A network is a group of interconnected computers and devices that can share information with each other. Networks can range in size from two devices up to the largest network in the world, the internet.
This lesson covers the following topics:
Networking components
Network addressing
Networking benefits
Network types
Multiple components are required to setup and configure a network. These components include:
Devices - Devices can include a computer, tablet, mobile phone, gaming console, IoT device, and server. The devices are typically referred to as network nodes or hosts.
Transmission medium - The transmission medium connects network devices. Examples include twisted pair cabling, fiber optics, and wireless radio signals.
Network interface (NIC) - The network interface converts the digital data into a signal that can be transmitted along the transmission medium.
Specialized devices are used to connect host devices together. These connection devices include:
Routers to connect multiple networks together.
Switches to connect multiple computers inside of a network together.
Access point to connect wireless network hosts.
Networking protocols - These are standards that define how data is formatted and how the network hosts will talk to each other.
Every device on a network requires a unique address. The Internet Protocol version 4 (IPv4) formats the unique address using four octets that are each separated by a period. The IPv4 address is split into two components:
The network ID defines the network address. Every host on the device has the same network ID.
The host ID is a unique value that is different for each device.
The subnet mask defines the octets that belong to the network ID and the octets that belong to the host ID. The standard subnet mask consists of four octets that match to each octet in the IPv4 address. Each octet in the subnet mask consists of two values, usually 255 or 0, but not always. Octets with 255 represent the network ID and 0’s represents the host ID. For example:
The IP address 192.168.0.5 with a subnet mask of 255.255.0.0 shows that the first two octets in the IP address are the network ID and the last two octets are the host ID.
Often, a large network is split into smaller networks called subnets. The subnet mask defines which network a host belongs to. Two devices need to be on the same subnet to communicate. If they are on different subnets, the traffic has to be sent through a router which will forward it onto the other network.
Despite the costs of implementation and maintenance, networks save organizations money by allowing them to:
Consolidate (centralize) data storage.
Share peripheral devices such as printers.
Increase internal and external communications.
Increase productivity and collaboration.
Provide a centralized management location for user accounts and security.
Allow a network technician to remotely troubleshoot issues.
There are several ways to classify networks. The following table describes several of these ways.
Type | Classification | Description |
---|---|---|
Host role | Peer-to-peer | In a peer-to-peer network, each host can provide network resources to other hosts or access resources located on other hosts. Each host controls access to the resources located on it.
Disadvantages of peer-to-peer networks include:
|
Client-server | In a client-server network, hosts have specific roles. For example, some hosts are assigned server roles, which allow them to provide network resources to other hosts. Other hosts are assigned client roles, which allow them to consume network resources.
Disadvantages of client-server networks include:
| |
Geography | Body area network (BAN) | A body area network is a very small network that consists of wearable or implanted devices such as a smart watch, fitness trackers, or medical implants. |
Personal area network (PAN) | A personal area network is a very small network used for communication between personal devices. | |
Local area network (LAN) | A local area network is a network in a small geographic area, like an office. A LAN typically uses wires to connect systems together. | |
Wireless local area network (WLAN) | A wireless LAN covers an area that is roughly the same size as a standard LAN. It uses radio signals to connect systems instead of wires. | |
Campus area network (CAN) | A campus area network , sometimes referred to as a corporate area network , is established when multiple LANs are connected within a limited area. | |
Metropolitan area network (MAN) | A metropolitan area network is a network that covers an area as small as a few city blocks to as large as an entire metropolitan city. MANs are typically owned and managed by a city as a public utility. | |
Wide area network (WAN) | A wide area network is a group of LANs that are geographically isolated, but are connected to form a large internetwork. | |
Wireless mesh network (WMN) | A wireless mesh network is a group of wireless mesh nodes that communicate with one another to share the network connection across a large area. | |
Wireless wide area network (WWAN) | A wireless wide area network covers a large geographical area by connecting separate areas wirelessly. WLAN and WWAN both connect to the internet wirelessly, but they use different technologies to do it. | |
Management | Network | The term network often describes a computer system controlled by a single organization. This could be a local area network at a single location or a wide area network used by a single business or organization. |
Subnet | A subnet is a portion of a network. All devices on the subnet share a common network address.
| |
Internetwork | An internetwork is a network with geographically dispersed WAN connections that connect multiple LANs. | |
Storage attached network (SAN) | A special type of network that provides high-speed access to storage across the network. Specialized hardware is used to store and provide access to needed data. | |
Participation | Internet | The internet is a large, world-wide, public network. The network is public because virtually anyone can connect to it. Users or organizations make services freely available on the internet.
|
Intranet | An intranet is a private network that uses internet technologies. Services on an intranet are available only to hosts that are connected to the private network. | |
Extranet | An extranet is a private network that uses internet technologies and makes its resources available to external trusted users. |
A protocol is a set of rules that define how devices will communicate on the network. For devices to communicate, both sender and receiver must use the same protocol. The two most used transmission protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).
This lesson covers the following topics:
Data movement across a network
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
Before data is sent across a network, the sending host first breaks it into smaller, more manageable chunks and encapsulates those data chunks inside a packet.
Each packet contains a packet header which is a special label that defines the sender, receiver, and order position of the packet.
When the receiving host receives all the packets, it puts them together in order and processes the data.
Network devices can handle only one packet at a time. If a large chunk of data is sent across the network, a switch would need to process all of that data before the next packet could be processed. Using smaller data packets allows packets from multiple hosts to be processed extremely quickly.
The transmission control protocol is a connection-oriented protocol. When data is sent between two hosts, the TCP protocol ensures that every sent packet is received before sending the next packet. This ensures reliable, guaranteed delivery.
When using TCP, two hosts first establish a connection through a 3-way handshake. This handshake process is:
The first host sends a SYN packet asking to create a new session.
The receiving host replies with a SYN-ACK packet acknowledging that the session can be created.
The first host replies with a ACK packet which then opens the session.
Once the 3-way handshake has been completed, the two hosts can send data back and forth. Each data packet sent is numbered so the receiving host knows which packets it’s received. For each packet received, the receiving host sends an ACK packet back to the sender. Think of this as a phone call and both parties are reliably sending and receiving information.
If the sending host does not receive the ACK packet within a specified time, it sends another copy of the missing packet.
If the receiving host says that a packet was received out of order and one is missing, the sending host knows to send another copy of the missing packet.
TCP is most often combined with the Internet Protocol (IP) to send data across the internet. The two protocols used together is known as the TCP/IP protocol suite. IP is responsible for determining how to deliver data between two hosts; TCP is responsible for segmenting and sequencing of the data packets.
UDP is also used with IP to send data across a network. Unlike TCP, UDP is a connectionless protocol. Instead of verifying that each packet sent is received, UDP sends the packets one at time and the receiver processes them as they come in. If a data packet is dropped along the way, it is not resent. Think of UDP communications like sending a postcard or putting a message in a bottle; you are not expecting to receive any communication back. It is best effort in delivery, but not guaranteed.
UDP is used in applications that require a low latency. Losing some packets will not be detrimental to the receiver processing the data. The most common uses of UDP are:
Video and audio streaming
Online gaming
DNS queries
Voice over IP (VOIP)
DHCP
Trivial File Transfer Protocol (TFTP)
A protocol is a set of rules that define how devices communicate on the network. Whenever data is sent across the internet or an internal network, the specific protocol used is based on the type of data and how it is being transmitted.
Each protocol uses a specific port to send and receive traffic. A computer port is like a door into the system. There are 65,536 possible network ports. The port number tells the host device the type of traffic being sent and where to send it to. Network devices, such as firewalls, use port numbers to block or reroute traffic.
This lesson covers the topic of ports and protocols.
The following table describes many of the most common protocols and the port they use:
Protocol | Default Port(s) | Description |
---|---|---|
File Transfer Protocol (FTP) | 20, | FTP provides a generic method of transferring files. It can include usernames and passwords to provide file security. It allows file transfer between dissimilar computer systems.
|
Secure Shell (SSH) | 22 | SSH allows for secure interactive control of remote systems. All communication using SSH is encrypted and is typically used to remotely login to a network device, such as a switch. |
Telnet | 23 | Telnet is used to remotely connect to another system. Be aware that all data is transmitted in cleartext. Because of this, Telnet is not used often. |
Simple Mail Transfer Protocol (SMTP) | 25 | SMTP is used when sending email. |
Domain Name System (DNS) | 53 | DNS provides address to name resolution. For example, it identifies the IP address for the name www.testout.com. |
Dynamic Host Configuration Protocol (DHCP) | 67, | DHCP is used to dynamically assign IP addressing information to network hosts when they come online.
|
Hypertext Transfer Protocol (HTTP) | 80 | HTTP is used by web browsers and web servers to exchange hypermedia (such as web pages) through the World Wide Web and intranets. HTTP uses no encryption, so it is not secure. |
Post Office Protocol 3 (POP3) | 110 | POP3 is used to retrieve email from a remote server to a local client over an IP connection. With POP3, email messages are downloaded to the client. |
Network Basic Input/Output System (NetBIOS) over TCP/IP (NetBT) | 137, 139 | NetBIOS is the term used to describe the combination of two protocols: NetBEUI and NetBIOS. NetBIOS was used in early Windows networks. Because NetBIOS is a non-routable protocol, it was often combined with IP to enable internetwork communications.
NetBIOS over TCP/IP is used to allow older computers and applications that rely on NetBIOS to communicate on a TCP/IP network. |
Internet Message Access Protocol (IMAP) | 143 | IMAP is an email retrieval protocol designed to enable users to access their email from various locations without transferring messages or files between computers. |
Simple Network Management Protocol (SNMP) | 161, | SNMP is used to monitor and manage network devices. SNMP agents can be installed on network devices such as PCs, switches, firewalls, printers, and routers. These agents send data to an SNMP manager which is typically installed on a server.
|
Lightweight Directory Access Protocol (LDAP) | 389 | Network information such as usernames, passwords, computer accounts, group policies, and other user and device information are stored in a directory service such as Microsoft's Active Directory. |
Hypertext Transfer Protocol over Secure Socket Layer (HTTPS) | 443 | Referred to as HTTP over SSL, HTTPS is a secure form of HTTP that uses TLS to encrypt all communication. |
Server Message Block (SMB)/Common Internet File System (CIFS) | 445 | SMB enables the sharing of folders and printers on the network. Using SMB, remote users can access files in a shared folder on a server or workstation. Likewise, a remote user can send print jobs to a shared printer. |
Remote Desktop Protocol (RDP) | 3389 | RDP is a proprietary Microsoft protocol that allows a user to view and use the graphical desktop of a remote computer system as if they were sitting in front of it. |
Most networks today make use of the Internet Protocol (IP) for communication. On an IP network, each host device is assigned a unique Layer 3 logical identifier called an IP address. The IP address is used to identify and locate each device on the network.
This lesson covers the following topics:
IPv4 configuration
IPv4 configuration methods
IPv4 classes
Special IPv4 addresses
Each host on a network must be assigned an IPv4 configuration. The IPv4 configuration consists of four main components. The following table describes each of these components:
Component | Description |
---|---|
IPv4 address | An IPv4 address is:
|
Subnet mask | The subnet mask also consists of four octets. Each octet is usually either a 0 or 255, but not always. The subnet mask is used to identify the octets in the IPv4 address that are the host ID and those that are the network ID.
|
Default gateway | The default gateway is responsible for forwarding data packets to destinations outside of the network.
The IPv4 configuration specifies the address of the default gateway. |
DNS server address | On a network, including the internet, computers use IP addresses to identify each other and specify where data should go. However, it is much easier for users to use hostnames to identify websites or other network devices. |
Two methods can be used to configure hosts with IPv4 configurations. The following table describes these two methods:
Configuration Method | Description |
---|---|
Static configuration | Each host must be manually configured. The main benefit of static configuration is that the IP configuration does not change. The host retains the IP address even if the device is shut down and rebooted. A static configuration is best used on devices that are accessed by other hosts, such as servers and network printers.
|
Dynamic configuration | A dynamic configuration uses the Dynamic Host Configuration Protocol (DHCP). This method uses a server that is configured with the network's IP configuration information.
Using DHCP makes the configuration process much easier as the process is automated once the server has been configured. Many SOHO wireless routers have DHCP functionality and can serve as a DHCP server. |
IP addresses have a default class. The address class identifies the range of IP addresses and the default subnet mask used for the range. The following table shows the default address class for each IP address range.
Class | Address Range | First Octet Range | Subnet Mask | Number of Addresses | Private IP Range |
---|---|---|---|---|---|
A | 1.0.0.0 to 126.255.255.255 | 1–126 | 255.0.0.0 | 16,777,216 | 10.0.0.1 – 10.255.255.255 |
B | 128.0.0.0 to 191.255.255.255 | 128–191 | 255.255.0.0 | 65,536 | 172.16.0.0 – 172.31.255.255 |
C | 192.0.0.0 to 223.255.255.255 | 192–223 | 255.255.255.0 | 256 | 192.168.0.0 – 192.168.255.255 |
D | 224.0.0.0 to 239.255.255.255 | 224–239 | N/A | N/A | Used for multicast |
E | 240.0.0.0 to 255.255.255.255 | 240–255 | N/A | N/A | Experimental/Research |
Because IP addresses assigned to hosts must be unique, the use of IP addresses on the internet is controlled by organizations that ensure that every organization is given its own range of IP addresses to assign to hosts:
The Internet Assigned Numbers Authority (IANA) manages the assignment of IP addresses on the internet. IANA is operated by the Internet Corporation for Assigned Names and Numbers (ICANN).
IANA allocates blocks of IP addresses to Regional Internet Registries (RIRs). An RIR has authority over IP addresses in a specific region of the world.
An RIR assigns blocks of addresses to internet service providers (ISPs).
An ISP assigns one or more IP addresses to individual computers or organizations connected to the internet.
Because each IP address on any network, including the internet, must be unique, each IP class has a reserved range for private IP addresses.
Public IP addresses are those that are used on the internet. These are typically assigned by the ISP.
Private IP addresses are used on internal networks only and are not used on the internet.
When a device on the internal network accesses the internet, that data traffic is sent using the public IP address.
Because private IP addresses are never used on the internet, users in one private network can have the same IP address as users in another private network.
The following table describes some special IP addresses network technicians must be aware of:
IP Address | Description |
---|---|
Automatic Private IP Addressing (APIPA) | A feature that allows a device to automatically assign itself an IP address on the 169.254.0.0 network when a DHCP server or manual configuration is unavailable. |
Loopback | This special address is also known as home or localhost. This address is reserved by each network interface card (NIC) and is used for testing purposes. Ping requests can be sent to this address and if returned means that the NIC is capable of sending and receiving data packets. |
Broadcast | The last valid IP address on a network is reserved for broadcast functions. Any packet sent to this address is sent to all devices on the network subnet. |
Network | The first valid IP address on the network is reserved for the network ID. This address is used for routing purposes to identify the network and is not usually assigned to a host. |
Because the network address and broadcast address reserve the first and last valid IP addresses, usually host IDs don't end in a 0 or 255. But, there are instances where they do.
Internet connected devices have become pervasive, leading to a massive increase in the number of devices that connect to the internet. The 32-bit IPv4 address system has approximately 4.3 billion possible addresses and many of those are reserved.
Since every device that connects to the internet is assigned an IP address, the addresses available under the IPv4 addressing standard have been exhausted. To help remedy this situation, the Internet Engineering Task Force (IETF) developed the IPv6 standard in the mid 1990's.
This lesson covers the following topics:
IPv6 format
IPv6 components
IPv6 address types
The following list describes the format of an IPv6 address:
An IPv6 address is a 128-bit address made up of 8 16-bit blocks.
Each block is separated by a colon.
Each block is comprised of 4 hexadecimal values between 0000 and FFFF. Each block represents 16 bits of data (FFFF = 1111 1111 1111 1111).
There is approximately 2 128 (340 undecillion or 340 trillion trillion) available IPv6 addresses. The specific number of IPv6 addresses is 340,282,366,920,938,463,463,374,607,431,768,211,456
Because IPv6 addresses are so long, there are rules you can use to simplify an address. These rules are:
Leading zeros can be omitted in each section. For example, the quartet 0284 could also be written as 284.
An address with consecutive zeros can be expressed more concisely by substituting a double colon for the group of zeros. For example:
FEC0:0000:0000:0000:78CD:1283:F398:23AB
FEC0::78CD:1283:F398:23AB (concise form)
Removing the zeros and simplifying the address is also known as address compression.
You can use address compression only once per address. For example, FEC2:0000:0000:0000:78CA:0000:0000:23AB can be abbreviated as:
FEC2::78CA:0:0:23AB
or
FEC2:0:0:0:78CA::23AB
but not
FEC2::78CA::23AB
An IPv6 address is divided into two equal parts. The left side is the prefix and the right side is the interface ID. The prefix is comparable to the network ID in a IPv4 address and the interface ID is comparable to the host ID.
IPv6 Components | Description |
---|---|
Prefix | The first 64-bits make up the prefix.
|
Interface ID | The last 64-bits in the address is the interface ID. This is a unique identifier for each device, similar to a MAC address.
To ensure that the interface ID is unique for every host on the network, IPv6 uses the Extended Unique Identifier 64 (EUI-64) format. Following are some details of the EUI-64 format:
The interface ID can also be generated using a special algorithm that generates a completely randomized ID. This guarantees that each device will have a unique ID. |
Every device on the network must be assigned an IP address. With IPv6, each device can have multiple addresses. The following table describes the different types of IPv6 addresses:
Address Type | Description | |
---|---|---|
Unicast | Unicast addresses are assigned to a single interface for the purpose of allowing one host to send and receive data. Packets sent to a unicast address are delivered to the interface identified by that address. | |
Link-local | Link-local addresses (also known as local link addresses) are valid only on the current subnet. These addresses are similar to an APIPA IPv4 address. Details include:
Do not use link-local IPv6 addressing on routed networks. Routers do not forward packets destined for link-local addresses to other subnets. | |
Unique local | Unique local addresses are private addresses used for communication within a site or between a limited number of sites. They are commonly used for network communications that do not cross a public network; they are the equivalent of private addressing in IPv4. Details include the following:
The process for designing a network addressing scheme when using unique local addresses is similar to that used for global unicast addresses. The key difference is how the prefix is defined. Because the address range is not registered, a global routing prefix does not have to be requested from an ISP. Instead, each organization defines its own prefix. | |
Global unicast | Global unicast addresses are assigned to individual interfaces that are globally unique. All IPv6 addresses that aren't specifically reserved for other purposes are defined as global unicast addresses.
| |
Multicast | Multicast addresses represent a dynamic group of hosts. Packets sent to a multicast address are sent to all interfaces identified by that address. If you use different multicast addresses for different functions, only the devices that need to participate in a particular function will respond to the multicast; devices that do not need to participate in the function will ignore the multicast. Details include:
The following are well-known multicast addresses:
There are no broadcast addresses in IPv6. IPv6 uses multicast addresses instead of broadcast addresses. | |
Anycast | The anycast address is a unicast address that is assigned to more than one interface, typically belonging to different hosts. An anycast packet is routed to the nearest interface having that address (based on routing protocol decisions). Details include:
| |
Loopback | The local loopback address for the local host is 0:0:0:0:0:0:0:1 (also identified as ::1 or ::1/128). The local loopback address is not assigned to an interface. It can verify that the TCP/IP protocol stack is properly installed on the host. |
Servers are one of the key components for any network. The server is a computer with a special operating system that can provide different roles on the network. Depending on the needs of the network, a single server can handle multiple roles or one specific role.
This lesson covers the following topics:
Access roles
Domain Name System (DNS)
Dynamic Host Configuration Protocol (DHCP)
Mail servers
Servers often provide and manage access to different types of network resources. The following table describes some of the more common network resources and how the server can be used to manage access to these resources.
Network Resource | Server Role |
---|---|
Files/folders | Providing and managing access to files and folders is one of the more common roles you can configure servers to handle.
Only folders can be shared and managed on the server, not individual files. |
Printers | You can configure servers to manage network printers. When enabling the print server roles, you can configure the server to manage security settings, monitor printer usage, and provide access to internet printing. |
Web site | Web sites have become an integral component of many organizations' business models. Maintaining its own web server gives an organization the ability to make changes and manage its site as needed. You can configure a web server to host an internal web site called an intranet.
|
Security | All networks need to focus on security. The three components of network security are:
System log files can be used to provide the accounting component. Whenever a significant event occurs on a network, a system log (syslog) file is generated.
|
On a network, including the internet, computers use IP addresses to identify each other and specify where data should go. However, it is much easier for users to use hostnames or words to identify computers or websites. The domain name system (DNS) translates hostnames to IP addresses. This is part of what makes using the internet so easy.
DNS is a hierarchical naming system. Hierarchical means that the system is organized with a root level at the top and everything branches from that.
A fully qualified domain name (FQDN) is a domain name that spells out each level of the hierarchy. For example, www.testout.com. is a FQDN. The following table describes each section of the FQDN.
FQDN Section | Description |
---|---|
Root level | The root level is the highest level in the DNS hierarchy. The DNS root level is represented by a period at the end of the FQDN. When typing the FQDN into a web browser, the period is typically not included. The period is mainly used when defining DNS records on the server. |
Top-level domain | The top-level domain (TLD) names have extensions such as com, edu, gov, org, etc. |
Domain name | The domain name is unique to each organization. The DNS domain is referred to as distributed because this portion is unique to each organization or group. Each organization is responsible for maintaining its own namespace. |
Hostname | This is the name of specific hosts on the network.
|
DNS zones are used to maintain and define the domain namespace (e.g., testout in www.testout.com). Subdomains (e.g., labs.testout) are also defined and managed in DNS zones. Multiple subdomains can be managed on one server or defined in their own DNS zone as needed.
A DNS zone is defined using a DNS zone file.
The DNS zone file is a text document stored on each server and defines the DNS zone and how it should function.
Each DNS zone must have its own zone file.
When defining a DNS zone, you must specify a forward lookup zone or a reverse lookup zone.
A forward lookup zone matches the hostname to the IP address.
A reverse lookup zone matches the IP address to the hostname.
These zones need to be defined because limitations in DNS do not allow this to happen automatically.
There are many types of DNS records that can be configured. The following table describes commonly used DNS records.
DNS Record | Description |
---|---|
A | Maps an IPv4 (32-bit) DNS host name to an IP address. This is the most common resource record type. |
AAAA | Maps an IPv6 (128-bit) DNS host name to an IP address. |
Pointer | Maps an IP address to a host name (by pointing to an A record). |
Canonical Name | Provides alternate names (or aliases) to hosts that already have a host record. For example:
|
Mail Exchange | Identifies servers used for handling email |
TXT | Stores plaintext notes in a DNS zone. This record type can be used to help prevent email spam and verify domain ownership. |
Start of Authority | Stores all the administration information about the DNS zone. For example, the administrator's email address, TTL values, primary name server, etc., is recorded in this file. |
Name Server | Defines the authoritative server for a specific domain. This record identifies all name servers that can perform name resolution for the zone. |
DNS Service | Defines a host and port for a specific service such as voice over IP (VoIP). This allows clients to find services through DNS. Windows automatically creates these records as needed. |
Implementing DHCP on a network allows the IP configuration to be assigned automatically when a device connects to the network. The IP configuration can include:
A unique IP address
Subnet mask
Default gateway
DNS server (only if needed)
Windows Naming Service (WINS) server (only if needed)
To implement DHCP, you must define the DHCP scope. This is the configuration information that is applied to each new device.
Depending on the network, different devices may serve as the DHCP server such as:
SOHO router
Windows or Linux server
The following table describes each of the options you need to define in a DHCP scope.
DHCP Scope Item | Description |
---|---|
IP range | The IP range defines the range of IP addresses that the DHCP server can assign. When a new device connects to the network, the DHCP server will assign the next available address.
|
Subnet mask | The subnet mask defines the network ID and host ID. This must be defined. |
Exclusions | Exclusions are IP addresses that the DHCP server will not assign.
It's important to remember that the exclusion addresses must fall within the configured IP range. |
Reservations | Reservation IP addresses will also not be assigned by the DHCP server.
|
DHCP lease time | An IP configuration is assigned to a device for a specified amount of time. This is the DHCP lease. Keep in mind:
|
Default gateway | The default gateway defines where data packets that are leaving the network (e.g., internet packets), should go. |
DNS server | If you are using a specific DNS server, define it in the scope. |
WINS server | Most networks do not use WINS anymore, but if it is needed, you can define it in the DHCP scope. |
Email allows users to communicate with each other whenever they want regardless of physical location. A server can be configured to manage emails for an organization. Email protocols include:
Simple Mail Transfer Protocol (SMTP) - Used for outgoing emails and operates on port 25.
Post Office Protocol version 3 (POP3) - Used for incoming emails and operates on port 110. Emails are downloaded to the local computer and then removed from the email server.
Internet Message Access Protocol (IMAP) - Used for incoming emails and operates on port 143. Emails are kept on the email server, allowing users to access their email from multiple devices.
Spam email is one of the major concerns with emails. Spam mail can lead to issues including the introduction of malware into the network. The following table describes some of the technologies you can implement to help prevent spam emails.
Spam Management Technology | Description |
---|---|
DomainKeys Identified Mail (DKIM) | DKIM protects against spoofed emails by verifying the sender's domain address.
|
Sender Policy Frameworks (SPF) | SPF is also used to protect against spoofed emails. Instead of using encryption keys, a SPF record is created in the sender's DNS server. The SPF contains:
The recipient can check the SPF record and verify the IP address of the domain the email comes from. If the IP address matches the DNS records, the email is marked as safe. If the IP address does not match the DNS records, the email is flagged and blocked. |
Domain-based Message Authentication, Reporting, and Conformance (DMARC) | DMARC combines the protections of both DKIM and SPF to protect users from malicious emails. DKIM:
|
The network administrator is responsible for ensuring network uptime, security, and access to network resources. Internet appliances can be implemented to help make the network administrator's job easier by automating tasks, providing network security, and monitoring the network for potential issues.
Internet appliances can come in two forms. One form is an embedded system that contains all hardware and software in one device. The other form is software running on a server. The system you choose depends on the needs of the network.
This lesson covers the following topics:
Load balancers
Spam gateways
Proxy servers
Unified threat management (UTM) appliances
On larger, enterprise networks, multiple servers are typically used to manage the different functions and systems. It is important to ensure servers are not overwhelmed with too much traffic. You can use a load balancer to monitor the servers and distribute traffic so one server does not get overwhelmed.
Network layer load balancers work by reading the information in the packet headers of incoming traffic and using algorithms to determine the best flow of traffic. The following table describes the algorithms a load balancer can use.
Algorithm | Description |
---|---|
Round robin | The most basic algorithm. Using this algorithm, the servers handle network requests in sequential order. The load balancer does not monitor each server's current load, as it assumes the servers can handle each request in the same amount of time. |
Weighted round robin | This algorithm works the same as the round robin, but takes the server's power into consideration. A more powerful server is sent more traffic than less powerful servers. |
Least connections | The least connections algorithm looks at the active connections each server is handling and sends the network traffic to the server that currently has the lowest number of connections. This algorithm:
For example, if a request comes in that will take a long time to process, the load balancer can't take this into consideration. It might direct that traffic to the next server in line, but that server might already be dealing with another request. This can cause that server to get backed up and slow down the network. |
Weighted least connections | This algorithm distributes traffic based on the active connections and the processing power of each server. |
Source IP hash | This algorithm creates a hash key based on the source and destination IP addresses. The hash key is assigned to a server and all requests for the remainder of the active session are handled by that same server. |
A network layer load balancer makes decisions based solely on the data in the packet header which results in a lot of guesswork. This can lead to inefficient distribution of traffic between the servers.
An application layer load balancer can distribute traffic based on the content of network packets including the HTTP header, HTTP message, and the session cookies. The application layer load balancer also tracks the responses from the servers, so it can keep track of whether the session will continue or not. This allows the load balancer to make routing decisions based on data and not guess work.
The application layer load balancer most commonly uses the least pending request (LPR) algorithm. This algorithm monitors all pending requests and routes them to the most available server. This algorithm allows the load balancer to continue to monitor all server loads and instantly make adjustments in case there's a sudden surge of incoming connections.
Spam email can be extremely dangerous to the network as it can introduce malware and clog the network. You can use a spam gateway internet appliance to monitor incoming and outgoing emails to reduce the amount of spam affecting the network. The spam gateway can block incoming spam emails using these methods:
Comparing sender addresses to a blocklist. If the sender is on a blocklist, the email is blocked. The problem with using this method is that it is fairly easy to bypass the blocklist by spoofing (faking) the sender's email address.
Using email authentication technologies on the spam gateway. One of the more common technologies is Domain-based Message Authentication, Reporting, and Conformance (DMARC). DMARC combines the protections of both DomainKeys Identified Mail (DKIM) and Sender Policy Frameworks (SPF) to protect users from malicious emails. DMARC:
Verifies the email sender.
Tells the recipient what to do if neither authentication method passes.
Allows the recipient to tell the sender about messages that pass or fail DMARC authentication.
Checking embedded links in the email. If the link redirects to a malicious site, the email will be blocked.
Some spam gateways monitor outgoing emails to prevent spam emails from leaving the network. If spam emails come from the organization's domain, the domain can be added to other organizations' blocklists.
A proxy server is an internet appliance that you can implement on the network. The proxy server is typically configured to monitor all incoming and outgoing network traffic. It determines if the traffic is allowed or not. The network administrator can configure the proxy server to block specific categories of content, such as gambling websites. The proxy server also keeps internal users anonymous since all outgoing traffic shows as coming from the proxy server.
In many instances, the proxy server also caches information from sites on the internet. It works like this:
When a client computer requests an allowed website, it directs the traffic to the site and caches a copy of it.
When a second or subsequent request for that website is made, rather than go to the internet to get that site's information, the proxy server provides the cached content.
This eliminates repetitive requests and speeds up internet queries.
At configured intervals, the proxy server re-caches website information so the cache doesn't become stale.
The unified threat management (UTM) internet appliance combines multiple functions into a single device. The following table describes some of the appliances that the UTM can replace.
Internet Appliance | Description |
---|---|
Firewall | The firewall is responsible for monitoring and controlling all incoming and outgoing traffic. The firewall controls the flow of data based on rules that have been configured by the network administrator. |
Intrusion prevention system (IPS) | The intrusion prevention system monitors all network traffic looking for anything out of the ordinary. When malicious or suspicious packets are detected, the IPS blocks the packets and notifies the network security team so further action can be taken. |
Anti-malware | Many UTM appliances use anti-malware software to detect and prevent malware from infecting the network. |
Content filtering | Similar to the proxy server, the UTM can monitor HTTP requests and block unauthorized web sites. The rules are configured by the network administrator. |
The unified threat management appliance can provide other functions such as routing functions, VPN support, NAT, etc. More advanced UTM appliances can implement other appliances such as the load balancer, proxy server, spam gateway, etc.
Internet of Things (IoT) devices have become extremely commonplace. These devices are used to monitor and manage many areas in a home or enterprise environment. Integrating IoT devices into a network requires specific skills and knowledge.
This lesson covers the following topics:
IoT
IoT systems
IoT architecture
IoT communication protocols
IoT, also known as the Internet of Everything (IoE), is a system of connected computing devices and objects that use unique identifiers and send data over a network without requiring human interaction. Many industries use IoT to operate more efficiently and better serve customers.
IoT devices use built-in sensors to gather information and data from the surroundings. The gathered data is used to perform actions, such as turning on a device or triggering an alarm. Each IoT device must have a unique identifier (UID).
Key features of IoT are connectivity, sensors, artificial intelligence, small devices, and active engagement. IoT devices can be found in many places such as:
Homes and buildings - Thermostats, lighting systems, and security systems.
Health clinics and hospitals - Pacemakers, surgical equipment, and telemedicine.
Cities and municipalities - Water distribution, smart grids, and traffic management.
Agriculture - Health of animals; and humidity and composition of soil.
Manufacturing - Sensors and devices to increase production and manage quality control. This is known as Industrial Internet of Things (IIoT).
Vehicles - Sensors for vehicle-to-vehicle, vehicle-to-roadside, and vehicle-to-pedestrian communication.
Retail - Advertising and product monitoring.
Wearable devices - Smart watches and training bracelets.
IoT technology is comprised of four main systems that work together to make the communication between two endpoints possible. The following table describes each of these components:
Component | Description |
---|---|
Devices | IoT devices are built with sensors that capture data. These sensors can be included in cameras, GPS systems, temperature reading equipment, and heart monitoring equipment. |
Gateway system | In order to send data to the cloud, IoT devices need a connection. The gateway acts as the bridge between the device and the cloud. |
Data storage | Once the data reaches the cloud, it is processed and analyzed by software. Examples include the temperature reading is checked, trespassers are detected on the security camera video feed, and location is determined on a GPS device. |
Remote control | App notifications, emails, and text messages make the information gathered by the device available to the user. Action by the device can be started as follows:
|
With so many devices operating in one system that is connected with other processes, IoT needs a well-defined and effective architecture to function properly. To meet this requirement, the IoT has been structured into an architecture of layers. The following table describes each layer.
Layer | Description |
---|---|
Edge technology | The edge technology layer includes all the hardware parts in the IoT system such as sensors, RFID tags, readers, etc. This sensor hardware collects the data for the IoT device. |
Access gateway | The access gateway layer is where all the data gathered at the edge layer is collected and compressed to an optimal size for analysis. |
Internet | The internet layer is the main bridge between two endpoints in an IoT system. It connects devices to other devices, the cloud, the gateway, and backend data sharing. |
Middleware | The middleware layer includes the processes that happen in the cloud such as:
This layer acts as the interface between the hardware and application layers; that’s why it’s called the middleware layer. |
Application | The application layer is the top layer in the IoT architecture. Its primary responsibility is to deliver the analyzed and processed data to the end user. |
There are many communication protocols that IoT devices can use. The following table describes each communication protocol.
Communication Protocol | Description |
---|---|
Wi-Fi | Wi-Fi is very commonly implemented in wireless local area networking and allows many types of devices to communicate with each other. |
Bluetooth Low Energy (BLE) | Bluetooth Low Energy, also known as Bluetooth Smart, is a wireless, personal area network protocol. It supports low-power, long-use IoT needs. It can be used in such sectors as healthcare, security, entertainment, and fitness. |
Zigbee | Zigbee is one of the most common short-range IoT communication protocols. Zigbee has the following characteristics:
|
Z-Wave | Z-Wave is the other most common short range IoT communication protocol. Z-Wave has the following characteristics:
Many control hubs work with both Zigbee and Z-Wave. |
An embedded system is a complete computer system that is designed to perform a specific dedicated task. Examples include mobile phones, gaming consoles, household appliances, and even industrial machines. Because these devices have become so prevalent in our personal and professional lives, they have become prime targets for attackers.
This lesson covers the following topics:
Embedded systems
Industrial control systems
Security threats
Embedded systems have the following characteristics:
Are single-function devices.
Are static or sealed systems. This means the hardware cannot be swapped out.
Are reactive and make changes in real-time based on feedback from built-in sensors.
Must be controlled by a microprocessor, have memory, and contain components to connect external devices such as USB ports.
Use a real-time operating system (RTOS). This operating system handles processes in a deterministic manner. Key points regarding a RTOS are:
Different algorithms are used to determine the task that should be performed next.
Tasks are given individual priority by the program developer, so the RTOS knows the order to perform that tasks in.
RTOS systems allow for tasks to be processed with almost no latency. This is vitally important for many embedded devices to work properly.
The microprocessors used in embedded devices can be one of three types, as described in the following table.
Type | Description |
---|---|
Application-specific integrated circuit (ASIC) | The application-specific integrated circuit chip is created to perform a single function. ASIC chips:
|
System-on-chip (SoC) | A system-on-chip incorporates all components on the board, including:
|
Field-programmable gate array (FPGA) | A field-programmable gate array is physically setup like an ASIC or SoC, but the programming is configured by the end-user. ASIC and SoC chips have the instructions hard coded into them and cannot be changed. |
Industrial control systems (ICSs) handle the workflow and automation process for all sorts of machinery. These control systems are used in critical infrastructure such as power plants, manufacturing, hospitals, telecom systems, and more. The following table describes the components that comprise an ICS.
ICS Component | Description |
---|---|
Programmable logic controller (PLC) | A PLC is a specialized controller that can be programmed to perform specific tasks. Multiple PLCs can be combined and configured to work together to carry out complex tasks. |
Supervisory control and data acquisition (SCADA) | SCADA controllers can monitor and control PLC systems. They gather data and adjust the system based on the data acquired from sensors. |
Human-machine interface (HMI) | The HMI can be either a touch-screen control panel or software running on a computer system. The HMI allows the operator to make configuration changes in the system. |
Distributed control system (DCS) | A DCS is a customized all-in-one package that contains the needed PLCs, SCADA controller, and HMI. These are typically custom designed for specific needs. |
Modbus | Modbus is a special network protocol that controller systems use to communicate with each other. Modbus originally ran through a serial interface but has evolved to work over Ethernet and TCP/IP. |
All components of an ICS network are typically referred to as an operational technology (OT) network, in contrast to information technology (IT) networks that consist of a server and clients.
Embedded devices do have inherent vulnerabilities that network administrators and technicians should be aware of including:
The static environment means that the hardware and software components may not be known to the security administrator.
Support may not always be available, especially for custom designed components.
Updates are typically performed through a specific management interface.
Updates come only from the vendor. Little to no third-party support is available.
Embedded devices used in manufacturing and other automated systems are a vital part of the economy and infrastructure systems. These systems are a target for attackers. Extra steps should be taken to secure these systems. Recommendations are:
Personnel with administrative control over these devices should have the specialized knowledge and skills needed to manage them.
Only necessary services should be running on the controllers. All unneeded ports should be closed.
The systems should have the latest patches and updates.
Regular security audits and vulnerability assessments should be performed.
In addition to copper wires and fiber optic cables, networks can also transmit data using radio waves. This technology is called wireless networking (Wi-Fi).
This lesson covers the following topics:
Wireless communication
Wireless standards
Long-range wireless
Wireless networks send data through the air using radio waves. These radio waves are referred to as an unbounded medium because they are not encased in a sheath like a fiber optic cable or unshielded twisted pair (UTP) cables. This means that the wireless signal can reach areas that a wired network cannot.
Wireless networks use specific radio frequency ranges that are regulated by the Federal Communications Commission (FCC). The two most common frequencies used by wireless networks are the 2.4 GHZ and 5 GHz ranges.
2.4 GHz wireless signals are wider, but shorter. This means they can travel further, but transmit data at a slower rate.
5 GHz wireless signals are thinner, but taller. This means they do not travel as far, but can transmit data at a faster rate.
These wireless frequency ranges are considered unlicensed. This means that you do not need special permission to use them. It also means that other devices can also use these frequencies. If two devices using the same frequency are in the same area, the wireless signals will collide and the signals will be dropped.
To remedy this situation, you can adjust the channel on the wireless network. Changing the wireless channel will slightly adjust the frequency to avoid conflicts. Each channel is approximately 20 MHz wide. This means that many of the channels overlap slightly.
The 2.4 GHz range has three non-overlapping channels and the 5 GHz range has 24 non-overlapping channels.
Wireless networks are all defined by the IEEE 802.11 standards. These standards specify ways to increase bandwidth and reduce interference when transferring data using radio waves. The standards are all labeled with the 802.11 designation and letters designate the updated standard.
The following table describes the 802.11 standards.
Specification | 802.11a | 802.11b | 802.11g | 802.11n | 802.11ac (Wi-Fi 5) | 802.11ax (Wi-Fi 6) |
---|---|---|---|---|---|---|
Frequency | 5 GHz | 2.4 GHz | 2.4 GHz | 2.4 GHz or | 5 GHz | 2.4 GHz or 5 GHz |
Maximum speed | 54 Mbps | 11 Mbps | 54 Mbps | 600 Mbps | 3.46 Gbps | 14 Gbps |
Maximum distance | 100 ft. | 150 ft. | 150 ft. | 300 ft. | 300 ft. | 300 ft. |
Channels | 23 (12) | 11 (3) | 11 (3) | 2.4 GHz: | Depends on configuration | Depends on configuration |
Backwards compatibility | N/A | None | 802.11b | 802.11a/b/g, depending on implementation | 802.11b/g/n | 802.11b/g/n/ac |
The ability of newer devices to communicate with older devices depends on the capabilities of the transmit radios in the access point. For example, some 802.11n devices can transmit at either 2.4 GHz or 5 GHz. However, a single radio cannot transmit at both frequencies at the same time. A dual band access point can use one radio to transmit at one frequency, and a different radio to transmit at a different frequency.
All speeds and distances are theoretical and will typically be achieved only in an optimal environment.
Transmission speeds are affected by distance, obstructions (such as walls), and interference.
Maximum signal distance depends on several factors, including obstructions, antenna strength, and interference. For example, the actual distance for communications in a typical environment (with one or two walls) is roughly half of the maximum.
Because transmission speeds decrease with distance, either the maximum distance or the maximum speed can be achieved, but not both.
Newer 802.11 standards have added new technologies in order to increase potential bandwidth and transmission distance. The following table provides details for these technologies.
Technology | Details |
---|---|
Multiple-Input, Multiple-Output | MIMO increases bandwidth by using multiple antennas for both the transmitter and receiver.
|
Multi-User MIMO | MU-MIMO is an enhancement to MIMO that allows multiple users to use the same channel. |
Channel bonding | Channel bonding combines two, non-overlapping 20 MHz channels into a single 40 MHz channel. This results in slightly more than double the bandwidth.
|
A long-range wireless network is typically setup to connect two buildings together on the same network. Depending on the distance between the network locations, different solutions are available.
If the locations are only a short distance apart, you can install a high-end wireless access point with special antennas. These networks still use the unlicensed frequencies and appropriate 802.11 standard.
If the network locations are spread across a longer distance, special equipment is needed. These long-range networks also need special permission to use a licensed frequency range such as 900 MHz or 3.65 GHz.
Regardless of the range, some wireless access points allow the power to be increased. Increasing the power allows the access point to transmit a longer distance, but can lead to overheating and instability.
Always follow FCC guidance and requirements if increasing the power as this can cause interference with other wireless devices in the area.
Wireless networks are everywhere. When a user connects to a wireless network, the expectation is that the connection is secure and the data is protected. Because the wireless signal is an unbounded medium, anyone can intercept the data if it is not properly secured.
This lesson covers the following topics:
Authentication protocols
Encryption protocols
Additional wireless security measures
A user must first be authenticated before connecting to the wireless network. Authentication is the process of proving the user's identity and proving that the user is allowed to be on the network. The following table describes some authentication methods.
Access Method | Description |
---|---|
Pre-shared key | This is probably the most commonly used access method. A pre-shared key is a passphrase a user enters to access the wireless network. |
Wi-Fi Protected Setup | Wi-Fi Protected Setup works only on a network that uses a PSK and an appropriate encryption protocol, such as Wi-Fi Protected Access 2 (WPA2) or Wi-Fi Protected Access 3 (WPA3). WPS allows a device to securely connect to a wireless network without entering the PSK. To connect to a device:
Some devices and access points can also use NFC during the WPS process to connect to each other. |
Open network | An open network has no authentication. It allows anyone to connect to the network. This access method should be used only in public places that want to offer free wireless access. |
Captive portal | Many open networks implement a captive portal.
|
802.1x | Enterprise level networks need a high level of security. Many enterprise networks use the 802.1x protocol to authenticate users to the wireless network.
802.1x implementations on wireless networks often use Remote Authentication Dial-In Service (RADIUS). RADIUS was developed in 1991. It was originally used to authenticate users to the remote network over a dial-up network. RADIUS is known as a triple-A protocol. This means it provides authentication, authorization, and accounting management.
|
Enabling the proper encryption protocol is perhaps the most important security setting for a wireless network. For most users, WPA2 or WPA3 will be the best option. The following table explains these two protocols:
Cryptographic Protocol | Description |
---|---|
WPA2 | WPA2 is the implementation name for wireless security that adheres to the 802.11i specifications. It was introduced in 2004 and is still heavily used in today's networks. There are two version of WPA2 available:
|
WPA3 | WPA3 was introduced in 2018 to address the vulnerabilities inherent in the WPA2 handshake and to support newer technologies. Instead of using the pre-shared key, WPA3 implements the Simultaneous Authentication of Equals (SAE) standard.
|
Additional security measures you can implement on all wireless networks include:
Change the default username and password for the wireless access point.
The default username and passwords for many wireless access points are readily available on the internet.
A potential attacker will typically attempt to use these credentials first.
Disabling the SSID broadcast will help hide the network from the casual observer. A potential attacker can still easily discover the SSID, but disabling the SSID broadcast creates an extra step.
Enable MAC address filtering.
This setting allows access only to devices with the specified MAC addresses.
A potential attacker is still able to intercept the signal and identify the MAC address of an allowed device and then spoof that MAC address to gain access. However, enabling MAC address filtering creates an additional barrier for the attacker.
Update the wireless access point firmware. As security threats become known, manufacturers often release fixes to address known issues to prevent attacks.
Enable and properly configure the firewall. The firewall will help in stopping an attacker from gaining access through open ports.
While there is no one definitive method to secure a wireless network, implementing multiple security measures make it more difficult for an attacker to gain access.
When configuring a wireless network, it is imperative to properly secure all data. This means ensuring that only authenticated users can access the network and that all data is encrypted using the appropriate algorithms.
This lesson covers the following topics:
Encryption algorithms
Authentication protocols
Wireless networks today use either the WPA2 or WPA3 security standards along with an appropriate encryption algorithm. The following table describes two encryption algorithms.
Encryption Algorithm | Description |
---|---|
Temporal Key Integrity Protocol | TKIP was used with the WPA and WPA2 wireless security standards. TKIP was developed to address the security flaws that were prevalent in the Wired Equivalent Privacy (WEP) wireless security standard.
TKIP is known to have vulnerabilities and is no longer considered secure and should not be used on modern wireless networks. |
Advanced Encryption Standard (AES) | AES is based on the Rijndael algorithm.
|
You should implement authentication protocols to ensure that only authorized users can access the wireless network. The following table describes common authentication protocols.
Authentication Protocol | Description |
---|---|
Remote Authentication Dial-In Service (RADIUS) | RADIUS is an open standard protocol used to authenticate users onto a network. RADIUS:
|
Terminal Access Controller Access-Control System (TACACS+) | TACACS+ was developed by Cisco to address security concerns in RADIUS. TACACS+:
|
Kerberos | Kerberos was developed at MIT and is a key component of Windows Active Directory. Kerberos has three main components:
When a user attempts to login to the network, the following process occurs:
Using tickets, Kerberos allows clients and servers to authenticate with each other seamlessly throughout the network. |
RADIUS and TACACS+ are both considered AAA protocols. AAA means the protocol provides:
Authentication: proves the user's identity.
Authorization: defines what the user can access.
Accounting: logs what the user accessed while on the network.
Kerberos provides only authentication, not authorization and accounting.
Wi-Fi communication may be the most common wireless communication technology, but it isn't the only one. There are several other wireless communication technologies. Many of these wireless communication technologies use short range communication between devices.
This lesson covers the following topics:
Bluetooth
Radio Frequency Identification (RFID)
Near Field Communication (NFC)
Bluetooth is designed to allow devices to communicate within a personal area network (PAN) of close proximity. PAN devices include cell phones, personal digital assistants (PDAs), printers, mice, and keyboards. Bluetooth:
Is designed for longer distances than infrared (IR) and has lower power consumption.
Requires that devices are in discovery mode to find each and synchronize.
Operates in the 2.4 GHz range and uses adaptive frequency hopping (AFH).
By using AFH, Bluetooth can automatically detect other devices in the area and avoid the frequencies used by those devices.
It can switch between 79 channels to avoid interference.
Uses a 128-bit proprietary encryption mechanism to encrypt signals.
The range of a Bluetooth is determined by its class:
Class 1 devices can transmit up to 100 meters.
Class 2 devices can transmit up to 10 meters.
Class 3 devices transmit at a range less than 10 meters.
There have been a few versions of Bluetooth released over the years. Each new version introduces features to increase the speed, distance, and usage of devices as shown in the following table.
Bluetooth Version | Features |
---|---|
1.0 | Operates at a range of 10 meters and speeds up to 1 Mbps. |
2.0 | Operates at a range up to 30 meters and speeds up to 1 Mbps. A special mode called Enhanced Data Rate (EDR) enables transfer rates up to 3 Mbps. |
3.0 | Operates at a range up to 30 meters and speeds up to 1 Mbps. A special mode known as High Speed (HS) allows the Bluetooth device to use a nearby 802.11 link to achieve speeds up to 24 Mbps. |
4.0 | Operates at a range up to 60 meters and speeds up to 1 Mbps (24 Mbps when using High Speed mode).
|
5.0 | Operates at a range up to 240 meters and speeds up to 2 Mbps (48 Mbps when using High Speed mode).
|
The process of connecting two Bluetooth devices is called pairing. Bluetooth uses a typical client/server relationship between two devices.
The client (peripheral) device connects to the server (central) device.
For example, headphones (client) connect to a phone (server).
To connect two devices:
The client device is put in discoverable mode. This means that other nearby Bluetooth devices can see the device.
The server device sees the client device and sends a pairing request to begin the pairing process.
A security passkey is exchanged between the two devices to confirm the correct devices are being paired. The passkey can be pre-programmed or manually created depending on the devices being paired.
If the passkey matches, the two devices are paired.
Once paired, the devices remember each other and automatically connect in the future. The pairing process does not need to repeat.
Bluetooth devices use a protocol called Object Exchange (OBEX) to perform the pairing process and exchange data.
RFID uses radio waves to transmit data from small circuit boards called RFID tags to special scanners. There are two types of RFID tags:
Active RFID tags have on-board batteries and can send signals over a long distance. Toll passes in vehicles use active RFID.
Passive RFID are not powered and rely on the energy transferred by the scanner to transmit data. ID badges, credit cards, and similar devices use these tags.
RFID systems are vulnerable to various kinds of attacks, including:
Eavesdropping—An attacker uses an RFID reader to listen to conversations between a tag and the intended reader.
On-path attack—An attacker intercepts a signal from an RFID tag and manipulates the signal before sending it to the intended recipient. This kind of attack is frequently used to take down a system.
Denial of service—An attacker blocks radio signals or jams the system with interfering noise.
Cloning and spoofing—An attacker creates a copy of an existing tag, then uses the fake tag to gain access to a secure system.
To protect against these attacks, RFID chips often operate at different frequencies. This makes it more difficult for an attacker to find and scan them.
NFC is a newer technology that is built on RFID. NFC allows two-way communication between two devices that are within 2 inches of each other.
NFC operates in the 13.56 MHz frequency. It has a maximum transmission speed of 424 Kbps.
Special chips called NFC chips can send, receive, and store data.
Devices using NFC operate in one of three modes:
Reader/writer mode is used to read information stored on an NFC chip.
Peer-to-Peer mode enables two devices to communicate and exchange information.
Card Emulation mode enables the device to function as a smart card to perform contactless payment or ticketing. This mode is typically used by smart phones.
Data transmissions can be secured by using encryption algorithms.
Many networks today fall into the category of a small office/home office (SOHO) network. A SOHO network is a smaller network that does not use servers to manage network resources or enterprise level switches to connect devices. Most wireless networks used in homes are considered SOHO networks.
This lesson covers the following topics:
SOHO wireless router
Wireless router configuration
Wireless network configuration
Typically, a SOHO network consists of a single router connected to the internet. These wireless routers are often all-in-one devices that contain the following functions:
Router – Connects the internal network to the internet.
Switch – Connects internal devices together using RJ-45 connections.
Wireless access point – Provides access to the wireless connection.
Modem – If the ISP supplies the wireless router, the modem functions are built into the wireless router.
When choosing a wireless router, consider the following:
Appropriate 802.11 standard – The router should support the same standard as the client devices. The 802.11 standard also determines the transfer rate of connected devices.
Transmit power – The router should be powerful enough to transmit to all needed areas in the building. Wireless extenders might also be needed for larger areas.
Special features – Many wireless routers have additional features that are designed to improve performance. These features are typically unique to each manufacturer.
Before you can configure the wireless network, perform the following initial steps to configure the wireless router.
Wireless Router Configuration | Description |
---|---|
Change default username and password | Wireless routers are shipped with a default username and password. This default login information is readily available on the internet, so change it before you do anything else. Always use a strong password. You cannot change the default username on all routers, but you can always change the password. |
Update firmware | Often a firmware update is available, even for new routers. Firmware updates address bugs, security vulnerabilities, and may add new features. Always keep the firmware up to date. |
Physically place the router | When physically placing the wireless router, ensure that all areas have needed coverage. Each building is unique and placement depends on a variety of factors including size, building materials, and other wireless devices that might cause conflicts. Anyone with physical access to the router can make configuration changes and gain access to the network. To prevent this, limit physical access to the router. For example, place the router and other networking equipment in a locked closet. |
The first step in configuring the wireless network is to connect the wireless router to the internet modem. The modem connects to the router port that is typically labeled Internet or WAN. Once the router is physically connected, configure it to connect to the internet. The configuration options depend on the type of internet service. Typical options include:
DHCP – This is the most common configuration option. Using DHCP, the router contacts the ISP to obtain the connection information including the IP address, subnet mask, and DNS server.
Static – Some internet providers provide users with a static configuration. This means that you must manually configure the IP address, subnet mask, and DNS server.
Point-to-Point Protocol over Ethernet (PPPoE) – PPPoE is a protocol typically used by DSL providers that allows them to regulate internet access using username and password authentication.
Once you configure the internet connection, you can configure the wireless network. The following table describes many of the settings that you might have to configure.
Wireless Network Configuration | Description |
---|---|
Service Set Identifier (SSID) | The SSID is the unique name for the wireless network. Wireless routers have a default SSID that should be changed. Keep the following in mind when setting the SSID:
SSID suppression (cloaking) disables the SSID broadcast. With broadcasting disabled, the user must manually enter the SSID for a device to connect to the network. This means the SSID doesn't display in the list of available networks). Even with the broadcast disabled, it's relatively easy to identify the SSID of a network by using readily available applications. Because of this, SSID suppression should not be the only form of protection. |
Configure the wireless protocol | Many access points support multiple wireless protocols. Configure the wireless router to use only the protocols needed for devices on the network. When using mixed mode (more than one protocol), most access points throttle all clients to the slowest protocol speeds being used. |
Configure the wireless channel | The channel identifies the portion of the wireless frequency the access point and connected devices use.
|
Authentication and encryption | Authentication allows only authorized devices to connect. Encryption protects wireless communications from eavesdropping.
|
Disable guest access | Guest access allows anyone to access the network connection, but be sure to configure it to restrict access to the internal network. Disable guest access unless the wireless network is configured for public access. |
Network Address Translation (NAT) | Small networks use a single public IP address to connect to the internet. All devices on the private network share this IP address. Network address translation (NAT) is a protocol that allows multiple computers to share a single public IP address on the internet.
|
Security settings | Security settings you might need to configure include:
|
Universal Plug and Play (UPnP) | UPnP allows devices like printers, webcams, gaming consoles, and similar devices to discover devices and automatically connect.
|
Quality of Service (QoS) | Most SOHO routers provide basic QoS functionality. When enabled, QoS prioritizes certain network communications over others. For example, VoIP network traffic is given higher priority and more bandwidth than HTTP (web browser) traffic. |
Wi-Fi Protected Setup (WPS) | The WPS security protocol makes it easier for WPS-enabled devices (e.g., a wireless printer) to connect to the wireless network.
|
Every network is unique and requires a different configuration. You will not use the same options for every network.
This lesson covers network location profiles.
The Windows operating system uses network location profiles to determine the security settings for a particular network connection.
The following table describes each network location profile and the situations in which you should select them.
Location | Description |
---|---|
Private network | The Private network location is for use on networks where all other users and devices are known and trusted. With the Private network location:
This is the least secure network and should be used only on trusted networks. |
Public network | The Public network location is for use on unknown or public networks (e.g., a coffee shop or other public Wi-Fi network). With the Public network location:
The Public network profile should be used when connecting to any unknown network location, such as a hotel's Wi-Fi network. |
Domain network | The Domain network profile is automatically selected when the device is a member of an Active Directory domain. The network administrator configures these network settings and applies them to the local machine. |
In order to understand and troubleshoot networks, an IT technician must have knowledge of network components.
This lesson covers the following topics:
Network hardware
Power over Ethernet (PoE)
Software-defined networking (SDN)
A network is made of many components. The following table describes some of these components.
Network Component | Description |
---|---|
Wireless access | The wireless access point provides access to a wireless network. |
Patch panel | All network ports in a building terminate at a patch panel.
|
Router | The router is an advanced networking device that connects two networks together. When network traffic needs to leave the internal network, it is sent to the router and then forwarded onto its destination. All external traffic flows through the router. |
Hub | A hub uses Ethernet cables to connect client devices together.
|
Switch | A switch also connects client devices together using Ethernet cables. However, switches send data packets only to the intended recipient.
There are two types of switches available:
|
Virtual local area network (VLAN) | A VLAN is a virtual network that is created on a switch by assigning specific ports to be a part of a broadcast domain. This allows a large network to be separated into multiple smaller networks which can increase the efficiency and security of the network. |
Firewall | The firewall is responsible for monitoring all incoming and outgoing network traffic. The firewall blocks or allows the traffic based on the configuration. A firewall can be configured to block data based on the port, type of traffic, or even the content in the data packet. |
Many devices connected to a network are installed in locations where power is not easily accessible. An example is a wireless access point installed in the ceiling. To remedy this, many devices can be powered by the Ethernet cable. This is known as Power over Ethernet.
Ethernet cables consist of eight wires grouped into four pairs. Typically, only four wires are used to transmit data. PoE uses the wires to transmit data along with power using one of three modes:
Mode A—uses the same four wires to transmit data and power.
Mode B—uses the four unused wires to transmit power.
4-Pair—uses all eight wires to transmit data and power.
There are four PoE standards classified under the IEEE 802.3 standard. The following table describes each of the 802.3 standards.
Standard | Type | Name | Power Mode | Maximum Power | Minimum Power | Device Types |
---|---|---|---|---|---|---|
802.3af | Type 1 | Standard PoE | A or B | 15.4 watts | 12.95 watts | VoIP Phones, sensors, low powered devices |
802.3at | Type 2 | PoE+ | A or B | 30 watts | 25 watts | Biometric sensors, tablets |
802.3bt | Type 3 | PoE++ | A, B, or 4-Pair | 60 watts | 51 watts | Videoconferencing equipment |
802.3bt | Type 4 | Higher-power PoE | 4-Pair only | 100 watts | 71 watts | Laptops, TVs, high power devices |
To power devices, both the device and the switch must support PoE. It is important to know the total maximum power output on the switch. If you connect too many PoE devices, the switch will not be able to provide the necessary power.
Not all switches support PoE. If a device requires power over the Ethernet cable, but the switch does not support PoE, you can use a PoE injector.
The PoE injector plugs into a power outlet and has two Ethernet ports.
One Ethernet port plugs into the switch to transmit data and passes the data to the other Ethernet port which connects to the device.
The port connected to the device provides both data and power to the device.
There are two types of PoE injectors:
Active—conforms to the 802.3 standards. If the PoE active injector does not receive the proper signals during the initial handshake, the injector will not provide power to the device. This is to protect the device from getting the incorrect power which could damage the device.
Passive—does not conform to the 802.3 standards. The passive injector provides power to the connected device without any power confirmation. This can lead to too much power being provided and may cause permanent damage to the connected device.
In a typical enterprise network, the network administrator must go to individual devices to make configuration changes. This process is not always the most efficient, especially in a large network that consists of hundreds of devices. To help with this, you can use software-defined networking.
Software-defined networking consists of a specialized controller that allows remote management of all network devices. The network administrator monitors network traffic, making immediate updates and configuration changes as needed. As networks become more advanced and implement many types of devices, using a SDN controller makes network management easier and more efficient.
Internet connections are made from the client's (user's) location to an internet service provider (ISP). The ISP might be the cable TV company, the phone company, or another company that offers internet access. Internet requests are sent to the ISP, who forwards the request to the internet.
This lesson covers the following topics:
Internet speeds
Internet connections
ISPs advertise two internet speeds:
Download—how fast data (e.g., web page, file download) can be retrieved from a remote source.
Upload—how fast data can be sent to a remote source (e.g., sending a file to a remote server).
Internet speeds are measured in bits; data size is measured in bytes. To determine the data transfer rate, divide the internet speed by eight. For example, an internet speed of 100 megabits per second (Mbps) translates to a data transfer rate of approximately 12.5 megabytes per second (100/8 = 12.5).
There are options available for internet connections. The following table describes each of these options.
Internet Connection | Description |
---|---|
Cable | A cable TV company uses the existing coaxial cable infrastructure to provide cable internet.
|
Digital subscriber line (DSL) | DSL provides broadband digital data transmission over existing telephone lines.
|
Fiber | Fiber optic internet is one of the faster options available because it uses light to transfer data.
|
Satellite | Satellite networking uses radio signals sent and received from a satellite. Satellite internet can be accessed anywhere as long as there’s a clear line of sight to the sky. This makes satellite internet great for remote locations that have no other internet options.
A low earth orbit satellite:
|
Cellular | Cellular networking uses the cellular phone infrastructure for internet access.
Cellular networks used for voice and data include the following types:
|
Wireless internet service provider (WISP) | WISP is similar to satellite internet. However, instead of antennas directed to a satellite in orbit, they are pointed at a large antenna on land. The antennas use radio signals (typically microwaves) to transmit and receive data.
|
This lesson covers command line network utilities.
Using command line tools can make troubleshooting network issues easier. You run command line utilities from a command line interface, not the graphical user interface (GUI). You can also include command line utilities in scripts to automate common tasks.
The following table describes many of the command line utilities you can use when troubleshooting networking issues.
Command Line Utility | Description |
---|---|
ipconfig (Windows) | The ipconfig command displays the device's current IP configuration information for each network adapter. Use the ipconfig command as follows:
|
ip (Linux) | The ip command in Linux replaces the ifconfig command. ip is a very powerful command line utility that you can use to manage IP configurations, network interface controllers, and routing rules.
For example, to view a network adapter's IP configuration, use the following command.
|
ip addr | Displays the current networking information.
|
ifconfig | ifconfig is used on Linux and macOS systems and displays the installed network interfaces and the current configuration settings for each interface, including the MAC address, IP address, broadcast address, and subnet address. Use the ifconfig command as follows:
Use the following utilities to display additional networking information not provided by ifconfig:
On Linux systems, the iwconfig command is used to display information about wireless network interfaces. |
ifdown interface | Stops a network interface. ifdown ens192 |
ifup interface | Starts a network interface. ifup ens192 |
ip link set interface down | Stops and starts the specified interface. Examples: ip link set ens32 down |
hostname (Windows and Linux) | The hostname command in Windows displays the current device's name.
You can also use the hostname command to temporarily or permanently change the device's hostname. |
ping (Windows and Linux) | You can use the ping command to test connectivity between two devices. Ping sends an ICMP echo request/reply packet to a remote host. A response from the remote host indicates that both hosts are correctly configured and a connection exists between them.
You can use the following switches with ping in Windows:
You can use the following switches with ping in Linux:
|
tracert (Windows)/ | tracert is similar to the ping utility because it tests connectivity between devices; tracert also shows the path between the two devices.
|
pathping (Windows) | The pathping utility performs the same function as tracert, but also shows information such as the network latency and packet loss for each hop. |
netstat | You can use netstat in both Windows and Linux to display the following information.
|
nslookup (Windows)/ | nslookup or dig resolves (looks up) the IP address of a specified hostname. It also displays additional name resolution information, such as the DNS server used for the lookup request. |
net (Windows) | You can use the net utility in Windows to manage and modify almost any aspect of the network. You use the net utility in conjunction with a second command. Two commands commonly used with the net utility are:
|
Troubleshooting network connectivity issues is a common task for IT technicians. Networks are prevalent and organizations rely on them to perform daily tasks. If the network is experiencing issues, the IT technician must troubleshoot and correct the issues immediately.
This lesson covers the following topics:
Common network issues
Wireless network troubleshooting
Voice over IP troubleshooting
The network administrator uses the network baseline to determine if the network is performing as it should. It can also help identify potential problems. A network baseline performed after network setup should indicate the optimal performance of the network. A network baseline includes information such as:
Network activity
Connected devices
Network resources
Regardless of the issues users are experiencing, perform the following tasks first when troubleshooting a networking issue.
Verify that the network cable is plugged into the computer, wall jack, and network switch.
Use a cable tester to verify the network cable is functioning properly.
Check the link activity light on the network adapter and the network switch.
Confirm that all network equipment such as servers, routers, and switches are powered on and operating properly.
The following table describes common network issues and steps to troubleshoot them:
Network Issue | Troubleshooting Steps |
---|---|
Slow speeds | When troubleshooting slow speeds, determine what is running slow. If a specific resource is experiencing slow speeds, direct your troubleshooting efforts at that resource. If all network speeds are running slow, then check the following.
|
High latency | Latency is the amount of time it takes to send a network request and receive a response back. High latency results in a delayed response and can cause issues with different network services.
|
Limited connectivity | Limited network connectivity indicates that a particular network resource cannot be accessed. When troubleshooting a limited network connectivity issue, start with the local device and work to other devices until you find the problem.
An improper IP configuration can lead to limited network connectivity. Use the ipconfig utility to see the current IP configuration. Verify that all settings are valid for the network.
DNS issues will often lead to limited network connectivity.
|
Wireless networks transmit data using radio waves, which makes them susceptible to external interference. Another device in the area transmitting at the same radio frequency can cause interference and disrupt the wireless network.
Changing the channel of the wireless network usually fixes the problem.
Relocating the external device or wireless access point may help alleviate interference.
A weak signal strength can also slow wireless speeds.
Performing a site survey can help determine if there are weak spots in the wireless network.
Moving the wireless access point or adding a network extender can increase the signal strength.
Voice over IP (VoIP) sends voice data over the IP network. The following table describes the main issues that can affect the quality of a VoIP network and how to troubleshoot them:
VoIP Issue | Troubleshooting Steps |
---|---|
Quality of Service (QoS) | Quality of Service (QoS) assigns priority to different types of network traffic.
|
High latency | Latency is the amount of time it takes to send a network request and receive a response back.
|
Jitter | Jitter is the variation in the latency of VoIP packets. The goal is to have a steady stream of data packets during a VoIP call.
Common causes of jitter include:
|