Chapter 1: Explore the network
The ways we communicate
Texting
Social media
Collaboration tools
Blogs
Wikis
Podcasting
Peer-to-Peer (P2P) file sharing
Sizes of networks
PAN (Personal Area Network)
LAN (Local Area Network) or WLAN (Wireless LAN)
MAN (Metropolitan Area Network)
WAN (Wide Area Network)
SAN (Storage Area Network)
Clients and servers all end devices called hosts
Peer-to-Peer many computers function as the servers and clients on the network
Network components
Devices (physical elements)
Media
Services
End devices
Desktop Computer
Laptop
Printer
IP phone
Wireless Tablet
TelePresence endpoint
Intermediary devices
Wireless router
LAN switch
Router
Multilayer switch
Firewall appliance
Network media
1
,Tom Van de Velde KdG 2017-2018
Copper
Fiber optic
Wireless
Network Interface Card (NIC) provides the physical connection to the network
Physical Port a connector or outlet on a networking device where the media is connected to an end
device or another networking device
Interface specialized ports on a networking device that connect to individual networks
Topology diagrams
Physical topology diagrams identify the physical location of intermediary devices and cable
installation
Logical topology diagrams identify devices, ports, and addressing scheme
Tranets
Intranet
Extranet
Home and small office internet connections
Cable
DSL (Digital Subscriber Lines)
Cellular
Satellite
Dial-up Telephone
Businesses internet connections
Dedicated leased line
Ethernet WAN
DSL
Satellite
Network architecture
Fault tolerance
Scalability
Quality of Service (QoS)
Security
New trends
Bring your own device (BYOD)
Online collaboration
Video communications
2
,Tom Van de Velde KdG 2017-2018
Cloud computing
3
,Tom Van de Velde KdG 2017-2018
Chapter 2: Configure a network operating system
Operating Systems (OS)
Shell
Kernel
Hardware
Interfaces
Command-line interface (CLI)
Graphical user interface (GUI)
Access methods
Console the physical management port
Secure Shell (SSH) a remote secure CLI connection through a virtual interface
Telnet a remote insecure CLI connection through a virtual interface
4
,Tom Van de Velde KdG 2017-2018
Chapter 3: Network protocols and communications
Establishment rules
1. An identified sender and receiver
2. Common language and grammar
3. Speed and timing of delivery
4. Confirmation or acknowledgment requirements
Message timing
Access Method a method that determines when someone can send a message, when to begin
sending messages
Flow Control control the time between 2 frames
Response Timeout
Message delivery options
Unicast
Multicast
Broadcast
5
,Tom Van de Velde KdG 2017-2018
TCP/IP Protocol Suite
DNS Domain Name System (or Service)
BOOTD Bootstrap Protocol
DHCP Dynamic Host Configuration Protocol
SMTP Simple Mail Transfer Protocol
POP(3) Post Office Protocol (version 3)
IMAP Internet Message Access Protocol
FTP File Transfer Protocol
TFTP Trivial File Transfer Protocol
HTTP Hypertext Transfer Protocol
UDP User Diagram Protocol
TCP Transmission Control Protocol
IP Internet Protocol
NAT Network Address Translation
ICMP Internet Control Message Protocol
OSPF Open Shortest Path First
EIGRP Enhanced Interior Gateway Routing Protocol
ARP Address Resolution Protocol
PPP Point-to-Point Protocol
6
,Tom Van de Velde KdG 2017-2018
The benefits of using a layered model
Assisting in protocol design because protocols that operate at a specific layer have defined
information that they act upon and a defined interface to the layers above and below
Fostering competition because products from different vendors can work together
Preventing technology or capability changes in one layer from affecting other layers above and
below
Providing a common language to describe networking functions and capabilities
Protocol model this type of model closely matches the structure of a particular protocol suite
Reference model this type of model provides consistency within all types of networking protocols and
services by describing what to be done at a particular layer
Segmentation breaking communication into pieces
Multiplexing multiple communications are interleaved, giving each user a part of the bandwidth
7
,Tom Van de Velde KdG 2017-2018
Network addresses
8
,Tom Van de Velde KdG 2017-2018
Data link addresses
Devices on the same network
Network portion the left-most part of the address that indicates which network the IP address
is a member
Host portion the remaining part of the address that identifies a specific device on the network
9
, Tom Van de Velde KdG 2017-2018
10