
Drive Description Capacity
Speed
60 kbps, 125
QIC Quarter Inch Cartridge; formats: 3.5", 5.25" 20 GB, 50 GB
kbps
1 Mbps, 1.83
Travan Enhancement of QIC; formats: TR4, TR5 4/8 GB, 10/20 GB
Mbps
Digital Audio Tape; formats: DDS (Digital 40 GB (DDS), 160 4.8 Mbps, 20
DAT
Data Storage), DLT (Digital Linear Tape) GB (DLT) Mbps
An 8mm backup format used in computer 10/20 GB, 20/40 3 Mbps, 6
Mammoth
systems; AIT (Advanced Intelligent Tape) GB Mbps
The Open Systems Interconnect reference model

No Layer Function Unit Protocols/Services Devices


FTP, TFTP, HTTP, SMTP,
network application
7 Application data SMB, NCP, Telnet, NTP, gateway
services and processes
File & Print, DNS
ASCII, JPEG, GIF, TIFF,
encryption, formatting,
6 Presentation data MIDI, MPEG, MIME, gateway
compression, translation
Quicktime
establishes maintains, RPC, ZIP, SCP, SQL,
5 Session manages network data NetBIOS, NFS, ASP, gateway
connections and sessions LDAP, SSL, SMB
end-end error recovery, TCP, SPX, UDP, NBP,
4 Transport segments gateway
connectivity, flow control NCP. NetBEUI, SCTP
routing, forwarding of IP, IPX, ARP, RARP,
router,
3 Network packets; sequencing of packets DHCP, BootP, ICMP, RIP,
brouter
datagram BGP, OSPF, IPSec
encoding/decoding of
MAC, LLC, PPP, ATM,
packets into bits; frame switch,
2 Data Link frames frame relay, 802.11b/g,
synchronization, error bridge
L2TP, FDDI
checking
electrical, mechanical, hub,
Ethernet, WiFi, Token
1 Physical lightwave, radio frequency, bits NIC,
Ring, BRI, RS232, V.35
media specifications WAP

Tools for network cabling and troubleshooting

Tool Usage
Wire crimper Used to affix an UTP/STP cable to a modular connector or plug
Used to affix several cables to a punchdown block or a patch panel found in
Punchdown tool
wiring cabinets
Media Used to test continuity or polarity of cables, trace shorts along the line; can’t
tester/certifier be used on live/active wires
Used along with a probe to verify cable continuity, identify wiring faults,
Tone generator
determine line voltage and polarity; can be used in active wires
Types of media connectors

Lock
Connector Description Usage Developed by
Method
Registered Jack modular telephone
RJ11 snap-in Bell Telephone Labs
connector (6P2C) equipments, PBX
twisted pair ethernet,
Registered Jack modular
RJ45 snap-in PoE, ISDN, T1, Bell Telephone Labs
connector (8P8C)
token ring
F-type coaxial connector broadband cable,
F-type screw-on
(75Ω) CATV, CCTV
Bayonet Nut Coupling thin ethernet, RF
BNC bayonet Bell Labs, Amphenol
(50Ω) applications
Straight Tip fiber optic
ST bayonet fiber optic ethernet AT&T
connector
Subscriber/Square fiber optic gigabit
SC snap-in IBM
Connector ethernet
fiber optic gigabit
LC Local Connector (SFF) snap-in Lucent
ethernet
Mechanical Transfer
MT-RJ snap-in fiber optic ethernet AMP
Registered Jack (SFF)
Apple, Sony,
digital devices,
IEEE 1394 FireWire (i.Link) snap-in Samsung, Matshusita,
consumer electronics
IBM, JVC, …
HP, Compaq, Lucent,
Universal Serial Bus digital devices,
USB snap-in Microsoft, Intel, NEC,
(1.1 & 2.0) computer peripherals
Philips
Network connectivity devices

Device Purpose Operation Remarks


Connects all nodes in a network together; concentrator (passive),
Hub transmissions received in 1 port are Layer 1 repeater (active),
rebroadcast to all ports MAU
Connects all nodes/segments in a network
multiport bridge,
Switch together; filters and forwards packets; isolate Layer 2
configure VLANs
collision domains
Connects 2 network segments with dissimilar
Bridge media types; isolate collision domains within Layer 2 wired or wireless
a segment
Connects 2 networks with different
Router topologies; maps nodes & routes packets; Layer 3 Brouter, IOS
isolates broadcast domains
Connects 2 networks with different protocols
Layer 4, 5, connection to ISP,
Gateway or technologies; could be hardware or
6, 7 PABX
software
An expansion card installed in a device to
PCI, USB, PCMCIA,
NIC connect/interface to the network; particular Layer 1, 2
built-in M/B
to media & protocol
A 2 in 1 device used to connect a digital
CSU/DSU carrier to the network equipment; provides - T1, T3; V.35 interface
diagnostics & buffering
ISDN The terminal adapter used to connect to the
- BRI TA
adapter internet via ISDN technology
A device used to connect mobile PCs to a infrastructure mode,
WAP Layer 1, 2
wired network wirelessly via RF technology WiFi
A device that changes digital to analog signal POTS (V.92), xDSL,
Modem -
and vice versa; modulator/demodulator cable
A device that transmits or receives analog or
media converter,
Transceiver digital signals; allows a NIC to connect to a -
DIX/AUI
different media type
A stand-alone device or software used to port blocking, packet
Firewall protect networks from spyware, hackers, - filtering, proxy server,
worms, phising, trojans DMZ
Classful IP addressing

Class Range Default Subnet No of Subnets No of Hosts/Subnet


Class A 1.0.0.0 ~ 126.0.0.0 255.0.0.0 126 16,777,214
Class B 128.0.0.0 ~ 191.0.0.0 255.255.0.0 16,384 65,534
Class C 192.0.0.0 ~ 223.0.0.0 255.255.255.0 2,097,152 254

Reserved IP address blocks

CIDR address block Description Reference


0.0.0.0/8 Network or wire address RFC 1700
10.0.0.0/8 Private network (Class A) RFC 1918
14.0.0.0/8 Public data network RFC 1700
39.0.0.0/8 Reserved RFC 1797
127.0.0.0/8 Localhost (Loop back address) RFC 1700
128.0.0.0/16 Reserved -
169.254.0.0/16 Zeroconf , APIPA RFC 3927
172.16.0.0/12 Private network (Class RFC 1918
192.0.2.0/24 Documentation and example code RFC 3330
192.88.99.0/24 IPv6 to Ipv4 relay RFC 3068
192.168.0.0/16 Private network (Class C) RFC 1918
198.18.0.0/15 Network benchmark tests RFC 2544
223.255.255.0/24 Reserved RFC 3330
224.0.0.0/4 Multicasts (former Class D) RFC 3171
240.0.0.0/4 Experimental (former Class E) RFC 1700
255.255.255.255 Broadcast -
Physical and logical addressing

Versio Lengt Delimite


Notation Separation Supports Example
n h r
8-bit
Colon ( 12x109
Hexadecim hexadecim
MAC 48 bits , combination 00:50:DA:C3:8A:F9
al al digits (2
Dash (-) s
hex)
8-bit binary
Dotted- coded 4.3x109
IPv4 32 bits Dots (.) 207.142.131.235
decimal decimal addresses
digits
16-bit
128 Hexadecim Colon ( hexadecim 3.4x1038 2001:0DB8:0::0::1428:57
IPv6
bits al al digits (4 addresses AB
hex)

Rules of subnetting

No Rule
1 B bits => 2; R bits => 2
2 Usable subnets created = 2B - 2
3 Usable hosts per subnet = 2R - 2
4 Decimal value of the number of bits borrowed = increment of the subnets

Switching type comparison

Resource Circuit Switching Packet Switching


Dedicated path? yes no
Available bandwidth? fixed dynamic
Could Bandwidth be wasted? yes no
Store-and-forward transmission no yes
Each packet follows the same route? yes no
Call setup required not required
When can congestion occurs? at set-up at every packet
Charge? per minute per packet
Commonly used well-known ports

Port Name Function


20 FTP Reliable transfer of data; uses TCP
21 FTP Provides flow control; uses TCP
22 SSH Executes command and moves files; remote login protocol; uses TCP
23 TELNET Connects a remote computer to a server; uses TCP
25 SMTP Delivers emails between email servers; sending of emails; uses TCP
Translates hostnames to IP addresses; uses TCP (zone transfers), UDP
53 DNS
(queries)
58 DHCP
69 TFTP Simple transfer of data; uses UDP
80 HTTP Opens a browser connection to a webpage; uses TCP
88 KERBEROS
Delivers emails between a mail server and client; receiving of emails; uses
110 POP3
TCP
119 NNTP Views and writes news articles for newsgroups; uses TCP
123 NTP Sets computer clock to standard time; uses UDP
Downloads emails; stores and searches messages from newsgroups;
143 IMAP4
receiving of emails; uses TCP
161 SNMP
389 LDAP
Allows browsers and servers to authenticate and encrypt network packets;
443 HTTPS
uses SSL; uses TCP
514 SYSLOG
636 LDAP/TLS
1701 L2TP
1723 PPTP
3389 REMOTE ACCESS
Network protocols

Protocol Routing Addressing Naming Interoperability


server names only: 64
12-digit
IPX/SPX RIP, SAP, NLSP characters, no special Windows, Linux
hexadecimal
characters; NDS
NetBIOS or computer
NetBEUI unroutable - Windows
names; WINS
version1:
version1: NBP; ethernet: ELAP, token
AppleTalk unroutable; 24-bit address
version2: IP naming ring: token talk
version2: RTMP
Windows, UNIX,
TCP/IP RIP, OSPF 32-bit address DNS, ARP, RARP
Linux, Mac, Novell

Digital transmission hierarchies

Carrier Channels Data Rate Format


T1 24 1.544 Mbps
North American
T3 672 44.736 Mbps
E1 32 2.048 Mbps
European
E3 480 34.368 Mbps
J1 24 1.544 Mbps
Japanese
J3 480 32.064 Mbps

Optical carriers

Level Data Rate


OC-1 51.84 Mbps
OC-3 155.52 Mbps
OC-12 622.08 Mbps
OC-24 1.244 Gbps
OC-48 2.488 Gbps
xDSL technologies

Type Distance Downstream Upstream Characteristic Use


1.544 Mbps ~ 6.1 126 kbps ~ 640 Most popular; used for web
ADSL 18,000 ft
Mbps kbps access and multimedia streaming
WAN connection from company
1.544 Mbps(US), 1.544 Mbps(US),
SDSL 12,000 ft network server to phone
2.048 Mbps(EU) 2.048 Mbps(EU)
company
WAN connection from company
1.544 Mbps (2p), 1.544 Mbps (2p),
HDSL 12,000 ft network server to phone
2.05 Mbps (3p) 2.05 Mbps (3p)
company
Transmits data only; similar to
IDSL 18,000 ft 128 kbps 128 kbps
ISDN BRI
Used in home and small
CDSL 18,000 ft 1.544 Mbps <1.544 Mbps business; no splitter; known as
G.lite
640 kbps ~ 2.2 270 kbps ~ 1.1
RADSL n/a Same as ADSL
Mbps Mbps
1.5 Mbps ~ 2.3 ATM networks using fiber optic
VDSL 4500 ft 1.6 Mbps ~ 53 Mbps
Mbps cable

TCP/IP protocol suite

Name Meaning Function


Enables two hosts to establish connection and exchange
Transmission Control
TCP network data; connection-oriented; guaranteed delivery of
Protocol
packets
Enables two hosts to establish connection and exchange
UDP User Datagram Protocol
network data; connectionless, unreliable, less overhead
Downloads or uploads files between hosts; performs
FTP File Transfer Protocol
directory operations; also offers authentication security
Secure File Transfer Transfer of files with SSH to provide encryption, public key
SFTP
Protocol authentication, and file compression; similar to FTP
Facilitates file transfer between computers; uses lesser
Trivial File Transfer
TFTP bandwidth and faster speed; similar to FTP; used in
Protocol
firmware downloading
Transfer files or web pages from web server to client web
HyperText Transfer
HTTP browser; uses lesser bandwidth and supports both text and
Protocol
graphics
HyperText Transfer Allows browsers and servers to authenticate and encrypt
HTTPS
Protocol Secure network packets using SSL; secure version of HTTP
Simple Mail Transfer
SMTP Uses a spooled or queued method to deliver or send emails
Protocol
Post Office Protocol Used to retrieve email files from the email server; can be
POP3
version 3 used with or without SMTP
Internet Message Access Used to retrieve email files from the email server; similar to
IMAP4
Protocol version 4 POP3 but with added features; supports Kerberos
A terminal emulation program that connects remote
Telnet Telephone Network computers to a server; execute a commands using command
prompt
A suite of protocols used to log into another computer on the
SSH Secure Shell
network, execute commands, and secure transfer of files
Internet Control Message Provides network layer management and control by sending
ICMP
Protocol datagrams and control messages; works with IP
Resolves network addresses (IP) into hardware addresses
Address Resolution
ARP (MAC); uses address resolution cache table built into every
Protocol
NIC
Reverse Address
RARP Uses host MAC address to discover its IP address
Resolution Protocol
Sets computer clock to a standard time source usually a
NTP Network Time Protocol
nuclear clock
Network News Transfer Used for the distribution, inquiry, retrieval, and posting of
NNTP
Protocol news articles and newsgroup forum messages
Safe and secure copying of files between a local and remote
SCP Secure Copy Protocol
computer; similar to SFTP
Lightweight Directory A session layer protocol that provides directory services and
LDAP
Access Protocol access to x.500 information directories
Internet Group Multicast A network layer protocol used to report multicast group
IGMP
Protocol membership to adjacent routers
A printer protocol used to print across different NOS
LPR Line Printer Remote
platforms
Network services and protocols

Name Meaning Function


Translates and resolves IP addresses into host names or the
DNS Domain Name System
reverse
Dynamic Host Allows a client device to request and obtain a unique IP
DHCP
Configuration Protocol address and other parameters from a server automatically
Allows a local network to use one set of IP address for
Network Address
NAT internal or in-house traffic and a different set for external or
Translation
internet traffic
Connects multiple computers on a local network to the
Internet Connection
ICS internet through a single connection and IP address; uses
Sharing
NAT
Windows Internet Resolves a host NetBIOS name or computer name into an IP
WINS
Naming Service address; used in legacy Windows
Simple Network Monitors the network and network devices; sends messages
SNMP
Management Protocol to different parts of the network; uses MIB
Permits network users to access and used shared files; allows
NFS Network File System
different computer platforms to share files and disk space
Connects networking devices using an Ethernet cable; no
Zeroconf Zero Configuration
configuration or DHCP required
Shares files, directories, and services; message format used
SMB Server Message Block by DOS; allows UNIX/Linux and Windows machines to
share files
A file sharing protocol used with TCP/IP to permit non-
AFP Appletalk File Protocol
apple computers to access apple servers
LPD Line Printer Daemon Processes LPR print jobs, queues, and prints files
Provides file and print services to SMB clients; runs on
Samba -
UNIX and Linux
Independent The core of Citrix presentation server that enables Windows
ICA Computing or UNIX server to run an application for multiple users
Architecture simultaneously
Apache - A popular public domain UNIX-based web server
Remote access protocols and services

Name Meaning Function


Remote Access
RAS Used for client remote access to a network
Service
Point-Point Used to establish an internet connection between serial point-to-point
PPP
Protocol links; provides for dial-up connnections to networks
Serial Line Used to connect to the internet via a dial-up modem; older, slower,
SLIP
Internet Protocol less reliable than PPP
Uses PPP over Ethernet to connect an ethernet LAN user to the
PPP over
PPPoE internet using an ADSL or cable modem; users share a broadband
Ethernet
connection
Point-Point A form of encryption that provides a tunnel for secure connections
PPTP
Tunnel Protocol over the internet; used to create VPN
Virtual Private A private, secure, point to point connection from a company LAN to
VPN
Network the remote users and wireless nodes using the internet
connects a client to a network via a terminal server and uses
Remote Desktop
RDP authentication to establish connection to run applications and printers
Protocol
remotely

Characteristics of fault-tolerance

Item Implementation
UPS, SPS; backup generators, cooling fans, processors; surge suppressor; line
Power
conditioners
Link Backup links: ISDN, dial-up; microwave wireless radios; secondary ISP;
redundancy clustering
Storage Hardware or software RAID; SCSI hard disks; data warehousing
Mission critical servers and equipments: gateways, routers, switches; SAN
Services
clusters, MSOS
Disaster Backup/restore schemes; offsite storage: NAS, SAN; hot/cold spares; hot,
recovery warm, cold sites
Authentication protocols

Name Function
Uses a hashed algorithm MD5 that provides client
Challenge Handshake
CHAP response encryption; weak and one-way
Authentication Protocol
authentication protocol
Microsoft Challenge Has two versions used in Windows systems that
MS-
Handshake Authentication offers more security; version1 not compatible with
CHAP
Protocol version2
The weakest authentication protocol that sends
Password Authentication
PAP username and password in clear text over the network
Protocol
to be verified by RAS
Remote Authentication Dial- An industry standard that provides authentication,
RADIUS
in User Service authorization, and accounting services
A fully-fledge security system that uses secret key
Kerberos -
cryptography
A general protocol often used by a wireless devices to
Extensible Authentication
EAP connect to a RADIUS server; TLS uses certificates
Protocol
such as smart cards

Routing protocols

Name Meaning Function


Finds the quickest route between two computers; offers a
Routing Information
RIP maximum of 16 hops between routers before deciding that a
Protocol
packet is undeliverable
Open Shortest Path A descendant of RIP that increases its speed and reliability;
OSPF
First much used on the internet; accepts 256 hops between routers
Interior Gateway A propriety protocol from Cisco that takes bandwidth, latency,
IGRP
Routing Protocol reliability, and current traffic load into consideration
Exterior Gateway A distance vector protocol that uses polling to retrieve routing
EGP
Protocol information
Border Gateway Used to span autonomous systems in the internet; used at the
BGP
Protocol edge of networks; designed to supersede EGP
Netware Link A link state routing protocol that was designed to reduce wasted
NLSP
Services Protocol bandwidth associated with RIP
Routing Table Used by Appletalk to ensure that all routers in the network have
RTMP
Maintenance Protocol consistent routing information
Server operating systems basic capabilities

Operating Client File & Print


Authentication Interoperability
System Support Services
LPD/LPR;
multi-user,
etc/password; NIS FAT16, FAT32, Windows, Linux,
UNIX/Linux multitasking;
authentication; LDAP NTFS, Ext2, Netware, Mac OS
GUI
Ext3; NFS
multi-user, user password; keys FAT16, FAT32,
Windows, Linux,
Netware multitasking; stored in NDS; NTFS, NFS,
Netware, Mac OS
GUI eDirectory AppleShare
multi-user, domain LPD/LPR;
Windows, Linux,
Windows multitasking; username/password; FAT16, FAT32,
Netware, Mac OS
GUI AD NTFS
multi-user, UNIX-type file
kerberos mechanism; Windows, Linux,
Mac OS multitasking; system,
keychain; OD Netware, Mac OS
GUI AppleShare IP

Network operating system versions

Vendor Releases
Novell Netware 3.x, 4.x, 5.x, 6.x
Microsoft Windows NT, Windows 2000, Windows Server 2003
Apple Mac OS X, AppleShare IP
UNIX/Linux SCO ACE, RedHat

Backup types

Clears
Type Description Sets to restore
archive bit?
full/normal backs up all data; longest time to backup Y full only
backs up files changed or added since the last full + every
incremental Y
backup; faster to backup; uses more tapes incremental
backs up files changed or added since the last full + last
differential N
full backup; faster to restore; uses lesser tapes differential
mirror/copy backs up all data; used to make offsite copies; N -
TCP/IP utilities

Utility Operating System Function Switches


config NetWare displays IP stack configuration
ifconfig UNIX/Linux displays IP stack configuration
winipcfg Windows 95/98 displays IP stack configuration
displays IP stack configuration, /all /renew
ipconfig Windows NT/2000/XP release/renew DHCP IP /release /flushdns
address, flush/register DNS /registerdns
verifies end-to-end network
–t –a –n –l –f –i –
ping Windows/UNIX/Linux/Netware connectivity; uses ICMP echo
r –v
packets
traces routes to internet sites
tracert Windows 2000/XP/2003 based on the number of hops –d –h –j –w
and displays time taken
traces routes to internet sites
traceroute UNIX/Linux based on the number of hops
and displays time taken
displays protocol statistics and
–a –b –e –r –o –s
netstat Windows/UNIX/Linux/Netware current TCP/IP network
–n –p
connections
displays protocol statistics and
current TCP/IP network –a –A –c –n –r –
nbtstat Windows/UNIX/Linux/Netware
connections using NetBIOS R –S –s
over TCP/IP
displays and/or modifies IP to
physical address translation
arp Windows/UNIX/Linux/Netware –a –g –s –N
tables; displays current ARP
cache
queries a DNS name server;
nslookup Windows 2000/XP/2003 used to troubleshoot DNS and –a –d –t exit
verify DNS resolution
dig UNIX/Linux nslookup equivalent
enables a computer to function
telnet Windows/UNIX/Linux/Netware as a terminal working from a –a –e –f –l –t
remote computer
used to connect to file or print
netuse Windows NT/2000/XP
share
Common network implementation

Implementation Purpose Characteristics/Benefits Remarks


Permits/denies public traffic based on
Firewall security various filtering rules; protection from ACL, DMZ
internet threats
A firewall method that caches web
security, content for improved network web proxy, ip
Proxy server
performance performance; establish VPN for remote proxy
users
Software used to search/remove
Antivirus security, viruses, worms,
malicious programs on network
software maintenance trojan horses
computer hard drives; prevents infection
Better bandwidth management; reduced
security, static/dynamic;
VLAN administration costs; well-defined
performance VTP, DTP
groups; improved network security
A private network based on TCP/IP
Intranet cost, flexibility which resides behind a firewall; cheaper, -
versatile, flexible information sharing
Extension of a corporate intranet;
security, exchange data between
Extranet -
versatility suppliers/customers; secure corporate
purchasing
A group of redundant mirrored servers;
fault-tolerance,
Clustering high availability and scalability; -
load balancing
minimized network downtime

Network security implementation

Implementation Purpose Impact on network Remarks


Port blocking intrusion detection slows down firewalls, proxy servers
Packet filtering intrusion detection slows down firewalls, proxy servers
Authentication access control none NOS logon server
Encryption data protection slows down IPSec, PKI, PGP, Kerberos, DES
Types of RAID

Level No of drives Description


RAID 0 2 disk stripping without fault tolerance
RAID 1 2 disk mirroring/duplexing
RAID 0+1 4 a mirror of stipes
RAID 5 3 stripping with parity
RAID 10 4 stripe of mirrors

IEEE Standards

Standard Description
802.1 Internetworking
802.2 Logical Link Control (LLC)
802.3 Ethernet (CSMA/CD)
802.4 Token bus LAN
802.5 Token ring LAN
802.6 Metropolitan Area Network (MAN)
802.7 Broadband technical advisory
802.8 Fiber optic
802.9 Integrated voice/data
802.10 Network Security
802.11 Wireless Networks
802.12 Demand Priority (100VG-Any LAN)
802.13 Not used
802.14 Cable modem
802.15 Wireless personal area network
802.16 Broadband wireless access
802.17 Resilient packet ring
Troubleshooting strategy

No Step
1 Identify the symptoms
2 Identify the affected area
3 Establish what has changed
4 Select the most probable cause
5 Implement a solution and action plan
6 Test the result
7 Recognize the effects of the solution
8 Document the solution and process

Security protocols

Name Meaning Function


Internet Protocol Provides authentication and encryption over the internet; works
IPSec
Security with IPv4 and IPv6; used to secure VPN
Layer 2 Tunneling Supports non-TCP/IP protocols VPN over the internet; combines
L2TP
Protocol the best features of PPTP and L2F
Uses a private key to encrypt data that is transferred over the SSL
Secure Sockets
SSL connection; service independent and can secure different network
Layer
applications
Wired Equivalent Encrypts and protects data packets over radio frequencies; does not
WEP
Privacy offer end-end security
WiFi Protected Offers improved data encryption and user authentication using the
WPA
Access wireless devices MAC address; uses TKIP encryption
Advanced
AES Encryption A cryptographic cipher that uses Rijndael algorithm
Standard
Pretty Good An encryption utility based on public key encryption designed to
PGP
Privacy encrypt email transmissions
Method for passing EAP over both wired and wireless networks;
802.1x - provides authentication services for wireless networks not using
PPP
Unshielded Twisted Pair (UTP)

The most common type of cable is Unshielded Twisted Pair (UTP); as the name suggests, this
type of cable includes an unshielded media that includes twisted pairs. Specifically, UTP
includes four different pairs of copper cables that are each twisted together; the twisted rate
depends on the specific category of cable. Figure 1 shows an example of UTP cabling:

Figure 1 Unshielded Twisted Pair Cabling

Most networks in the last 15 years or so have included UTP cabling that is at least rated as
category 5; this cabling supports Ethernet data rates up to 100 Mbps. On modern networks that
have been deployed recently, it is common to install at least a category 6 cable with support for
up to 1000 Mbps; Table 1 shows a short list of the available UTP categories and their supported
rates.

Table 1: UTP Cabling Categories

Category Frequency Typical Technologies Supported


Bandwidth
5 100 MHz 100 Mbps Ethernet (100-Base-TX)
5e 100 MHz 100 Mbps Ethernet (100-Base-TX) and 1000 Mbps Ethernet
(1000-Base-T)
6 250 MHz 1000 Mbps Ethernet (1000-Base-T)
6a 500 MHz 1000 Mbps Ethernet (1000-Base-T) and 10 Gbps Ethernet
(10GBase-T)

Shielded Twisted Pair (STP)

Another type of twisted pair cabling includes a shield that is used to both contain and protect the
different twisted pairs from interference. This type of cabling is not commonly seen in modern
LAN networks deployments at the time of this writing; however some newer very high speed
Ethernet technologies may require a cable that has a shield and thus will be shown here.

The term STP can include a number of different cable types which all include a shielding
mechanism. Some cable types include a shield only between the different twisted pairs within the
cable and others include various shielding types both around the pairs and the whole cable; the
specifics will not be covered in this article. Figure 2 shows an example of an STP cable that has a
shield between the pairs and the whole cable:

Figure 2 Shielded Twisted Pair Cabling

Multi-Mode Fiber (MMF)

A very common type of fiber connection is Multi-Mode fiber (MMF); this type of cable uses
light to transmit signals between devices and is thus not susceptible to electrical interference.
MMF cables use a larger internal core diameter (typically, 50 µm or 62.5 µm) and can utilize
lower cost LEDs for transmission; this is both an advantage and a disadvantage. While the larger
core diameter offers a cable that supports multiple modes and a cable that is easier to work with
(light coming into the cable is allowed to come in at multiple angles), it is also limited by the
same factors in terms of total useable cable length. MMF cables are typically only used for
connections that are less than 2 kilometers in length; this also makes it a very common cable in
LAN deployments. Figure 3 below shows an example of a MMF cable:

Figure 3 Multi-Mode Fiber (MMF) Cable

Single Mode Fiber (SMF)

Like Multi-Mode Fiber (MMF), Single Mode Fibers (SMF) transmits signals via light and is not
subject to electrical interference. The difference between SMF and MMF is in their physical
characteristics; a MMF cable has a large core diameter and is able to accept a number of
different modes that come into the cable from multiple angles, SMF has a much smaller core
diameter (typically 8-10 µm) and accepts signals coming in from a specific angle and on a
specific mode. The specifics of how the light propagate within the cable are really outside the
scope of required knowledge of an entry level network engineer/administrator; what does need to
be known is that MMF is typically used for shorter cable runs (up to 2 km typically) and SMF
can be used for cable runs of very long distances (typically up to ~40 miles without repeaters
depending on wavelength). Figure 4 below shows an example of a SMF fiber:
Figure 4 Single-Mode Fiber (SMF) Cable

Connectors

With all the different types of cabling come a number of different cable connectors. This section
takes a look at the most common cabling connectors.

Registered Jack 45 (RJ45)

The cable connector that is found on almost all UTP and STP cables is a Registered Jack 45
which is mostly commonly referred to as RJ45. This type of connector resembles the older RJ11
connectors that most people are familiar with from wired telephones. Figure 5 below shows an
example of a RJ45 connector:

Figure 5 Registered Jack-45 (RJ45) Connector

Straight Tip (ST)

The Straight Tip (ST) connector is often seen on the end of a multi-mode cable; it has been
commonly seen along with the SC connector for the last 20 years but is being slowly replaced by
multi-fiber connectors (LC and MTP). Figure 6 below shows an example of a ST connector:

Figure 6 Straight Tip (ST) Connector

Subscriber Connector (SC)


The Subscriber Connector (SC) can be seen commonly on MMF or SMF; as with SC connectors,
the ST connector is slowly being replaced by multi-fiber connectors. Figure 7 below shows an
example of an SC connector:

Figure 7 Subscriber Connector (SC)

Lucent Connector (LC)

The Lucent Connector (LC) was developed for high-density deployments where multiple fibers
would be terminated within a confined space. Unlike the SC and ST connectors, the LC
connector is always duplex connecting a pair of fibers at a time. Figure 8 below shows an
example of a LC connector:

Figure 8 Lucent Connector (LC)

Multi-fiber Push On (MPO)

The Multi-fiber Push On (MPO) connector is another duplex connector that offers an easy
options for connection. As the name suggests, it was designed to be able to be connected
multiple times without the creation of any potential connector issues. It is often also referred to
as Multi-fiber Termination Push-on (MTP); the MTP connector is a brand name (US Conec).
Figure 9 below shows an example of an MPO connector:

Figure 9 Multi-fiber Push On (MPO) Connector

You might also like