Communication is vital, like air, water, food, and shelter. Networks connect us more than ever.
Networks create a world without boundaries, forming global communities and a human network.
Copper cabling is common due to its low cost, easy installation, and low electrical resistance. However, it has limitations:
Mitigation strategies include:
UTP is a common networking medium, terminated with RJ-45 connectors, and interconnects hosts with network devices. Key characteristics include:
STP offers better noise protection than UTP but is more expensive and harder to install. It uses RJ-45 connectors to interconnect hosts with network devices. Key characteristics of STP include:
Coaxial cable consists of:
It is used in wireless installations to attach antennas and in cable internet installations for customer premises wiring.
TIA/EIA-568 standardizes cable types, lengths, connectors, cable termination, and testing methods for UTP cables. IEEE establishes electrical standards, rating cables based on performance, such as Category 3, 5, 5e, 6, and 7.
Category 7 Ethernet cable specs are defined in the ISO/IEC 11801:2002 standard and must:
RJ-45 Connectors, Sockets, and proper/poor termination of UTP Cables.
Cable Type | Standard | Application |
---|---|---|
Ethernet Straight-through | Both ends T568A or T568B | Host to Network Device |
Ethernet Crossover | One end T568A, other end T568B | Host-to-Host, Switch-to-Switch, Router-to-Router |
Rollover | Cisco Proprietary | Host serial port to Router or Switch Console Port, adapter |
Note: Ethernet Crossover is considered Legacy due to most NICs using Auto-MDIX to sense cable type and complete connection
Fiber-optic cabling transmits data over longer distances and at higher bandwidths than copper. It is less susceptible to attenuation and immune to EMI/RFI. It is made of thin strands of glass and uses lasers or LEDs to transmit light, acting as a waveguide with minimal signal loss.
Dispersion, the spreading of a light pulse over time, affects signal strength. Multimode Fiber (MMF) has greater dispersion and a maximum distance of 550 meters, while Single-Mode Fiber (SMF) has a very small core, uses expensive lasers and is used in long-distance applications. MMF uses less expensive LEDs, transmitting at different angles and supporting up to 10 Gbps over 550 meters.
Fiber-optic cabling is used in:
Course focus: Fiber within the enterprise.
Note: A yellow jacket is for single-mode fiber cables, and orange (or aqua) is for multimode fiber cables.
Optical fiber is used for high-traffic, point-to-point connections and interconnection of buildings. Implementation issues:
Feature | UTP Cabling | Fiber-Optic Cabling |
---|---|---|
Bandwidth supported | 10 Mb/s - 10 Gb/s | 10 Mb/s - 100++ Gb/s |
Distance | Short (1 - 100 meters) | Long (1 - 100,000 meters) |
Immunity to EMI and RFI | Low | High (Completely immune) |
Immunity to electrical hazards | Low | High (Completely immune) |
Media and connector costs | Lowest | Highest |
Installation skills required | Lowest | Highest |
Safety precautions | Lowest | Highest |
Wireless media carries electromagnetic signals using radio or microwave frequencies, providing mobility. However, it has limitations:
IEEE and telecommunications industry standards cover data link and physical layers, dictating data encoding, frequency, transmission power, signal reception, and antenna design. Wireless Standards include:
WLAN requires Wireless Access Points (APs) to concentrate wireless signals and connect to copper-based network infrastructure, and Wireless NIC Adapters to provide communication capability. Network administrators must use stringent security policies to protect WLANs from unauthorized access and damage.
Every computer on a network is a host or end device. Servers provide information, such as email, web pages, and files, while clients request this information. Examples include Email Servers, Web Servers and File Servers.
A Peer-to-Peer Network can have a device act as both client and server, but this is only recommended for very small networks. Advantages include ease of setup and lower cost, disadvantages include lack of centralized administration, security issues, scalability problems, and slower performance.
An end device is where a message originates or is received.
Intermediary devices such as switches, wireless access points, routers, and firewalls interconnect end devices. Management of data flow through the network including regenerate and retransmit data signals, maintaining routing information, and notifying other devices of errors/failures.
Communication across a network is carried through a medium, including:
Network diagrams (topology diagrams) use symbols to represent devices. Important terms include:
Note: port and interface are used interchangeably.
Physical topology diagrams illustrate the physical location of intermediary devices and cable installation. Logical topology diagrams illustrate devices, ports, and the addressing scheme of the network.
Networks vary in size:
Network infrastructures vary in size, number of users, services, and responsibility. Two common types of networks:
Feature | LAN | WAN |
---|---|---|
Area | Small geographical area | Wide geographical area |
Function | Interconnect end devices in a limited area | Interconnect LANs over wide geographical areas |
Administration | Single organization or individual | One or more service providers |
Bandwidth | High-speed bandwidth to internal devices | Slower speed links between LANs |
The internet is a worldwide collection of interconnected LANs and WANs. LANs are connected using WANs, which may use copper, fiber, and wireless. It is not owned by any individual or group, but maintained through the work of: IETF, ICANN, IAB.
Connection | Description |
---|---|
Cable | High bandwidth, always on, offered by cable television service providers. |
DSL | High bandwidth, always on, runs over telephone lines. |
Cellular | Uses a cell phone network to connect to the internet. |
Satellite | Major benefit to rural areas without Internet Service Providers. |
Dial-up | Inexpensive, low bandwidth option using a modem for telephone line connections. |
Connection | Description |
---|---|
Dedicated Leased Line | Reserved circuits within the service provider’s network connect distant offices with private voice and/or data networking. |
Ethernet WAN | Extends LAN access technology into the WAN. |
DSL | Business DSL is available in various formats including Symmetric Digital Subscriber Lines (SDSL). |
Satellite | This can provide a connection when a wired solution is not available. Corporate business connections may require higher bandwidth, dedicated connections, managed services. |
Before converging networks, organizations used separate cabling for telephone, video, and data, each using different technologies, rules, and standards.
Converged networks carry multiple services (data, voice, video) on one shared link, using the same set of rules and standards.
Network architecture supports infrastructure and data movement. Key characteristics include: Fault Tolerance, Scalability, Quality of Service (QoS), and Security.
A fault-tolerant network limits failure impact. Redundancy via packet switching splits traffic into packets routed independently, unlike circuit-switched networks with dedicated circuits.
A scalable network can expand to support new users and applications without affecting performance, achieved through adherence to standards and protocols.
Quality of Service (QoS) ensures reliable delivery of voice and video by managing data and voice traffic flow effectively.
Two main types of network security:
Three goals of network security: Confidentiality, Integrity, and Availability.
Networks are continually transforming to keep up with new technologies:
Bring Your Own Device (BYOD) allows users to use their own devices to access information and communicate, including laptops, netbooks, tablets, smartphones, and e-readers.
Online collaboration tools, such as Cisco WebEx, enable users to connect and interact. Cisco Webex Teams allows sending instant messages, posting images, videos, and links.
Video calls and conferencing are critical for effective collaboration. Cisco TelePresence enables virtual presence.
Cloud computing allows storing files or backing up data on servers over the internet and accessing applications. It is made possible by data centers, which smaller companies can lease services from.
Four types of Clouds:
Smart home technology integrates technology into everyday appliances, allowing them to interconnect.
Powerline networking allows devices to connect to a LAN using electrical outlets.
Wireless broadband offers internet connectivity via Wireless Internet Service Providers (WISPs) in rural environments, using cellular technology and antennas.
Network security is integral regardless of network size and must account for the environment while securing data and maintaining QoS. It involves many protocols, technologies, devices, tools, and techniques.
External Threats:
Internal Threats:
Security must be implemented in multiple layers using more than one security solution. Network security components for home or small office network:
Larger networks have additional security requirements:
The study of network security starts with a clear understanding of the underlying switching and routing infrastructure.
The ARPANET'S HOSTS.TXT file mapped every ARPANET host's name to its IP address. The format of an entry looked like:
On Unix systems, the HOSTS.TXT file was converted to /etc/hosts format
Consistency:
Name collisions:
Human intervention was required
Traffic and load:
ARPANET launched an investigation into replacement for HOSTS.TXT based on these goals:
Paul Mockapetris, then of USC's Information Sciences Institute, designed the architecture of the new system, called the Domain Name System, or DNS. The initial DNS RFCs were released in 1984: RFC 882, "Domain Names - Concepts and Facilities" RFC 883, "Domain Names - Implementation and Specification" The transition plan was initially released in November, 1983, transition to be completed by May, 1984
The name space is the structure of the DNS database. It's an inverted tree of nodes with the root at the top. Each node has a label.
The root node has a null label, written as "".
A domain is a node in the name space and all its descendants. That is, a subtree of the name space
A domain's domain name is the same as the name of the node at the root (top) of the subtree
One domain is a subdomain of another if its root node is a descendant of the other's root node. More simply, one domain is a subdomain of another if its domain name ends in the other's domain name
So sales.acmebw.com is a subdomain of
acmebw.com. Also of .com, but that isn't usually stated
acmebw.com is a subdomain of com
The DNS provides a coherent, consistent namespace via a singly rooted hierarchical tree structure. This root holds the definition of all top level domains that are guaranteed to be unique in that DNS tree. THERE CAN ONLY BE ONE!
Violation of this rule results in inconsistencies in the namespace, that is, a name can translate to different addresses depending on where you ask the question
Due to protocol limitations there are 13 nameservers that serve the root zone. a-m.root-server.net a.root-server.net is the primary
The root nameservers are provided in a configuration file Control of this file is becoming an issue
In 1983 (RFC 881), the idea was to have TLDs correspond to network service providers e.g., .ARPA, .DDN, .CSNET, etc.
Bad idea - if your network changes, your email address changes
By October, 1984 (RFC 920), the concept of functional domains
e.g., .GOV for Government, .COM for commercial, .EDU for education, etc.) was established.
"The motivation is to provide an organization name that is free of
undesirable semantics."
RFC 920 also provided for Country domains and Multiorganizations. The RFC 920 TLD structure remained stable until 1997 or so
Generic TLDs (gTLDs) | Country Code TLDs (ccTLDs) | International TLDs (iTLDs) | US Legacy TLDs (us TLDs) |
---|---|---|---|
.COM | AF Afghanistan | .INT | .GOV |
.NET | .AL Albania | .ARPA | |
.ORG | .DZ Algeria | .MIL | |
YU Yugoslavia | .EDU | ||
ZM Zambia | |||
ZW Zimbabwe |
The DNS is divided into three main components:
DNS Basic Name Resolution Techniques: Iterative & Recursive. Conventional name resolution transforms a DNS name into an IP address. This process can be considered to have two phases:
Follow each step in the diagram: Iterative DNS Query.
Follow each step in the diagram: Recursive DNS Query.
DNS and DHCP servers are a part of all networks’ core infrastructure. It doesn’t matter if the hosts are running on Windows, Linux, Mac OS, or on Internet of Things (IoT) devices. DHCP and DNS are likely managing the name and address information for those hosts.
The core functionality of Windows Server’s DHCP and DNS server services hasn’t changed much since the release of Windows 2000. What did change with the release of Windows Server 2012, however, was the inclusion of the IPAM feature.
IPAM allows you to centrally manage all of the DNS and DHCP infrastructure. Instead of managing scopes and zones on individual DHCP and DNS servers. After you deploy IPAM, you can manage all of your organisation’s zones and scopes from a single console.
DNS servers translate host names to IP addresses and IP addresses to host names. By querying special records on DNS servers, it’s possible to locate mail servers, name servers, verify domain ownership, and locate servers such as domain controllers. While DNS servers are usually deployed on a domain controller on a Windows Server network, it’s also possible to deploy them on stand-alone computers
Zones store DNS resource record information. The DNS Server service in Windows Server 2016 supports several zone types, each of which is appropriate for a different set of circumstances. These zone types include primary, secondary, stub, and GlobalNames zones. You can integrate zones into Active Directory, or you can use the traditional primary or secondary architecture.
You can create an Active Directory integrated zone only on a writable domain controller. You can also configure primary and stub zones as Active Directory integrated zones. Active Directory integrated zones can be replicated to all domain controllers in a domain, all domain controllers in a forest, or all domain controllers enrolled in a specific Active Directory partition.
Domain controllers with DNS servers that host Active Directory integrated zones can process updates to those zones. You can configure the zone to be replicated so that it is present on all domain controllers in the domain. When determining the appropriate replication scope, consider which clients need regular, direct access to the zone and which clients only require occasional, indirect access.
In traditional DNS implementations, a single server hosts a primary zone, which processes all zone updates, and a collection of secondary servers replicate zone data from the primary zone. One drawback to this model is that if the primary server fails, no zone updates can occur until the primary zone is restored.
Active Directory integrated zones and standard primary zones.
Active Directory integrated zones can only be hosted on computers that also function as domain controllers. When you create a primary zone on a computer that is not a domain controller, the wizard does not enable you to specify a replication scope for the zone.
The DNS server service on a domain controller supports all zone types. This means that you can choose to deploy a standard or Active Directory integrated primary zone, a stub zone, a reverse lookup zone, or a secondary zone on a domain controller.
A secondary zone is a read-only copy of a primary zone. Secondary zones cannot process updates and can only retrieve updates from a primary zone. Secondary zones cannot be Active Directory integrated zones. Prior to configuring a secondary zone, you need to configure the primary zone that you want it to replicate from to enable transfers to that zone. You can do this on the Zone Transfers tab of the Zone Properties dialog box.
Reverse lookup zones translate IP addresses into FQDNs. You can create IPv4 or IPv6 reverse lookup zones. You can also configure reverse lookup zones as Active Directory integrated zones, standard primary zones, secondary zones, or stub zones. The domain controller promotion process automatically creates a reverse lookup zone based on the IP address of the first domain controller. Reverse DNS lookups are used to verify the legitimacy of a sender's IP address, commonly used in email spam prevention
Forwarders and conditional forwarders enable your DNS server to forward traffic to specific DNS servers when a lookup request cannot be handled locally. For example, you might configure a conditional forwarder to forward all traffic for resource records for the tailspintoys.com zone to a DNS server at a specific IP address. If you don’t configure a forwarder, or if a configured forwarder can’t be contacted, the DNS Server service forwards the request to a DNS root server and the request is resolved normally.
Go to diagram in slides to see an example of a DNS Management window.
You are likely to use a DNS forwarder, rather than have your DNS server use the root server. You want to have a specific DNS server on the Internet handle your organisation’s DNS resolution traffic. Most organisations configure their ISP’s DNS server as a forwarder.
Conditional forwarders only forward address requests from specific domains rather than forwarding all requests that can’t be resolved by the DNS server. A conditional forwarder takes precedence over a forwarder. Conditional forwarders are useful when your organisation has a trust relationship or partnership with another organisation.
You can configure a conditional forwarder that directs all traffic to host names within that organisation instead of having to resolve those host names through the standard DNS-resolution process. You can create conditional forwarders using the Add-DnsServerConditionalForwarderZone
A stub zone is a special zone that stores authoritative name server records for a target zone. Stub zones have an advantage over forwarders when the address of a target zone’s authoritative DNS server changes on a regular basis. Stub zones are often used to host the records for authoritative DNS servers in delegated zones. Using stub zones in this way ensures that delegated zone information is up to date.
If you create the stub zone on a writable domain controller, it can be stored with Active Directory and replicated to other domain controllers in the domain or forest.
You can use GlobalNames zones as long as your organisation’s DNS servers are running Windows Server 2008 or later. Your organisation should consider deploying GlobalNames zones instead of WINS. Entries in the GlobalNames zones must be populated manually. GlobalNames zone entries are alias (CNAME) records to existing DNS A or AAAA records.
Host records are the most common form of record and can be used to map Fully Qualified Domain Names (FQDNs) to IP addresses. There are two types of host records:
An alias, or CNAME, record enables you to provide an alternate name when there is an existing host record. You can create as many aliases for a particular record as you need. To create a new alias in a zone, right-click the zone in DNS Manager and then click New Alias (CNAME). When you create an alias, you must point the alias to an existing host record.
Domain Name System Security Extensions (DNSSEC) add security to DNS by enabling DNS servers to validate the responses given by other DNS servers. DNSSEC enables digital signatures to be used with DNS zones.
When the DNS resolver issues a query for a record in a signed zone, the authoritative DNS server provides both the record and a digital signature, enabling validation of that record.
To configure DNSSEC, perform the following steps:
DHCP is a network service that most administrators barely pay attention to after they’ve configured it. The main concern that most administrators have with DHCP is that, up until the release of Windows Server 2012, it has been difficult to configure as a highly available service. Windows Server 2012 introduced highly available DHCP servers, allowing two servers to share a scope, rather than having to split them according to the old 80/20 rule.
A DHCP scope is a collection of IP address settings that a client uses to determine its IP address configuration. You configure a DHCP scope for every separate IPv4 subnet that you want the DHCP servers to provide IP address configuration information to.
When configuring an IPv4 scope, specify the following information: