Chapter 1
EXAM OBJECTIVES
Identifying network types
Understanding network topologies
Working with network cables
Becoming familiar with network architectures
Accessing the network
Installing a Small Office/Home Office (SOHO) Network
The A+ Certification Exams cover two areas of networking: networking theory/networking hardware and networking at the operating system (OS) level. This chapter focuses on the networking theory and the networking hardware area of the A+ Exams. For the exams, you are required to know popular terms and features of networking environments that you will encounter on the exams and in the real world — which is what this chapter will help you with. Networking at the OS level is covered in Chapter 3 of this minibook.
A network is a group of connected systems for sharing data or devices. This section provides an overview of the two major types of networks: peer-to-peer and server-based (client-server). I discuss the advantages and disadvantages of each type as well as how to implement them.
In a peer-to-peer (P2P) network, all systems connected to the network can act as clients or servers. A client is a system that makes a request for a resource or service on the network; a server is the system providing the resource or service. In this type of networking environment, all systems are considered equal because they can all play the same roles on the network — either as client or server or as both client and server. The recommended number of systems in a P2P network usually involves ten or fewer systems because of the lack of centralized administration. As a network administrator working in a P2P environment, you will constantly run from machine to machine to perform administrative tasks. Typically, a P2P network involves each system running a desktop operating system, such as Windows 8.1 to provide network functionality (see Figure 1-1).
In Figure 1-1, notice that client A provides a network resource — a printer — as does client D. This shows that client A is acting as both a server and a client, which is the purpose of a P2P network.
Because a central machine doesn’t store files in a P2P network, your networking environment isn’t based on the centralized administration approach. With centralized administration, you (as network administrator) could perform network administration tasks for the entire network from one place. Looking back to Figure 1-1, you can see that because all four computers act as peer servers (meaning they all act as servers to one another), you need to do the administration on all four computers — a major disadvantage of P2P networking.
Some examples of the administration you must perform on each system are creating user accounts on each computer and managing file and folder sharing from each system. In Figure 1-1, for example, if you want Bob to log on to client A, you would create the Bob account on client A. At the same time, if you want Sue to log on to client B, you would create the Sue account on client B. Because the Bob account doesn’t exist on client B, Bob can’t log on to that computer even though he might be able to access the files on client B from client A. This leads to a distributed administration model because your work is spread across multiple machines.
The major advantage of P2P networking is that you save money by not needing to purchase a central server, which can cost thousands of dollars in hardware and software. Too, with a P2P network, you also don’t have to purchase a separate network operating system (NOS). A NOS, required on a server-based network (discussed in the next section), is designed for networking services (such as Dynamic Host Configuration Protocol [DHCP], web, file, and print services) and allows the server to share its files and printers with clients on the network. The cost of the NOS, and the licenses to have clients connect to the server, is where a number of large companies spend most of their IT budget. Licensing is expensive!
Server-based networking, also known as client-server networking, is the networking model that most companies usually choose for ten or more workstations on a network. Unlike a P2P network, server-based networking uses a central machine (the server) that delivers network services to the workstations. Once again, these network services could be services such as file and print sharing, user account authentication, or web services.
The benefit of a client-server configuration is that you can leverage centralized administration by performing the bulk of your work on the one server. For example, if you need to create user accounts for each of the ten users, you create the ten accounts on the one server. Compare that with a P2P network, where one account is created on each system. As the administrator of this network, you create all shared directories on the server along with user accounts so that the server may verify the credentials of a client who attempts to log on to the network. All users on the network connect to this server to save and retrieve files.
Tighter security is another benefit of using a server-based networking model. Creating a more secure environment is easier with a server-based network because your resources and user accounts are not spread across multiple machines. Looking at Figure 1-2, you can focus on the server because it contains the files, folders, and user accounts. When a user logs on to the network, the logon request is sent to the server, which verifies that the username and password are valid. After a user is logged on, the server allows the user access to resources, such as files and printers, that the user has permission to use. Figure 1-2 illustrates a server-based networking environment.
Notice in Figure 1-2 that the client systems connect to the server to access the printer. In this environment, all systems have a defined role: They are either a client or a server — but not both.
The disadvantage of using a server-based environment is the cost of purchasing the server hardware and the NOS. When designing your networking model, make sure that you work with someone familiar with software licensing so you get the best bang for your buck!
When creating a network, you can install servers that provide a number of different types of functionality to the network. Following is a list of the common types of server roles that exist on networks today:
www.gleneclarke.com
to its IP address.Servers are not the only types of devices that are found on networks. Networks may also contain a number of appliance devices that provide different functionality to the network. The following is a list of common appliances, or devices, connected to the network:
Another set of terms you will hear when talking with other IT professionals about network concepts is local area network (LAN) and wide area network (WAN). The following outlines common networking terms you should understand when preparing for the A+ Exams:
When building a network, be cognizant of some upfront decisions regarding the overall network setup. Building a network is like building a database: You have to understand the theory before you start the hands-on work.
Topology refers in a general sense to layout; similarly, a network topology defines the layout of the network. The three basic network topologies are bus, star, and ring. The following sections discuss the different network topologies and their characteristics.
A bus topology uses a main wire (or trunk) to connect all network devices so that they can communicate with one another. The main trunk is fairly cheap to install but expensive to maintain. Figure 1-3 shows a diagram of a bus topology; notice that all systems are connected to a main cable.
When a workstation sends data to another workstation in a bus topology, data (in the form of an electrical signal) is delivered across the full length of the trunk. Each workstation looks at all data that runs along the trunk. If the data is destined for a particular workstation, that workstation copies the data to the memory on its network adapter.
For example, Figure 1-3 shows what happens when client A sends information to client B.
Note that because client B has made a copy of the data, the data is still on the wire. The data continues on the wire past the server and hits the terminator at the end of the trunk segment.
A terminator is a device that absorbs the electrical signal when it reaches the end of the network trunk. If there were no terminator at the end of the cable, the signal would bounce back in the other direction and collide with any new data being placed on the wire. So, to prevent this collision, the terminator grabs any signals that hit it and ensures that it is absorbed off the wire.
One of the most popular types of network topologies today is the star topology. A star topology, shown in Figure 1-4, involves a central component, called a hub (older networks) or a switch (today’s networks), which connects all systems and is used to send the electrical signal to all connected systems.
With the star topology shown in Figure 1-4, if client A sends information to client D, the information first travels from client A to the hub. The hub sends the information through each port on the hub: as a result, reaching each workstation connected to the hub. Each workstation is responsible for determining whether it is the data’s intended destination. When client D receives the data, it checks the destination address of the packet, identifies itself as the recipient of the data, and then copies the data to the network adapter’s memory. If the data is not destined for the client, the client simply discards the packet.
Today’s networks use switches instead of hubs. Here’s an example of how a switch works. When client A sends data to client D, the information first travels from client A to the switch and then the switch forwards the information only to the port that client D resides on. The information does not get sent to all the clients connected to the switch, like what a hub does. This data path offers performance benefits and also security benefits. Find more on hubs and switches later in the “Working with Network Devices” section of this chapter.
One of the major benefits of using a star topology is that if a cable breaks, it doesn’t take down the entire network like it would with a bus topology; only the workstation connected to the broken cable is affected. If a hub device breaks, however, the entire network fails. In all fairness, though, the cost to implement a star topology might be a little more than a bus topology because of the price of the hub or switch device used.
A mesh topology is a network topology that involves each system having a connection to every other system on the network. This is very costly because you need enough equipment such as network cables and network cards to connect all systems to one another. The benefit of a mesh topology is that you have multiple pathways to send data to any system on the network. This is a way to add fault tolerance to the communication system.
A hybrid topology is a mixture of two or all of the three basic topologies. For example, you could use a bus topology as a main trunk, connect hubs to the main trunk, and then connect the systems to the hubs. Figure 1-5 shows an example of this type of hybrid topology.
To be more accurate, the configuration shown in Figure 1-5 could be called a star-bus topology — a star topology mixed with a bus topology. Today, the most popular topology in use is the star topology — or maybe even a hybrid topology using a star-bus layout.
Today’s networks allow more mobility for network clients by supporting wireless technologies. To implement a wireless solution, you build a wireless network that uses a wireless topology. A wireless topology typically involves a wired network with wireless clients connecting to the wired network through a wireless access point (WAP), which is a device that sends and receives signals to a wireless client via radio waves (shown in Figure 1-6).
Notice in Figure 1-6 that the wireless client sends data to the WAP, which has a connection to the wired network. The WAP sends the wireless data to the destination system by sending the signal through the wired media.
After choosing your network topology, it is time to connect all the network devices together, which means deciding the type of cabling to use. The following sections discuss and evaluate the different types of cabling available for standard networks.
Twisted pair cabling, which is inexpensive and easy to use, is one of the most popular types of cabling used. It gets its name from the fact that it contains four pairs of wires twisted around each other inside the cable’s outer jacket, the outer covering of the cabling shown in Figures 1-7 and 1-8. Twisted pair cabling comes in two variants — unshielded twisted pair (UTP) and shielded twisted pair (STP) — shown in Figure 1-7 and Figure 1-8, respectively.
The only difference between UTP and STP is that STP cabling has an extra layer of insulation, which helps prevent interference from outside devices or cabling. Such interference can distort the data traveling along the cable length.
UTP comes in a number of different flavors, called grades or categories. Table 1-1 lists the categories of UTP cabling, as well as their purpose and speed.
TABLE 1-1 UTP Category
Category |
Purpose |
Speed |
Category 1 (CAT1) |
Voice only | |
Category 2 (CAT2) |
Data |
4 Mbps |
Category 3 (CAT3) |
Data |
10 Mbps |
Category 4 (CAT4) |
Data |
16 Mbps |
Category 5 (CAT5) |
Data |
100 Mbps |
Category 5e (CAT5e) |
Data |
1 Gbps |
Category 6 (CAT6) |
Data |
10 Gbps |
Category 6e (CAT6e) |
Data |
10 Gbps |
Category 7 (CAT7) |
Data |
10 Gbps |
Because twisted pair cabling does not have the layers of shielding found in other forms of cabling, the data is pretty much unreadable — or the integrity of the data is questionable — after 100 meters. For this reason, twisted pair cabling has a maximum length of 100 meters.
Twisted pair cabling uses a special type of connector to connect the cable to the system or network devices. This connector is similar to those used to connect a telephone to a telephone jack. Network devices that use twisted pair cabling use the RJ-45 connector, and telephones use the RJ-11 connector. Figure 1-9 shows both.
When looking at UTP cabling, two common standards have been defined that dictate the order of the wires within the UTP cable. The two common standards for twisted pair cabling are T568A and T568B. Each of these standards defines the order of the eight wires within the cable and has been developed to give the best-quality transmission.
The order of the wires within the RJ-45 connector when following the 568A standard are as follows (wire 1 is on the left side):
The order of the wires within the RJ-45 connector when following the 568B standard are as follows (wire 1 is on the left side):
Note that to create a straight-through cable you wire both ends using the same standard, while to create a crossover cable (used to connect two devices directly together without using a switch) you wire one end as 568A and the other end as 568B. This is essentially changing the transmit and receive wires so that the two stations can talk directly. The reason to choosing 568A or 568B is strictly to help define whether you are creating a straight-through or crossover; there is no performance or security benefit of one or the other.
Coaxial (coax) cabling is the type of cable you use for cable television. A copper wire in the center of the cable is responsible for transmitting information. Furthermore, the copper wire is protected by two levels of insulation and an exterior plastic covering, as shown in Figure 1-10.
Like UTP, coaxial cabling used for networking comes in different flavors — two, to be exact. Thinnet is only one-quarter-inch thick, and Thicknet is one-half-inch thick. Table 1-2 shows the difference between Thinnet and Thicknet.
TABLE 1-2 Types of Coax Cabling
Type |
Coax Type |
Maximum Cable Length |
Diameter |
Speed |
Thinnet |
RG-58 |
185 meters |
¼″ |
10 Mbps |
Thicknet |
RG-8 |
500 meters |
½″ |
10 Mbps |
Notice in Table 1-2 that the coaxial cable type is specified by a radio grade (RG). There are a number of grade standards for coaxial cable, and each standard has a specific purpose and connector type that will work with that type of cabling. For example, RG-58–grade cabling (Thinnet) uses BNC connectors (discussed in more detail in the next section), and an RG-8–grade cable uses an AUI connector.
Another popular grade of coaxial cable is RG-6 — the grade of coax used for television cable — which uses the F-type connector (also known as the F-connector) to connect the cable to the device. Figure 1-11 displays coaxial cables along with an F connector and a BNC connector. Another common-grade coax cable that is used by cable television is RG-59.
When using Thinnet to connect to a workstation, you need to use a Bayonet Neill-Concelman (BNC) connector — also known as British Naval Connector (BNC), which comes in a few forms. You will most likely encounter the plain old BNC and the BNC-T.
The BNC connector connects Thinnet cable to a networking device, such as a network card, using the barrel connector on the back of the network card, as shown in Figure 1-12.
The BNC-T — shaped like the letter T — is used to continue the cable length while “T-ing” off to connect a system to the network, as shown in Figure 1-13.
Notice in Figure 1-14 that the BNC-T connects to a metal barrel–type port on the back of the network card. If you do not need to continue the cable length and this is your last workstation, you are required to terminate the end with a terminator on the T connector, as shown in Figure 1-14.
A system or device connected to a Thicknet network uses an adapter unit interface (AUI) port (shown in Figure 1-15), which connects the system to the Thicknet cabling by using a transceiver known as a vampire tap.
Although older network environments such as Thinnet and Thicknet used coaxial cable, coaxial is still used today with broadband (high-speed) Internet connections by the cable companies. The Internet connection comes into my home via a coaxial cable and then connects to a cable modem, which my router is connected to, to give Internet to the entire house.
Fiber optic cabling — one of the fastest types of network media available — is made of a glass fiber core (optical fiber) surrounded by a layer of glass cladding insulation that is then covered with an outer covering (jacket). There are two fiber channels in fiber optic cable: one for sending information and the other for receiving information. Figure 1-16 illustrates a fiber optic cable.
Fiber optic cabling can reach distances of 2 kilometers (km) or more, carrying a signal for a much greater distance than twisted pair and coaxial cabling. Fiber optic cabling is also fast, transmitting information at speeds of 1 Gigabit per second (Gbps) and higher. And, because fiber carries data in pulses of light instead of electronic signals, data cannot be corrupted by outside electronic interference.
The two implementations of fiber optic cabling are single-mode fiber (SMF) and multi-mode fiber (MMF):
The primary disadvantage of using fiber optic cabling is the implementation cost and the expertise required for the wiring.
Most network professionals use cable testers to test the cabling and verify that the cable is properly crimped and making contact with the networking devices. For example, cable testers for CAT5 cabling identify whether each of the eight wires is crimped properly and identify other problems, such as wires being crimped in the wrong order.
Another problem you need to be aware of when running cable throughout a building is that twisted pair and coaxial cables are susceptible to outside interference from other electrical components. For example, do not put networking cable alongside the electrical cabling because the electrical cabling could cause interference that could make the data on the network cable unreadable. For more information on cable testers and troubleshooting cabling problems, check out Book 4, Chapter 2.
Here is one last point to make about cabling to help you prepare for the A+ Certification Exams. Plenum — the space between the ceiling tile and the floor above — is a popular place to run cables. If you are going to run cables in this area, make sure that you are use plenum-grade cabling, known as Teflon-covered cable. If you are using nonplenum-grade cabling, such as PVC cover cabling, in this space and a fire happens, the PVC coating can give off a toxin that could be spread throughout the building.
It is common to want to split a signal travelling through a cable in order to send that signal to multiple places, such as to send the cable signal for one TV to an additional TV. There are a number of different types of cable splitters that correspond to the different cable types. For example, to split your TV signal you need a coaxial cable splitter. It is important to note that when you split the cable this way, you lose signal quality due to the fact that the power carrying the signal is split as well. The less power, the weaker the signal.
Network access refers to the different methods that computers use to place data on the network. This section discusses these methods and identifies the advantages and disadvantages of each.
One of the most popular types of access methods is CSMA/CD (Carrier Sense Multiple Access/Collision Detection). Understanding this term is easier if you break it down into its individual parts and examine each part in detail:
Multiple access: All computers on the network have equal access to the network at any given time. In other words, anyone can place data on the network whenever he or she chooses. Note, however, that workstations on the network will try not to place data on the wire at the same time the wire is transmitting other data because the two pieces of data will collide, destroying the data. That’s why it’s so important for workstations to “sense” the wire.
To summarize, carrier sense multiple access suggests that all workstations have access to the network and are watching the network to make sure it is clear of data before they send out their information.
The nice thing about CSMA/CD is that the workstations decide when to send data, trying to prevent collisions. However, there is always the possibility that multiple workstations will send data out at the exact same moment the network is clear, resulting in data collision.
Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) is similar to CSMA/CD except for one main difference: When a workstation senses that the wire is free, it sends out dummy data first instead of real data. If the dummy data collides with other information on the wire, the workstation has avoided a collision with the real data; if the dummy data does not collide, then the workstation sends the real data. Like CSMA/CD, if the real data collides and does not reach its destination, it will be resent by the sender.
CSMA/CA is used with 802.11 wireless networking.
A network architecture describes a network technology that uses a specific topology, cable type, and access method. This section describes the major types of architectures and their characteristics.
Ethernet is probably the most popular type of network architecture in use. Ethernet is an example of a network architecture that comes in multiple flavors. If someone says to you, “I have an Ethernet network,” you are likely to ask, “What type of Ethernet?”
There are a number of types of Ethernet: 10BaseT, 10Base2, 10Base5, 100BaseT, and 1000BaseT being a few popular ones. All Ethernet architectures use CSMA/CD as the access method, but each type of Ethernet uses a different topology or cable type. The following sections outline the differences among them.
The following outlines some of the popular 10 Mbps network architectures that have been popular in past years. You need to be familiar with these for the A+ Exams:
You are unlikely to see a 10 Mbps network architecture on today’s networks, so it is more important that you have an idea of some of the popular 100 Mbps Ethernet architectures:
Today’s corporate networks are reaching 1 Gbps (1000 Mbps) and higher, so it is important that you are familiar with the Gigabit Ethernet standards for the A+ Exams:
1000BaseSX: Uses multimode, fiber optic cabling for short distances; uses CSMA/CD as the access method
Remember this architecture by the S in the name, meaning short distances.
1000BaseLX: Uses single-mode fiber optic cabling; uses CSMA/CD as the access method
Because single-mode fiber optic cabling is designed for long distances, it is the type of fiber optics used for 1000BaseLX. Remember this standard by the L in the name, implying long distances.
Some of the fastest network standards today fall into the 10 Gbps Ethernet architectures. The 10 Gbps Ethernet architectures use fiber optic cabling, either SMF or MMF, depending upon the architecture. For example, the 10GBaseSR standards uses multimode fiber optic cabling that can reach a short distance of 100 meters, and 10GBaseLR uses single-mode fiber optic cabling that reaches a distance of 10 km.
To ensure that all the networking components work with one another, networking standards have been developed. If a company decides that it wants to develop something like a network card, it will ensure that the network card follows a standard so that it can communicate with all the other networking components. In this section, you find out about the different network standards that help each networking vendor develop networking components that function alongside other networking devices.
The Institute of Electrical and Electronics Engineers (IEEE) has developed a number of LAN standards that define the physical components of networking technologies. In these standards, the IEEE has defined such things as how network cards place data on the wire and the type of cabling used in different types of LANs. The LAN standards are defined by Project 802, which was launched in February 1980. These 12 standards, shown in Table 1-3, define different networking architectures.
TABLE 1-3 Project 802 LAN Standards
Project |
Description |
802.1 |
Internetworking |
802.2 |
Logical Link Control (LLC) |
802.3 |
Ethernet (CSMA/CD) |
802.4 |
Token Bus LAN |
802.5 |
Token Ring LAN |
802.6 |
Metropolitan Area Network |
802.7 |
Broadband Technical Advisory Group |
802.8 |
Fiber Optic Technical Advisory Group |
802.9 |
Integrated Voice/Data Network |
802.10 |
Network Security |
802.11 |
Wireless Networks |
802.12 |
Demand Priority Access LAN |
A few of the networking standards that you should be familiar with are 802.3, 802.5, and 802.11:
For more information on wireless networking, check out the next chapter.
The Open Systems Interconnect (OSI) model is a seven-layer model defined by the International Standards Organization (ISO) that provides a framework that manufacturers of networking components can use to develop networking hardware and software components.
Each layer of the OSI model is responsible for specific network functions. For example, the network layer is responsible for logical addressing, so any devices or protocols that provide logical addressing run at this layer — such as the IP protocol. Table 1-4 outlines the seven layers of the OSI model and provides examples of networking components that run at that layer.
TABLE 1-4 The OSI Model
Layer |
Description |
7, Application |
Responsible for making or receiving a network request and is typically the networking software. For example, a web server, FTP server, and DNS server run at this layer. |
6, Presentation |
Responsible for formatting the information so that the information is understood on the receiving system. Examples of formatting are compression and encryption. |
5, Session |
Responsible for opening, closing, and managing a connection (a session) to another system or device. |
4, Transport |
Responsible for breaking the information down into smaller pieces so that it can be sent along the network in parts. This layer is also responsible for ensuring that the information reaches the destination. |
3, Network |
Responsible for routing of information and logical addressing. A router runs at this layer, and the IP protocol runs at this layer, which provides a logical address (IP address). |
2, Data Link |
Prepares the information to hit the physical network by placing the data into packets. The data link layer also provides the physical addressing (MAC address), so any device that works with a MAC address runs at this layer (such as a network card, switch, and bridge). |
1, Physical |
Deals with the network media such as cabling and connectors. The physical layer is also responsible for sending the electrical signal on the wire. Any device that works with the electrical signal runs at this layer such as a hub or repeater. |
Voice over IP (VoIP) is a fairly hot topic these days. VoIP deals with allowing subscribers to the VoIP service to have telephone conversations over a TCP/IP network, such as the Internet. The benefit of such a service is no more long-distance charges — just your monthly subscription to the service.
VoIP not only allows for the transmission of voice but also other types of data, such as video. VoIP has become a popular method of communication that supports PC-to-PC communication, essentially using the PC as a phone.
A computer network is a lot more than just a few computers and a tangle of cables. A computer network needs a number of different types of devices to connect the systems or to connect the network to another network. This section identifies the different types of network devices popular in network environments today and covers the devices you will be tested on for the A+ Exams.
The network interface card (commonly referred to as a network card) is responsible for connecting the computer or device to the network. More importantly, the network card on the sending computer is responsible for converting digital data into an electrical signal for copper or optical signal for fiber that can be placed on the wire. The network card on the receiving computer is responsible for picking up the electrical signal and then converting it back to digital data that can be understood by the computer system.
Each network card has a unique address burned into the ROM chip on the card. This unique address is considered the hardware address of the network card because the manufacturer of the card burns it into the card. The address uniquely identifies your system on the network. The hardware address is also known as the Media Access Control (MAC) address. An example of a MAC address is 00-20-3F-6B-25-13.
Looking at the example of a MAC address, notice that the MAC address is made up of hexadecimal addresses — not your typical decimal numerals or binary values. Of the six groups of digits, the first three pairs identify the manufacturer of the network card, and the last three pairs are a unique set of digits assigned to a particular card built by the manufacturer. So, 00-20-3F, which appears at the beginning of my example MAC address, represents the manufacturer of the card, and 6B-25-13 identifies the card.
The MAC address of the sending and receiving system is stored in the header of the network packet that travels the network wire. When each system sees the packet traveling by it, it looks at the destination MAC address to decide whether the data is destined for it. If a system finds that it is the intended recipient for the data, it copies the data to its buffer, which is memory used to store the information while it waits to be processed. Figure 1-18 shows a network interface card.
One major concern with cabling is the maximum usable length of the cable. For example, UTP cabling has a maximum length of 100 meters, and Thinnet has a maximum length of 185 meters. The reason for putting a maximum distance on cable lengths is that the signal traveling along the cable becomes too weak to read at the destination system by the time the maximum length is reached. The term for reduced strength in the signal is attenuation. The receiving computer cannot read the information, and thus does not acknowledge that it received the data. When the sending computer does not receive an acknowledgment, it simply resends the data. This causes the information to be resubmitted, generating more network traffic.
One way to increase the distance of a cable length is to use a repeater, which regenerates a signal so it can travel the extra distance. For example, the repeater shown in Figure 1-19 joins two lengths of Thinnet coaxial cable. It joins the two cable lengths so that the signal can travel the distance from computer A to computer B. Note that this distance exceeds 185 meters, which is the maximum distance of Thinnet. When the signal hits the repeater, the repeater rebuilds the signal so that it can travel another 185 meters.
An extender is a device that you can use to connect two cable lengths together to create a much longer cable length. The problem with an extender is that it does not reamplifiy the signal, so be careful not to exceed the cable length for the type of cable you are extending. For example, twisted pair cabling has a maximum length of 100 meters, so you need to ensure each cable length you are joining together with an extender does not exceed 100 meters.
Because all data passing through a repeater is regenerated and sent to all parts of the network, a great deal of network traffic is generated that affects the overall performance of the network.
To prevent this buildup of network traffic, you can use a bridge (as shown in Figure 1-20), which is a device that connects network segments and also regenerates the signal (like a repeater). A bridge also filters the data so that it is sent only to the proper portion of the network, cutting down on network traffic and increasing overall performance.
Figure 1-20 illustrates that when computer A sends information to computer C, the information travels along segment 1 and eventually reaches the bridge. The bridge looks at its bridging table (a list of MAC addresses and corresponding network segments that runs in memory) to see which network segment computer C exists on. In this example, it lives on segment 3. At this point, the bridge forwards the information only to segment 3, where computer C resides, and not to any other segment, thus filtering traffic and cutting down on network noise.
Bridges increase performance on the network by filtering the network traffic, which gives the network and all its devices and applications more bandwidth to work with. The less network traffic, the less chance of collision and retransmission.
A router, which is responsible for sending information from one network to another, is an important network device because most companies are connected to the Internet. When a computer on your network wants to send information to a computer on another network, your computer passes the information to your router. Figure 1-21 shows three different networks, each connected to the Internet by a separate router. All computers on network A know that any information with an outside-network destination must be passed to the router because the router is the only device with a physical connection to the outside world.
In theory, a gateway is a network device responsible for converting information from one format to another. Think of a gateway as a translator between two different languages: As information passes from one side to another, the gateway “translates” the information to a format that can be understood on the other side.
In today’s day and age, we associate the gateway, or default gateway, as the way off the network, which is the router.
A hub is a central device that acts as a connection point for all hosts on the network. A hub is a very basic device that passes all data that hits the hub to every port on the hub. This means that when a computer sends data to another computer, all systems will see the data on the network even though only the destination system for the data will process the data. Figure 1-22 shows a network hub.
As the number of hosts on the network grows, you can “cascade” or connect one hub to another. Any data that reaches a port on a hub will be sent to all ports on all connected hubs, which could congest the network with traffic.
A network switch is a device that looks similar to a network hub but differs in that the switch does not forward the data to all ports like a hub would. Instead, the switch filters network traffic by only sending the data to the port that the destination system resides on. Figure 1-23 shows a network switch.
Switches can dramatically increase network performance because they filter the traffic by sending the data only to the destination port on the switch instead of to all ports on all hubs. Switches also offer security benefits because a system that is not the destination of the information does not receive a copy of the information, thus reducing the opportunity that someone other than the intended recipient can see your information.
Most switches today also offer security features such as port security, which enables you to limit which systems can connect to a port on the switch by MAC address. You can also control which ports a system can send data to!
A very popular network component today is a wireless access point. A WAP, typically connected to a wired network, is responsible for accepting data from wireless clients and then passing that data to systems on the wired network. The wireless access point can also receive information from the wired systems and then send that information to the wireless systems.
You can find a number of popular brands of wireless access points, such as Linksys, D-Link, and NetGear. Wireless access points that include additional features, such as firewall capabilities, are wireless routers. Figure 1-24 shows a wireless router used by home and small office networks.
A wireless router has an antenna that collects the radio waves that carry the data from the wireless client. The wireless router also has a WAN port on it so that you can connect your Internet cable into it and share the Internet connection with all systems on the network. The WAP in Figure 1-24 also has four additional RJ-45 ports to connect four wired systems.
The WAP is a multifunction device in the sense that it not only allows wireless clients to connect to the network, but it is also a four-port switch, allowing wired clients to connect to the network.
When wiring your office to create a network, you will typically have network jacks in the wall to connect the workstations. Those network jacks will have a cable connected that runs through the wall to a wiring closet that contains a patch panel. The patch panel is the central device that all of the wall jacks connect to. You then will connect the jacks of the patch panel to ports on a switch using a patch cable.
You may find a wealth of different network devices out there on different networks. Some other common network devices you may find are
One of the challenging parts of supporting networks today is knowing how to troubleshoot them. You find so many aspects of the network that it is difficult to know where to start your troubleshooting. The following is a listing of some common troubleshooting tools you should be familiar with for the A+ Exams:
Different network devices, such as network cards, support different methods of communication. The three major communication methods in the computer world are simplex, half-duplex, and full-duplex:
It is important to understand duplexing as you can experience networking problems due to duplexing mismatch. If your network card is configured for full duplex and the port on your network switch has be configured for half duplex, the system will not be able to communicate with the switch.
When purchasing networking or other types of devices for your computer, it is important to know whether you are buying a simplex, half-duplex, or full-duplex device to avoid problems later. For example, a musician friend of mine wanted to record his own material on the computer with recording software. After recording the first track, he had a problem recording a second track because his sound card was only a half-duplex device. He wanted to listen to the first track while playing along and recording the second track, which was impossible with his half-duplex sound card. He needed to have the sound card send and receive information at the same time, something that a half-duplex device can’t do. The solution: Get a new, full-duplex sound card.
If you want to build a small network with four computers in the home and have each system connect to the Internet, the best thing to do is to buy a home router from D-Link or Linksys. After you buy the home router, which is also a four-port switch, connect the four computers to the ports on the router and then plug the Internet connection into the WAN port. All systems are now interconnected and also to the Internet. But what if you need to connect two systems and you cannot connect them by using a hub or switch? You need to be aware of the different and varied methods used to network two computers, including the following:
The following sections describe the different computer networking methods.
The first task when using network cards to network two computers is to find out what type of network card you need for each system. You will have to find out whether the network card will be an PCI, PCIe, or PCI-X device. Open up the system and look at the different expansion slots that exist, or you can look at the documentation for the system.
After you purchase the network card and install it into your system, load the driver for the network card. If you’re lucky and the network card is a Plug and Play device, the driver might load automatically for you, or you might be prompted by the OS to provide a manufacturer diskette with the driver for the device.
After you install the driver, you might have to spend some time troubleshooting the device because of resource conflicts with other existing devices. Once again, if you have a Plug and Play device, this step will probably not happen because the resources will be assigned dynamically by the OS.
You may also network two computers via the serial or parallel ports of both systems. Using standard parallel or serial ports for networking two devices can be a lot slower than networking two computers via a network card. You will connect the parallel ports with a laplink cable, and you will use a null modem cable for serial ports (RS-232 ports).
Here are the two networking methods that use serial ports:
Devices can also use infrared ports that can be used to connect to other devices on the network over short distances. For example, you can print to a printer sans parallel cable by using infrared technology.
Infrared technology uses an infrared light beam to carry data between devices. It typically requires clear line-of-sight — a clear path between the two devices. Infrared is limited in distance to about 100 feet and can transfer information up to 10 Mbps.
When installing a Small Office/Home Office (SOHO) network — a home office network or a network to be used by a small office with a few employees — you need a number of network components to get the network up and running. This section introduces you to the network components needed to build a small network.
The first major component that you need is a home router, which is a multifunctional device that provides you with all the network components that are needed for your SOHO. Then decide whether to go wired or wireless. If you opt for wired, you need the appropriate type of cabling. If you go wireless, make sure you get a wireless router. Finally, you might want to think about using a server. After the networking nuts and bolts are in place, think about security.
A home router has a WAN port that you use to connect to your high-speed Internet connection. This could connect to your cable modem or your DSL modem, and will be used to share the Internet connection with any users on the network.
The following is a list of benefits to having the home router in your SOHO network:
To use a home router, simply connect the WAN port of the wireless router to your high-speed Internet connection and then connect your systems to any of the four LAN ports on the router. These systems will get an IP address from the DHCP server built into the router and then will be able to surf the Internet.
You might eventually look at installing a server for your SOHO. The server performs many different functions, such as holding files that you want to share with other users on the network. The server could also be used to share a printer to all other users on the network.
This server doesn’t have to be a system running the Windows Server OS. It could be a Windows 8.1 system with sharing enabled, and sharing a folder for everyone else to access or sharing a printer that everyone else on the network can access.
For more information on sharing printers and files, check out Book 8, Chapter 3.
A very simple way to allow systems to connect to your network without needing to run cables throughout the entire office or home is to use wireless networking. If you purchase a wireless router, it will allow computers with a wireless network card to connect to the wireless router and any systems connected to it. The wireless client will also be able to surf the Internet because the wireless router will share the Internet connection with not only the wired computers but the wireless systems as well.
To learn more about wireless networking, check out Book 8, Chapter 2.
When building a SOHO network, you have to create a security network structure to protect your business assets. The three chapters in Book 9 give you the foundation to network security, so be sure to read over those three chapters and incorporate them into your SOHO network.
Here is a summary of popular security best practices when creating a SOHO network and using a wireless router:
Wireless security: There are a number of steps to take to secure your wireless network. For more information on wireless networking, check out Book 8, Chapter 2.
To learn more about wireless security, read Book 8, Chapter 2.
Again, this section is definitely not designed to give you details on how to set up a SOHO network but rather to expose you to the term and some of the considerations with SOHO networking. You can incorporate all the networking and security features covered in Books 8 and Book 9 in your SOHO network, so be sure to read those chapters carefully!
This chapter introduces you to a number of key concepts in network terminology. Understanding networking and how to troubleshoot the network has become an important skill for an IT professional, and you will be asked a few networking questions on the A+ Exams. Remember the following points when preparing for the exams:
1. What category of UTP cabling transmits data at 16 Mbps?
(A) Category 2
(B) Category 3
(C) Category 4
(D) Category 5
2. Which of the following defines simplex communication?
(A) Allows information to be sent and received, but not at the same time
(B) Allows information only to be sent
(C) Allows information to be sent and received at the same time
(D) Allows information to be sent, but only after dependent information is received
3. What is the transfer rate of Category 3 cabling?
(A) 2 Mbps
(B) 10 Mbps
(C) 16 Mbps
(D) 100 Mbps
4. Your manager has heard of being able to share a single public IP address through a feature called NAT. Which type of device should you install on the network to get NAT functionality?
(A) Switch
(B) Hub
(C) Repeater
(D) Router
5. What is the recommended number of users for a peer-to-peer network?
(A) Fewer than 100
(B) More than 100
(C) Fewer than 10
(D) More than 10
6. What access method is used for Ethernet?
(A) Token passing
(B) CSMA/CA
(C) Twisted pair
(D) CSMA/CD
7. Which of the following defines half-duplex communication?
(A) Allows information to be both sent and received, but not at the same time
(B) Allows information only to be sent
(C) Allows information to be sent and received at the same time
(D) Allows information to be sent, but only after dependent information is received
8. What category of UTP allows for data transfer at 1 Gbps?
(A) Category 3
(B) Category 4
(C) Category 5
(D) Category 5e
9. You would like to ensure that there is redundancy in connection points between systems. Which network topology should you use?
(A) Ring
(B) Star
(C) Bus
(D) Mesh
10. Which of the following best describes the functionality of a network switch?
(A) When data is received it forwards the data to all ports.
(B) It translates information from one format to another.
(C) When data is received it forwards the data to only the destination port.
(D) It sends the data to the network of the destination system.
11. Which of the following best describes a client-server environment?
(A) All users on the network connect to one another for the purpose of file sharing.
(B) All users on the network connect to a central server and access resources on that central server.
(C) All users on the network connect to one another for the purpose of printer sharing.
(D) Each user accesses only one other user’s computer.
12. What is the maximum distance of UTP cable?
(A) 100 meters
(B) 185 meters
(C) 250 meters
(D) 500 meters
13. You are the network technician for your company. You are troubleshooting Bob’s network connection and need to trace the network cable from Bob’s workstation to the wiring closet. What tool should you use?
(A) Packet sniffer
(B) Toner probe
(C) Cable tester
(D) Loopback plug
14. You are looking to install a network cable that needs to travel through areas that have large machinery, which typically can cause electromagnetic interference. Which of the following cable types are less likely to be affected by interference?
(A) Fiber optic
(B) 100BaseT
(C) 1000BaseT
(D) Coaxial
15. You have just purchased a DSL high-speed Internet connection for your home office. Which type of connector is used to connect the DSL router to the wall jack?
(A) SC
(B) RJ-45
(C) RJ-11
(D) BNC
16. Which of the following best describes full duplex communication?
(A) Allows information to be both sent and received, but not at the same time
(B) Allows information only to be sent
(C) Allows information to be sent and received at the same time
(D) Allows information to be sent, but only after dependent information is received
17. What Ethernet architecture transfers information at 1 Gbps over short distances and uses fiber optic cabling?
(A) 1000BaseSX
(B) 1000BaseLX
(C) 1000BaseTX
(D) 100BaseTX
18. You are the network technician for the office and have decided to create some CAT 5e cables to connect workstations to the network. What type of connector do you crimp onto the ends of a Category 5e cable?
(A) SC
(B) RJ-45
(C) RJ-11
(D) BNC
19. What is the maximum distance of fiber optic cabling?
(A) 100 meters
(B) 185 meters
(C) 500 meters
(D) 2 kilometers
20. Your manager decided that the company should look at using fiber optic cabling, but is concerned about purchasing the correct network cards. Which of the following represents a connector used by fiber optic cables?
(A) BNC
(B) RJ-45
(C) RJ-11
(D) LC