Chapter 8. Network+ Exam Study Guide

This chapter provides a study guide for the Network+ Exam N10–003. Various sections in this chapter are organized to cover the related objectives of the exam. Each section identifies the exam objective, provides an overview of the objective, and then discusses the key details that you should grasp before taking the exam.

An overview of this chapter's sections is as follows:

Media and Topologies

This section covers the basics of network media, networking standards, and topologies, as well as offers a brief description of networking devices. It also covers both wired and wireless networks.

Protocols and Standards

This section covers the Open System Interconnect (OSI) networking model, networking protocols, and services. Also included in this section is a description of wireless technologies and Internet access methods.

Network Implementation

This section includes a study of network operating systems, their interoperability, and methods of implementing security in wired and wireless networks. Remote access, intranets, extranets, fault tolerance, and disaster recovery are also covered in this section.

Network Support

This section includes a study of concepts related to troubleshooting methods and utilities for different operating systems and topologies. Also discussed in this section are the effects of adding/removing network services and client connectivity problems.

The sections in this chapter are designed to follow the exam objectives as closely as possible. This Study Guide should be used to reinforce your knowledge of key concepts tested in the exam. If you study a topic and do not understand it completely, I recommend that you go over it again and memorize key facts until you feel comfortable with the concepts.

Studying for the Network+ certification requires that you have access to a computer network. Although it is not essential, it is good to have a Windows- or Unix/Linux-based computer network in order to get familiar with the concepts covered in this Study Guide. Identification of network media, cables, and connectors is required as part of your preparation for the exam. A small network with a Windows XP desktop and a Windows or Unix/Linux server would serve the purpose. Needless to say, you will also need an active Internet connection, just in case you need to search for more information on any topic.

Tip

This chapter contains a number of terms, notes, bulleted points, and tables that you will need to review multiple times. Pay special attention to new terms and acronyms—those you are not familiar with—as these may be tested in the exam.

Networking standards are the basis of any network implementation. Every network, small or large, is based on a networking topology and might use one or more types of cables. Each networking standard defines a certain physical layout of the components of the network. These include servers, desktops, printers, network devices, cables, and connectors. Network administrators have to decide on a networking topology and cabling before chalking out a network plan. For network technicians, a thorough understanding of networks, network standards, topologies and media is essential for keeping the network functional. This section covers a brief description of essential components of any network, media, and topologies.

A computer network refers to two or more computers linked together to share files, printers, and other resources. The computers may be linked through cables, telephone lines, satellite, radio frequencies, or Infrared beams. The network may be as small as just two or more computers linked together at home or in an office, or as big as a corporate network at multiple locations spanning across the globe. The following sections describe different types of networks and the concept of centralized and decentralized computing.

A network topology describes the physical and logical layout of the network components. A physical network topology refers to the actual layout of computers, cables, and other networking devices. The network topology is determined by the connections between different components. A logical topology refers to the communication methods used by different components. The Network+ Exam covers the commonly used physical topologies: star, bus, mesh, ring, and wireless, described in the following sections.

A wireless network connects two or more computers without using cables. To communicate with each other, these networks use spread spectrum technology, which is based on radio frequencies. Each device in the network is equipped with a wireless network adapter and is called a station. The area of communication is limited and is known as the basic service set. Wireless stations or clients can freely move within the basic service set. A wireless network can further be connected to a wired network with the help of wireless access Points (AP). The IEEE 802.11 standards define two main configurations of wireless communications: Ad-hoc and Infrastructure.

The Institution of Electrical and Electronics Engineers (IEEE) has defined standards for local area networks, metropolitan area networks, and wireless LANs as the IEEE 802 standards. The IEEE 802 standards describe the operation of networking protocols, services, devices, and media at the two lowermost layers of the seven-layer OSI reference model: the Data Link and Physical layers. (The OSI model is discussed later in this section.) The Data Link layer is further divided into two layers: the Logical Link Control (LLC) layer and the MAC layer. Table 8-1 lists various standards in the IEEE 802 family.

Each of the standards listed in Table 8-1 defines different characteristics of the network, such as network access method, topology, speed, and type of cabling.

The IEEE 802.11 family of standards defines several protocols used for wireless communications. This standard defines all aspects of wireless communications from the frequency range specifications to physical layouts to authentication mechanisms. The original IEEE 802.11 standard is known as legacy 802.11. The characteristics of the IEEE 802.11 standard are as follows:

Wireless networks defined in IEEE 802.11 standards use radio frequencies with spread spectrum technology: frequency-hopping spread spectrum (FHSS) or directsequence spread spectrum (DSSS). Spread spectrum technologies are discussed later in this section. The most popular of the IEEE 802.11 wireless network standards are 802.11b, 802.11a, and 802.11g. Security standards for these protocols are defined in the 802.11i standard.

The cables used for computer networks fall into three main categories: Coaxial, Twisted Pair, and Fiber Optic. Each of the cable types has its own merits and demerits in terms of their cost, installation, maintenance, and susceptibility to interferences. Coaxial cables are rarely used these days because of the vast popularity gained by twisted pair cables. The following sections discuss each of the cable types covered in the Network+ exam.

Coaxial cables are mainly used for carrying television signals (for example, CATV), but some older computer networks based on the 10Base2 standard also utilized these cables for connecting workstations and other network devices. Usually the coaxial cables used for different purposes have different characteristics; cables for one purpose cannot be used for another. For example, the cable used for CATV cannot be used for computer networks. Figure 8-9 shows a piece of coaxial cable.

Coaxial cable networks are easy to install and low in cost. The downside is that they are prone to degradation of signals as they travel long distances. This degradation is called attenuation. They can also break easily and cause network downtime. Coaxial cables fall mainly into the following two categories:

Twisted pair cables have replaced coaxial cables in most computer networks. These cables use twisted pairs of insulated cables bundled inside a plastic sheath. The twists in cables are used to prevent electromagnetic interference, which results in crosstalk, among cables. Twisted pair cables are easy to install, lower in cost than coaxial and fiber optic cables, and can achieve greater data transmission speeds than coaxial cables. These cables are usually identified by their category numbers. The category number indicates the number of cable pairs and the purpose for which they can be used. These category numbers are denoted as CAT-1, CAT-2, CAT-3, CAT-5, etc. Figure 8-10 shows a piece of twisted pair cable.

Fiber optic (also called Optical Fiber) cable is made up of very thin glass or plastic stretched out and put inside a sheath. The transmission in fiber optic cables is based on the transport of light signals. An optical transmitter is located at one side of the cable and a receiver is at the other side. Fiber optic cables are immune to EMI and RF disturbances because they depend on optical signals unlike electrical signals in UTP/STP cables. They can also carry data signals longer distances than do UTP or STP cables due to minimal attenuation. It is also considered the most secure of all cable types.

Fiber optic cables are very expensive in terms of the cost involved in installation and maintenance. It needs expensive hardware, skilled technicians, and special tools for installation. This is the reason that fiber optic cable is used only in data centers for providing high-end connections to critical servers and other network devices where high-speed data transfers are required. Figure 8-11 shows a piece of fiber optic cable.

The two main types of fiber optic cables are single mode and multimode.

Ethernet networking and cabling are defined in IEEE 802.3 standards. There are several variations in this standard, depending on speed, length, topology, and cabling used in implementing networks. The following sections provide a brief summary of the standards tested on the Network+ exam.

The 10 Mbps standards include 10Base2, 10BaseT, and 10BaseFL. All these standards define a maximum data transfer speed of 10 Mbps. This speed is now considered obsolete for most networks. It is unlikely that you will encounter any 10 Mbps networks in your career. The following are different variations of 10 Mbps networks:

Table 8-4 gives a summary of 10 Mbps networking standards.

Media connectors are used for terminating cables. In other words, they provide an interface to connect the cables to devices. Different types of cables use different types of connectors. It is not possible to connect a cable to a device without first terminating it with a suitable connector. Each connector has two variations: a male connector and a female connector. The following sections provide a summary of connectors used for computer networking.

As noted earlier in the section "Physical Network Topologies," a small bus network can be built without any active device. This network is difficult to expand due to its limitations. Network devices, as discussed in the following sections, are used to connect multiple systems as well as to connect smaller network segments to form a large internetwork. This section covers a brief description of commonly used networking devices, which include network interface cards (NICs), hubs, switches, bridges, and routers.

Like a hub, a switch is also the central device that connects multiple nodes in a network segment using UTP or STP cables. But unlike the hub that sends the received signal to every port, a switch sends the signal only to the destination node. A switch is an intelligent device that learns the MAC address of the destination from the data packet and sends the packet to the intended node only. This results in data direct communication between two nodes, improved network performance, and reduced collisions.

Switches work at the Data Link layer (Layer 2) of the OSI networking model. Switches can work in a full-a mode, which is a mode that enables nodes to transmit and receive data simultaneously. Thus a 100 Mbps switch working in a full-duplex mode can provide 200 Mbps data transfer speed. Switches are preferred in large networks where hubs can become a bottleneck for network performance.

Switches forward data packets using one of the following forwarding techniques:

A network bridge is used for two purposes: connecting two LAN segments to form a larger segment and dividing a large network segment into smaller segments. It works at the Data Link layer (Layer 2) of the OSI model. Like network switches, bridges also learn the MAC address of devices and forward data packets based on the destination MAC address. In older bridges, the MAC addresses had to be defined manually, and it took a significant amount of time to configure a bridge. Most of the newer bridges can dynamically build lists of MAC addresses by analyzing data frames. These bridges are called learning bridges, due to this advanced functionality.

Most of the functionality of bridges is now available in switches. Hence, they are rarely used in networks these days. Bridges fall into the following categories:

Routers are used to connect two or more network segments. These devices work on the Network layer (Layer 3) of the OSI model. Routers use Internet Protocol (IP) addresses to determine the source and destination of the data packet. Typically, routers receive the data packet, determine the destination IP address, and forward the packet to the next hop, which may either be the final destination of the packet or another router on the path. Routers can be implemented as a software service or as a dedicated hardware device. A wired or wireless router in a home network is an example of a small network router that connects the home network to the ISP's network. Microsoft's Routing and Remote Access Service (RRAS) is an example of a software router. A Windows Server 2000/2003 computer with at least two network interface cards can be configured as a router to connect network segments.

Routers communicate to each other using routing protocols. They maintain a list of IP addresses in routing tables. Routing tables can be built statically or dynamically as discussed in the following list:

A distance vector routing protocol assumes that the network is made up of several routers. Routers using this protocol depend on other routers to advertise their routing information periodically. These advertisements (or updates) are typically sent every 30 seconds. Routers can also be configured to send triggered updates when they detect any change in network topology.

RIPv1 (Routing Information Protocol version 1) and RIPv2 (Routing Information Protocol version 2) are distance vector protocols that work on the principle of hop count. RIPv1 works only on TCP/IP networks, while RIPv2 works on both TCP/IP and IPX/SPX networks. The RIP version that supports IPX is sometimes called IPX RIP also. A hop is a value assigned to each router on the way to the final destination. RIP supports a maximum of 15 hops in the network. A destination beyond 15 hops is considered unreachable. The following are the main disadvantages of distance vector routing protocols:

There are two methods to get around the routing loops problem in distance vector protocols. The first method is split horizon, which prevents a router from advertising a route to the same router from which it received the route information. The second method is poison reverse, which advertises back the route it learns from a router with a hop count of 16 (unreachable).

An NIC, or a network adapter, is a hardware device that connects a computer to the network. It allows computers to communicate over the network using standard networking protocols. It works at the Data Link layer (Layer 2) of the OSI model. Every card has an RJ-45, a BNC, or an AUI socket where the network cable is connected. A light-emitting diode (LED) usually indicates the status of the card whether it is active or not. Older cards supported only 10 Mbps data transfer speeds, but the newer cards support 10/100 Mpbs or even 1000 Mpbs speeds.

Like other devices in the computer, network cards must also be configured to use certain system resources such as I/O Address (Input/Output Address), IRQ (Interrupt Request), and DMA (Direct Memory Access). Most of the newer cards are Plug-n-Play and are automatically configured by the system. However, before a card is purchased or installed, ensure that it supports the type of cabling used in the network. For example, a NIC-supporting fiber optic cable may not work in a network where UTP/STP cables are used.

Every network card comes with a device driver that needs to be installed to configure it properly on a system. In older cards, network technicians had to configure them manually by setting jumpers for the I/O address and IRQ. The driver software also had to be installed manually. As noted earlier, most new cards are automatically configured by software. However, in certain situations, you may need to download a driver from the vendor's web site and install it in order to let the system configure the card appropriately.

The term modem is derived from Modulator/Demodulator. A modem is a hardware device that is used to convert digital signals from a computer to analog signals (modulation) in order to transmit them over analog lines. At the receiving end, it converts the analog signals back to digital signals (demodulation) so that a computer can understand them. In their typical usage, modems are connected to a computer in order to provide remote access (or Internet connectivity) using analog telephone lines. It can be built onto the motherboard of the computer, can be installed as an extension card, or can be an external device. External modems can either be connected to one of the serial ports or to the USB port of the computer.

When used as an internal device, modems must be configured to use system resources such as an I/O address or IRQ. Modems use the serial communication (COM) ports in a computer, and resources used by these ports must be available in order to correctly configure the modem. Table 8-8 provides a summary of the COM ports and resources used by them.

Modems are available in different sizes, speed capabilities, and costs. The data transmission speed of a modem depends mainly on the type of Universal Asynchronous Receiver/Transmitter (UART) chip used and varies from 9.6 Kbps to over 900 Kbps. Modems with up to 115 Kbps speeds are commonly used for dial-up networking.

Wireless networks rely on radio transmissions to communicate instead of the network cabling used for normal computer networks. Radio frequencies create Electromagnetic (EM) fields, which become the medium to transfer signals from one computer to another. As you go away from the hub, or from the main equipment generating the wireless network's radio transmissions, the strength of the EM field reduces and the signal becomes weak. EM fields are also prone to interference, which can be introduced by walls, reflected radio waves, and the presence of other EM fields. The presence of wireless telephones, microwave ovens, television sets, and a number of other devices can potentially interfere and reduce the signal strength of wireless devices.

In order to reduce the effects of interfering frequencies, wireless devices use the spread spectrum technology. This technology helps share available frequency bandwidth common to wireless devices. It also helps prevent jamming of radio signals due to strong interference from another source of radio frequency. Instead of using a fixed frequency, such as that used with radio and television broadcasts, wireless networks use a spectrum of frequencies. The sender uses a number of narrow-band frequencies to communicate with the receiver. Each narrow band of frequencies contains only a part of the signal. The receiver correlates the signals received at different frequencies to retrieve the original information. Spread spectrum technology synchronizes wireless signals using one of the following methods:

Wireless services use radio frequencies that travel through the atmosphere. There are several factors that may affect the speed, signal quality, and range of wireless signals. These include interference from other electrical devices, the type of antenna used, and other environmental factors. This section covers a brief discussion of these factors.