Computer Networking
Technologies
ITCTA1
Eduvos (Pty) Ltd (formerly Pearson Institute of Higher Education) is registered with the Department of Higher Education and Training as a private higher education institution under the
Higher Education Act, 101, of 1997. Registration Certificate number: 2001/HE07/008
Week 1: Lesson 1
• Induction and Orientation
• OSI Model Layers
• SOHO Networks
Attendance Code
• uzn74p
Week 1: Lesson 1
Module
Description
This module explores the diverse subject of
networking, looking at types of networks, the
structure of networks, how models explain how
data travels over networks, the different media
used to carry data, the different devices used to
move data, the underlying principles of
protocols, addressing schemes, services, and
standards, and the tools and techniques used to
manage, monitor, troubleshoot, and secure
networking systems.
Week 1: Lesson 1
Module Aim
• The aim of this module is to equip
students with networking concepts,
terminology, and the skills needed to
install, manage, troubleshoot, and
secure network infrastructure,
hardware, and software
Week 1: Lesson 1
Learning
Outcomes
• Demonstrate an understanding of networking principles.
o Compare network types, functions of the layers of different
networking models, explain the scope of network standards,
functions of network devices, security and optimizing network
performance
• Demonstrate knowledge in relation to the communication
principles of networks.
o Describe principles of signal theory, properties of different media,
different addressing schemes, functions of network protocols
names and data travels around a network.
• Demonstrate how to implement a network.
o Plan, build a network based on requirement, review and test the
network implementation
• Demonstrate how to carry out network activities.
o Describe regular network management task and network
monitoring tools
Week 1: Lesson 1
MyLMS Module Page
[mylms.vossie.net]
•Module guide
•Module lessons
•Blended learning activities
•Assessments
•Important notifications from your lecturer
•Module announcements (discussion forums)
•Links to lectures, lecture recordings and prescribed
videos (where applicable)
Week 1: Lesson 1
Prescribed Textbook
Pengelly. J., The Official CompTIA Network +
Student Guide (Exam N10-008). CompTIA
1 Edition
st
ISBN: 9781642743579
eBook: 9781642743586
Week 1: Lesson 1
Recommended Textbook
West, J., Dean, T., Andrews, J. and Cengage Learning (Firm
(2019). CompTIA Network+ guide to networks. 8th ed.
Boston, Ma, Usa: Cengage.
West, J. (2021). Comptia Network+ Guide To Networks. S.L.:
Cengage Learning.
Auteur: Doug Lowe (2021). Networking All-In-One For
Dummies. Editor: S.L.: John Wiley.
Week 1: Lesson 1
Supporting Documents
Geyer, L., Levin, A., Makati, P.,
Pierce, R., Potter, M., and Wheeler,
A. 2023. Eduvos Guide to
Referencing (Harvard Referencing
Method). Unpublished document.
Eduvos.
Week 1: Lesson 1
Checklist
• Access to the institution’s Learning Management System
(myLMS) to access all study material.
• Access to Microsoft Teams to attend online lectures and
consultations.
• Access to a resource centre or an online library with a
wide range of relevant resources including textbooks,
newspaper articles, journal articles, organisational
publications and databases.
• Access to a range of academic journals in electronic
format via ProQuest or other databases.
Week 1: Lesson 1
Roadmap
Learnin Topics
g
Weeks
Week 0 Induction and Orientation
Compare and Contrast OSI Model Layers
Week 1 Configure SOHO Networks
Deploying Ethernet Cabling: Ethernet Standards & Copper Cabling
Types
Week 2 Deploying Ethernet Cabling : Summarize Fiber Optic Cabling Types.
Deploying Ethernet Switching : Deploy Networking Devices
Week 3 Network Interfaces
Troubleshooting Ethernet Networks : Troubleshooting Methodology
Troubleshooting Common Cable Connectivity Issues
Week 1: Lesson 1
Roadmap contd
Learnin Topics
g
Weeks
Week 4 IPv4 Addressing: Explain IPv4 Forwarding
Configure IP Networks and Subnets
Week 5 Config and Troubleshoot IP networks
Routing Concepts & Network Management
Week 6 Network Management & Network Security Concepts
Supporting and Troubleshooting Secure
Networks: Security Appliances Organizational and
Physical Security Concepts.
Week 7 Disaster Recovery and High Availability Concepts
Network Hardening Techniques: Types of Network
Week 1: Lesson 1
Assessment
Assessment
= Formative +
Summative assessment
Week 1: Lesson 1
Assessment: Formative
Formative assessment refer to
• individual project
• an online test
Week 1: Lesson 1
Assessment: Individual Project
Individual project for the module and will count
40% towards the final mark
Up to 20-30 hours required to achieve 50% pass
Projects must be submitted on or before the due date to the
lecturer as per arrangement (or as otherwise stipulated).
Five percent (5%) will be deducted for every day that the
project is late, up to a maximum of three days. Projects that
are more than three days late will be awarded a zero.
Week 1: Lesson 1
Assessment: Online Test
The Online Test for the module and will count 10%
towards the final mark within a given time frame
If you miss an assessment
• Inform academic coordinator
• Present doctor's note
• Fill deferred assessment form
• Pay a fee
• Within 3days of the missed assessment
Week 1: Lesson 1
Assessment: Online Test
The Online Test for the module and will count 10%
towards the final mark within a given time frame
If you miss an assessment
• Inform academic coordinator
• Present doctor's note
• Fill deferred assessment form
• Pay a fee
• Within 3days of the missed assessment
Week 1: Lesson 1
Assessment: Summative
Summative assessment is an online invigilated
exam, and 40% pass mark is required
Project 40%
Test 10%
Exam 50%
Week 1: Lesson 1
Summary of Assessment
Formative assessment
• Project 40%
• Test 10%
Summative assessment
• Exam 50%
Final Mark = [(Online Test percentage × 0.10)
+ (Project percentage × 0.40)
+ (Summative Assessment percentage ×
0.50)]
Week 1: Lesson 1
Plagiarism
All assignments and reports must be
submitted to the online similarity checker
(Turnitin) available on myLMS prior to being
submitted for marking. When submitting
your assignment/report, it is compulsory to
submit the entire Turnitin report. Marks will
be deducted in accordance with the
institutional policy.
Week 1: Lesson 1
Consultation
• Email lecturer
• 24 hrs in advance
Week 1: Lesson 1
Introduction to Computer
Networks
• Computer Networks Today
• Common Networking Terms
Week 1: Lesson 1
Introduction to Computer Networks
Learning Outcomes
• Understand what computer networks are
and how devices communicate in a
network
Week 1: Lesson 1
Introduction to Networks
What is a Computer Network
• A network consist of two or more computer
that are linked to share resources allow
electronic communication through a
medium
Week 1: Lesson 1
Introduction to Networks
Network terms
• Node single device connected to a network
• Host assigned a unique IP address
• Transmission process
• Transmission media (wireless and wired)
pathways of communication
• Internetwork device connects
Week 1: Lesson 1
Introduction to Networks
Network terms
• Network
• Segment share a communication pathway
• Data communication transfer of data
• Link active connection over media
• Backbone fast link that connects LANs/
WANs
Week 1: Lesson 1
Introduction to Computer
Networks
• Compare and Contrast OSI Model Layers
• Deploying Ethernet Cabling: Summarize
Ethernet Standards
Week 1: Lesson 1
OSI Model and SOHO Networks
Learning Outcomes
Demonstrate understanding of networking
principles
• Compare the types of networks
• Explain the function of the layers of the different network
models
• Explain the purpose and scope of network standards
Week 1: Lesson 1
Compare and Contrast OSI
Model
Learning Outcomes
Demonstrate understanding of networking
principles
• Compare the types of networks
• Explain the function of the layers of the different network
models
• Explain the purpose and scope of network standards
Week 1: Lesson 1
Compare and Contrast OSI
Model
• Networks are built on common standards and models that
describe how devices and protocols interconnect.
• The OSI model breaks the data communication process
into discrete layers. Being able to identify the OSI layers
and compare the functions of devices and protocols
working at each layer will help you to implement and
troubleshoot networks
Week 1: Lesson 1
Compare and Contrast OSI
Model
Week 1: Lesson 1
Configure SOHO Networks
• It can include both residential networks with a couple of
computers, and enterprise networks with hundreds of
servers and thousands of workstations.
• Small office/home office (SOHO) is a category of LAN with
a small number of computing hosts that typically rely on a
single integrated appliance for local and Internet
connectivity.
• Networks such as the Internet that are in different
geographic regions but with shared links are called wide
area networks (WANs).
• The intermediate system powering SOHO networks is
usually described as a SOHO router because one of its
primary functions is to forward traffic between the LAN
and the WAN.
Week 1: Lesson 1
Configure SOHO Networks
Layer 1 (Physical Layer)
• SOHO router provides physical connection through a few
RJ-45 ports or radio antennas to a local network (cable or
wireless)
Week 2: Lesson 3
Ethernet Standards
• Ethernet Standards
• Data Transmission
Week 2: Lesson 3
Attendance code for 02/10/2024
•h36bhc
Week 1: Lesson 1
OSI Model recap
Reference Layer Devices
Application Interface for software Multilayer switches
Presentation Character set Multilayer switches
conversion ASCII
Session Dialogue Multilayer switches
Transport Frames & Datagrams Multilayer switches, Firewalls, IDS
Network IP Packets Router, Layer 3 Switch
Data Frames Bridge, Switch, Wireless Access Point, NIC
Physical Bits Hub, Repeater, Transreceiver
Week 1: Lesson 1
Configure SOHO Networks
Local Area Networks
A single network in a location
Small Office/ Home Office Networks
category of LAN with a small number of computing hosts
that typically rely on a single integrated appliance for local
and Internet connectivity.
Wide Area Networks
A network located in different geographical location with
shared links
Week 1: Lesson 1
Configure SOHO Networks
Layer 1 (Physical Layer)
• SOHO router provides physical connection through a few
RJ-45 ports or radio antennas to a local network (cable or
wireless)
• A number of RJ-45 ports (typically four) to connect to a
local cabled network. These are typically labeled as the
LAN ports.
• Radio antennas to transmit and receive wireless signals.
• A type of modem (typically cable or digital subscriber
line) to connect to the Internet Service Provider's (ISP's)
network.
Week 1: Lesson 1
Configure SOHO Networks
• This is typically labeled as the WAN port. On the example
in the diagram, the interface is another RJ-45 port,
designed to connect to a fiber to the premises Internet
service using the same Ethernet technology as the local
network. On other SOHO routers, there may be a different
type of WAN modem, such as an RJ-11 port to connect to
a digital subscriber line (DSL) service.
Week 1: Lesson 1
Configure SOHO Networks
Layer 2
the SOHO router functions
Ethernet switch—the RJ-45 jacks are connected internally by
an Ethernet switch.
Wireless access point—the radio antennas implement some
version of the Wi-Fi standard. The access point functions as
a wireless hub, allowing stations (PCs, tablets, smartphones,
and printers) to form a wireless network. The access point it
also wired to the Ethernet switch via an internal port. This
forms a bridge between the cabled and wireless segments,
creating a single logical local network.
Week 1: Lesson 1
Configure SOHO Networks
Layer 3, the network layer, the routing part of the SOHO
router makes forwarding decisions between the local private
network and public Internet. These zones are distinguished
by internet protocol (IP) addresses. The local network uses a
private IP address range, such as 192.168.1.0/24. The
SOHO router itself is identified by an address in this range,
such as 192.168.1.1 or 192.168.1.254.
Week 1: Lesson 1
Configure SOHO Networks
The WAN interface is the network perimeter. The SOHO
router can apply filtering rules to traffic sent between the
public and private zones, implementing a firewall. The
firewall can be configured to block traffic based on source or
destination IP addresses and also on the type of application.
At layer 4, each application is identified by a port number,
such as 80 for hypertext transfer protocol (HTTP) web traffic
or 25 for Simple Mail Transfer Protocol (SMTP) email traffic.
Week 1: Lesson 1
Configure SOHO Networks
The WAN interface of the router connects the SOHO
network to the Internet.
SOHO router can be called customer premises equipment
(CPE)
Internet Service Providers: The major infrastructure of the
Internet consists of high bandwidth trunks connecting
Internet eXchange Points (IXPs)
Week 1: Lesson 1
Configure SOHO Networks
Internet Standard
• Internet Assigned Numbers Authority (IANA) (iana.org)
• Internet Engineering Task Force (IETF) (ietf.org)
Week 1: Lesson 1
Configure SOHO Networks
Hexadecimal notation
Binary notation
Decimal notation
Week 1: Lesson 1
Configure SOHO Networks
Week 1: Lesson 1
Configure SOHO Networks
Step 1: Download packet tracer
https://www.netacad.com/resources/lab-downloads?courseLang=e
n-US
Packet Tracer 8.2.2 MacOS 64bit
Packet Tracer 8.2.2 Ubuntu 64bit
Packet Tracer 8.2.2 Windows 64bit
Step 2. Launch the Packet Tracer install program.
Step 3. Launch Cisco Packet Tracer by selecting the appropriate
icon.
Step 4. When prompted, click on Skills For All green button to
authenticate.
Step 5. Cisco Packet Tracer will launch, and you are ready to
Week 1: Lesson 1
Configure SOHO Networks
Router>enable [ privileged exec mode]
Router#config t [global configuration
mode]
Router(config)#hostname Eduvos-router [label your router]
Eduvos-router(config)# enable secret class [set encrypted password]
Eduvos-router(config)# line con 0 [configure password for console]
Eduvos-router(config-line)# password cisco [set the password]
Eduvos-router(config-line)# login [password prompt]
Eduvos-router(config-line)# exit [return to global config mode]
Eduvos-router(config)# line vty 0 4 [configure password for virtual
terminal lines]
Eduvos-router(config-line)# password cisco [set the password]
Eduvos-router(config-line)# login [password prompt]
Eduvos-router(config-line)# exit [return to global config mode]
Week 1: Lesson 1
Configure SOHO Networks
Eduvos-router(config)# int fa0/0 [configure FastEthernet]
Eduvos-router(config-if)# ip add 192,168,1,1 255,255,255,0 [configure
IP address]
Eduvos-router(config-if)# desc Router FastEthernet0/0 [describe the
interface]
Eduvos-router(config-if)# no shutdown [start the interface]
Eduvos-router(config-if)# exit [return to global config mode]
Eduvos-router(config)# int fa0/1 [configure FastEthernet]
Eduvos-router(config-if)# ip add 192,168,2,1 255,255,255,0 [configure
IP address]
Eduvos-router(config-if)# desc Router FastEthernet0/1 [describe the
interface]
Eduvos-router(config-if)# no shutdown [start the interface]
Eduvos-router(config-if)# exit [return to global config mode]
Week 1: Lesson 1
Configure SOHO Networks
Eduvos-router()# exit [Hit Enter]
Eduvos-router()# show running-config [display current configuration] [Hit
Enter]
Eduvos-router()# copy running-config startup-config [Hit Enter]
Set static IP address on PC0
Desktop
Select Static
Type 192,168,1,1
Set static IP address on PC1
Desktop
Select Static
Type 192,168,2,1
Week 1: Lesson 1
Configure SOHO Networks
Ping PC1 from PC0
Ping 192,168,2,2
You should get a reply
Simulation mode
Show all
Edit
Select ICMP
Pick a PDU
Click the PDU on PC0 and on PC1
Observe how the PDU travels on the network
Week 1: Lesson 3
Ethernet Cabling
• Network Data Transmission
• Ethernet Standards
Week 1: Lesson 3
Ethernet Cabling
• Data is transmitted via
electromagnetic radiation
• This could be through electric current,
infra-red, or radio waves
• Type of media determines the
bandwidth or range of frequency
Week 1: Lesson 3
Ethernet Cabling
Ethernet standards provide the
assurance that network cabling will
meet the bandwidth requirements of
applications. The standards specify the
bit rate that should be achieved over
different types of media up to the
supported distance limitations.
Week 1: Lesson 3
Ethernet Cabling
Ethernet standard specifications are
named using a three-part convention,
which is often referred to as xBASE-y.
This describes:
The bit rate in megabits per second
(Mbps) or gigabits per second (Gbps).
Week 1: Lesson 3
Ethernet Cabling
Ethernet Standards
• The signal mode (baseband or broadband). All
mainstream types of Ethernet use baseband
transmissions, so you will only see
specifications of the form xBASE-y.
Week 1: Lesson 3
Ethernet Cabling
Ethernet Standards
• A designator for the media type.
For example, 10BASE-T denotes an early
implementation that works at 10 Mbps (10), uses
a baseband signal (BASE), and runs over twisted
pair copper cabling (-T).
Week 1: Lesson 3
Ethernet Cabling
Media Access Control and Collision
Domains
Media access control (MAC) refers to the
methods a network technology uses to
determine when nodes can communicate
on shared media and to deal with possible
problems, such as two devices attempting
to communicate simultaneously.
Week 1: Lesson 3
Ethernet Cabling
100BASE-TX Fast Ethernet Standard
•The Fast Ethernet standard uses the same
CSMA/CD protocol as 10BASE-T but with
higher frequency signaling and improved
encoding methods, raising the bit rate from
10 Mbps to 100 Mbps.
Week 1: Lesson 3
Ethernet Cabling
100BASE-TX Fast Ethernet Standard
•100BASE-TX refers to Fast Ethernet
working over Cat 5 (or better) twisted pair
copper cable with a maximum supported
link length of 100 meters (328 feet)
Week 1: Lesson 3
Ethernet Cabling
100BASE-TX Fast Ethernet Standard
•100BASE-TX refers to Fast Ethernet
working over Cat 5 (or better) twisted pair
copper cable with a maximum supported
link length of 100 meters (328 feet)
Week 1: Lesson 3
Ethernet Cabling
Gigabit Ethernet Standards
Gigabit Ethernet builds on the standards defined
for Ethernet and Fast Ethernet to implement
rates of 1000 Mbps (1 Gbps). Over copper wire,
Gigabit Ethernet is specified as 1000BASE-T,
working over Cat 5e or better. Gigabit Ethernet
does not support hubs; it is implemented only
using switches.
Week 1: Lesson 3
Ethernet Cabling
Gigabit Ethernet Standards
Gigabit Ethernet builds on the standards defined
for Ethernet and Fast Ethernet to implement
rates of 1000 Mbps (1 Gbps). Over copper wire,
Gigabit Ethernet is specified as 1000BASE-T,
working over Cat 5e or better. Gigabit Ethernet
does not support hubs; it is implemented only
using switches.
Week 1: Lesson 3
Ethernet Cabling
Gigabit Ethernet Standards
Gigabit Ethernet builds on the standards defined
for Ethernet and Fast Ethernet to implement
rates of 1000 Mbps (1 Gbps). Over copper wire,
Gigabit Ethernet is specified as 1000BASE-T,
working over Cat 5e or better. Gigabit Ethernet
does not support hubs; it is implemented only
using switches.
Week 2: Lesson 2
Deploying Ethernet Cabling
• Summarize Ethernet standards
• Summarize copper cabling types.
• Summarize fiber optic cabling
types.
• Deploy Ethernet cabling.
Week 2: Lesson 2
Deploying Ethernet Cabling
Learning Outcome
• Demonstrate an understanding of networking
principles.
• Demonstrate knowledge about the
communication principles of networks.
Week 2: Lesson 2
Deploying Ethernet Cabling
Types of Cable
• Copper
• Fibre
Week 2: Lesson 2
Deploying Ethernet Cabling
Types of Copper Cable
Unshielded Twisted Pair Cable
• One pair of insulated wires twisted
together forms a balanced pair.
Week 2: Lesson 2
Deploying Ethernet Cabling
Types of Copper Cable
Unshielded Twisted Pair Cable
•The pair carry the same signal but
with different polarity; one wire is
positive, and the other is negative.
Week 2: Lesson 2
Deploying Ethernet Cabling
Types of Copper Cable
Unshielded Twisted Pair Cable
This allows the receiver to distinguish the
signal from any noise more strongly. The
cable is completed with an insulating outer
jacket.
Week 2: Lesson 2
Deploying Ethernet Cabling
Types of Copper Cable
Shielded and Screened Twisted
Pair Cable
• Shielded cable is less susceptible
to interference and crosstalk.
Week 2: Lesson 2
Deploying Ethernet Cabling
Types of Copper Cable
Shielded and Screened Twisted
Pair Cable
•This type of cable is required for some Ethernet
standards and may also be a requirement in
environments with high levels of interference.
Week 2: Lesson 2
Deploying Ethernet Cabling
Types of Copper Cable
Shielded and Screened Twisted
Pair Cable
•Shielded cable can be referred to generically as
shielded twisted pair (STP),
Week 2: Lesson 2
Deploying Ethernet Cabling
Cable Standards
• These Ethernet media specifications are
named using a three-part convention,
which is often referred to as xBASE-y.
This describes:
Week 2: Lesson 2
Deploying Ethernet Cabling
Cable Standards
• The bit rate in megabits per second
(Mbps) or gigabits per second (Gbps).
Week 2: Lesson 2
Deploying Ethernet Cabling
Cable Standards
• The signal mode (baseband or
broadband). All mainstream types of
Ethernet use baseband transmissions, so
you will only see specifications of the
form xBASE-y.
• A designator for the media type.
Week 2: Lesson 2
Deploying Ethernet Cabling
Cable Standards
• For example, 10BASE-T denotes an early
implementation that works at 10 Mbps
(10), uses a baseband signal (BASE), and
runs over twisted pair copper cabling (-
T).
Week 2: Lesson 2
Deploying Ethernet Cabling
Cable Standards
• American National Standards Institute
(ANSI)
• Telecommunications Industry Association
(TIA)/Electronic Industries Alliance (EIA)
Week 2: Lesson 2
Deploying Ethernet Cabling
Attendance code
ltglty
08-10-2024 15h00 – 17h00
Week 2: Lesson 2
Deploying Ethernet Cabling
Cable Standards: Copper
•Twisted pair copper cabling
uses Registered Jack (RJ) connectors
for the physical interface. There are
many different types of RJ connector,
identified by numbers (and sometimes
Week 2: Lesson 2
Deploying Ethernet Cabling
Cable Standards: Copper
• American National Standards Institute
(ANSI)
• Telecommunications Industry Association
(TIA)/Electronic Industries Alliance (EIA)
Week 2: Lesson 2
Deploying Ethernet Cabling
Cable Standards : Copper
•Each conductor in a 4-pair data cable is
color-coded. Each pair is assigned a color
(Blue, Orange, Green, or Brown).
Week 2: Lesson 2
Deploying Ethernet Cabling
Cable Standards: Copper
•The first conductor in each pair has a
predominantly white insulator with strips of
the color; the second conductor has an
insulator with the solid color
Week 2: Lesson 2
Deploying Ethernet Cabling
Cable Standards: Copper
•The first conductor in each pair has a
predominantly white insulator with strips of
the color; the second conductor has an
insulator with the solid color
Week 2: Lesson 2
Deploying Ethernet Cabling
Fibre
• Fiber optic signaling uses pulses of
infrared light, which are not
susceptible to interference, cannot
easily be intercepted, and suffer less
from attenuation.
Week 2: Lesson 2
Deploying Ethernet Cabling
Fibre
Consequently, fiber optic cabling
supports higher bandwidth over longer
cable runs (that can be measured in
kilometers, rather than meters).
Week 2: Lesson 2
Deploying Ethernet Cabling
Fibre
Consequently, fiber optic cabling
supports higher bandwidth over longer
cable runs (that can be measured in
kilometers, rather than meters).
Week 2: Lesson 2
Deploying Ethernet Cabling
Fibre Optics
Consequently, fiber optic cabling
supports higher bandwidth over longer
cable runs (that can be measured in
kilometers, rather than meters).
Week 2: Lesson 2
Deploying Ethernet Cabling
Fibre Optics
1. Single Mode Fiber (SMF)
2. Multimode Fiber (MMF)
Week 2: Lesson 2
Deploying Ethernet Cabling
Fibre Optics
1. Single Mode Fiber (SMF) has a
small core (8 to 10 microns) and a
long wavelength, near-infrared
(1310 nm or 1550 nm) light signal,
generated by a laser.
Week 2: Lesson 2
Deploying Ethernet Cabling
Fibre Optics
2. Multimode Fiber (MMF) has a
larger core (62.5 or 50 microns) and
shorter wavelength light (850 nm or
1300 nm) transmitted in multiple
waves of varying lengths.
Week 2: Lesson 2
Deploying Ethernet Cabling
Fibre Optics
MMF uses less expensive optics and
consequently is less expensive to
deploy than SMF.
Week 2: Lesson 2
Deploying Ethernet Cabling
Fiber Optic Connector Types
•Straight Tip
•Mechanical Transfer Registered Jack
Week 2: Lesson 2
Deploying Ethernet Cabling
Fiber Optic Connector Types
•Straight Tip
•Mechanical Transfer Registered Jack
Week 2: Lesson 2
Deploying Ethernet Cabling
Fiber Ethernet Standards
Ethernet standards over fiber set out
the use of different cable types for 100
Mbps, 1 Gbps, and 10 Gbps operation.
The table below shows the different
fiber standards
Week 2: Lesson 2
Deploying Ethernet Cabling
Finishing Type
The core of a fiber optic connector is a
ceramic or plastic ferrule that holds the
glass strand and ensures continuous
reception of the light signals. The tip of the
ferrule can be finished in one of three
formats:
Week 2: Lesson 2
Deploying Ethernet Cabling
•Physical Contact (PC)
•Ultra Physical Contact (UPC)
•Angled Physical Contact (APC)
Week 2: Lesson 2
Deploying Ethernet Cabling
•Physical Contact (PC)
•Ultra Physical Contact (UPC)
•Angled Physical Contact (APC)
Week 2: Lesson 5
Deploying Ethernet Cabling
•Physical Contact (PC)
•Ultra Physical Contact (UPC)
•Angled Physical Contact (APC)
Week 2: Lesson 5
Deploying Ethernet Cabling
Attendance code
8il05c
09-10-2024 08h00 – 09h50
Week 2: Lesson 5
Deploying Ethernet Cabling
Structured Cabling
Horizontal cabling refers to the cabling system that connects
telecommunications rooms (TRs) to individual workstations
or devices on the same floor of a building. It typically
includes the cabling that runs between the equipment room
(ER) or telecommunications closet (TC) and the wall outlets
or work area endpoints.
Week 2: Lesson 5
Deploying Ethernet Cabling
Structured Cabling
Wall socket
Week 2: Lesson 5
Week 2: Lesson 5
Punch-down
Block
A punch-down block is a
connection device that allows wires to be
terminated and connected
using insulation-
displacement connection
(IDC) terminals, where the
wire is "punched down" into
the block with a special tool,
securing the connection
without needing to strip the
wire's insulation
Week 2: Lesson 5
Deploying Ethernet Cabling
Punch-down block
• 66 Block
• 110 Block
• BIX and Krone Distribution Frames
• Patch Panel/Patch Bay
Week 2: Lesson 5
Deploying Ethernet Cabling
Punch-down block
• 66 Block
• 110 Block
• BIX and Krone Distribution Frames
• Patch Panel/Patch Bay
Week 2: Lesson 5
Deploying Ethernet Cabling
Wiring Tools and Techniques
• Electrician’s scissors (snips)
• cable stripper
• punchdown tool
• cable crimper.
Week 2: Lesson 5
Deploying Ethernet Cabling
Wiring Tools and Techniques
• Electrician’s scissors (snips)
• cable stripper
• punchdown tool
• cable crimper.
Week 2: Lesson 5
Deploying Ethernet Cabling
Fiber Distribution Panels and Fusion
Splicing
Week 2: Lesson 5
Deploying Ethernet Cabling
Fiber Distribution Panels and Fusion
Splicing
Permanent cables are run through conduit-to-wall
ports at the client access end and a fiber
distribution panel at the switch end. Fiber patch
cables are used to complete the link from the wall
port to the NIC and from the patch panel to the
switch port. The Fibre distribution Pannel is shown
Week 2: Lesson 5
Week 2: Lesson 5
Deploying Ethernet Cabling
Fiber transceiver
A transceiver is used when different cable types to
convert from one cable type to another for
example from fiber to ethernet or vice versa.
•Enterprise switches and routers are available with
modular, hot-swappable transceivers/media
converters for different types of fiber optic patch
cord connections.
Week 2: Lesson 5
Deploying Ethernet Cabling
Fiber transceiver
The following are media converter form
factors;
•Gigabit Interface Converter (GBIC) form
factor
•Small Form Factor Pluggable (SFP)
•Quad small form-factor pluggable (QSFP)
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Demonstrate understanding of wireless
networks
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Attendance code
wyqacz
10-10-2024 15h00 – 16h50
Week 3: Lesson 6
OSI model review
https://youtu.be/vv4y_uOneC0?si=QVU
PnvzJAwU0B_JU
Computer Networking
Technologies
ITCTA1
Eduvos (Pty) Ltd (formerly Pearson Institute of Higher Education) is registered with the Department of Higher Education and Training as a private higher education institution under the
Higher Education Act, 101, of 1997. Registration Certificate number: 2001/HE07/008
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Demonstrate understanding of wireless
networks
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Attendance code
3luasr
15-10-2024 15h00 – 16h50
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
• Explain how signals are interchanged between
nodes
• Determine the crucial aspects of wireless
transmission
• Design the architecture of a wireless LAN
• Distinguish between the different wireless
protocols
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Attendance 5 min
Review of last lesson 10 min
First session 35 min
Break 10 min
Second session 25 min
Question & Answer 20 min
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
A Collision Domain is a network segment where
data packets can "collide" with one another when
two devices attempt to send messages
simultaneously
A Broadcast Domain is a network segment
where a broadcast message sent by one device is
received by all other devices within the same
domain
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Hubs
Functionality: Hubs are basic networking
devices that operate at OSI Layer 1 (Physical
Layer).
They do not differentiate between devices
connected to them and simply forward all
incoming signals to all ports.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Hubs
Collision Domains: All devices connected to a
hub share a single collision domain.
This means that when multiple devices try to
send data at the same time, a collision occurs,
and the devices need to retransmit the data.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Hubs
Broadcast Domains: Hubs do not separate
broadcast domains. Any broadcast or multicast
traffic is sent to all devices connected to the
hub.
Therefore, the entire network connected to the
hub shares a single broadcast domain.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Hubs
Half-Duplex Operation: Devices connected to a
hub operate in half-duplex mode, meaning they
can either send or receive data, but not both
simultaneously.
This increases the chance of collisions,
especially in larger networks.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Repeaters
Functionality: Repeaters also operate at OSI
Layer 1 (Physical Layer).
Their main function is to regenerate or amplify
network signals to extend the physical distance
over which data can travel without signal
degradation.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Repeaters
Collision Domains: Like hubs, repeaters do not
create separate collision domains. All devices
connected through a repeater remain part of
the same collision domain.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Repeaters
Broadcast Domains: Repeaters do not impact
broadcast domains either.
They simply pass on the electrical signal, and
broadcast traffic will continue to be sent to all
connected devices in the network segment,
maintaining a single broadcast domain.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Repeaters
Duplex Mode: Repeaters do not influence duplex
modes directly but are typically part of a network
where half-duplex is used.
However, they are transparent to this, meaning
the devices connected can operate in half-duplex
or full-duplex depending on the network
configuration.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Repeaters
Duplex Mode: Repeaters do not influence duplex
modes directly but are typically part of a network
where half-duplex is used.
However, they are transparent to this, meaning
the devices connected can operate in half-duplex
or full-duplex depending on the network
configuration.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Both hubs and repeaters operate at OSI Layer
1 (Physical Layer) and do not have any logic to
manage traffic, separate collision or broadcast
domains, or control duplex communication.
They simply forward signals to all devices, which
can lead to performance issues in larger
networks.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Bridges
Functionality: A bridge is a device that operates
at OSI Layer 2 (Data Link Layer). It is used to
divide a large network into smaller segments,
reducing collisions and improving network
efficiency.
A bridge inspects incoming data packets,
determines the destination, and then forwards
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Bridges
Collision Domains: Bridges create separate
collision domains. This means each network
segment connected to a bridge has its own
collision domain, reducing the chance of
collisions and improving network performance.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Bridges
Broadcast Domains: A bridge does not separate
broadcast domains. Devices connected to the
bridge still share a single broadcast domain,
so broadcast traffic will be forwarded to all
segments.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Bridges
Duplex Mode: Bridges allow devices to operate in
full-duplex mode, meaning devices can send
and receive data simultaneously, which reduces
collisions and improves throughput.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Attendance code
mtvaej
16-10-2024 08h00 – 09h50
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Switches
Functionality: A switch, like a bridge, operates at
OSI Layer 2 (Data Link Layer). It is essentially a
multi-port bridge with the ability to intelligently
forward packets based on MAC addresses.
Switches maintain a MAC address table that
maps each device to its corresponding port,
ensuring that data is only sent to the device it's
intended for.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Switches
Collision Domains: Switches create separate
collision domains for each port. Each device
connected to a switch has its own dedicated
collision domain, which virtually eliminates
collisions and improves network efficiency.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Switches
Broadcast Domains: By default, all devices
connected to a switch still share a single
broadcast domain, meaning broadcast traffic is
sent to all ports.
However, switches can also be configured with
VLANs (Virtual LANs), which allow the creation of
multiple broadcast domains within a switch.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Switches
Duplex Mode: Switches support full-duplex
communication, allowing devices to send and
receive data simultaneously.
This further enhances network performance by
reducing the potential for collisions.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Key Differences:
Collision Domains: Both bridges and switches create separate
collision domains, but switches do so more effectively since each
port has its own collision domain.
Broadcast Domains: Both devices allow a single broadcast domain
by default, but switches can be configured with VLANs to separate
broadcast domains.
Ports: Bridges typically have fewer ports, often just two (one for
each network segment), while switches have many more ports,
making them suitable for larger networks.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Summary
• Bridges and switches operate at OSI Layer 2 (Data Link Layer).
• Both help reduce collisions by creating separate collision
domains.
• Both maintain a single broadcast domain unless VLANs are
configured (for switches).
• Switches are more scalable and offer better performance than
bridges, as they provide a dedicated collision domain for each
connected device.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Short break
Classes resume 09h10
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Routers
Functionality: A router operates at OSI Layer 3
(Network Layer). Its primary function is to route
data between different networks by examining
the destination IP address in each data packet.
Routers use routing tables and protocols to
determine the best path for forwarding packets to
their destination across interconnected networks,
such as the internet.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Routers
Collision Domains: Routers do not directly affect
collision domains, but they separate networks
into different collision domains.
Each interface of a router connects to a different
network segment, and each segment has its own
collision domain. This improves network
performance because collisions are confined to
individual network segments
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Routers
Broadcast Domains: Routers separate
broadcast domains. A router does not forward
broadcast traffic (such as ARP requests) from one
network to another.
This ensures that broadcast traffic stays within its
local network, reducing unnecessary congestion
in other networks.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Routers
Duplex Mode: Routers typically support full-
duplex communication, allowing data to be
sent and received simultaneously on each
network interface.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Routers
Routing: Routers determine the best path for
data using routing protocols such as OSPF
(Open Shortest Path First), BGP (Border
Gateway Protocol), or RIP (Routing Information
Protocol).
These protocols enable routers to communicate
with each other, share information about
network topology, and dynamically adjust
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Media Converters
Functionality: A media converter is a device that operates
at OSI Layer 1 (Physical Layer) and sometimes at OSI
Layer 2 (Data Link Layer) if it deals with frame
conversion.
Its main purpose is to convert signals between different
types of media, such as copper (Ethernet) and fiber optic
cabling. Media converters allow different physical media
types to coexist within the same network, enabling
seamless data transmission across diverse network
infrastructure.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Media Converters
Collision Domains: Since media converters operate at the
physical or data link layer, they do not affect collision
domains. Devices connected to a media converter still
share the same collision domain, similar to how hubs and
repeaters function.
The media converter simply changes the signal type
without managing traffic or collisions.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Media Converters
Broadcast Domains: Media converters also do not
separate broadcast domains. Any broadcast traffic on one
side of the media converter will be forwarded to the other
side.
Broadcast traffic remains intact as the converter only
handles the physical or frame conversion of data.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Media Converters
Duplex Mode: Media converters can support both half-
duplex and full-duplex modes, depending on the network
devices connected to them.
However, the converter itself doesn't manage duplex
settings, as its function is purely related to signal
conversion.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Media Converters Types
1. Copper to Fiber Converters
2. Single-mode to Multi-mode Fiber Converters
3. Ethernet Speed Converters:
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Types of Media Converters:
1. Copper to Fiber Converters: These are the
most common media converters, used to
connect copper Ethernet networks (using
twisted pair cables) to fiber optic networks,
enabling extended network reach due to
fiber's longer transmission distances.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Types of Media Converters:
2. Single-mode to Multi-mode Fiber
Converters:
These are used to connect different types
of fiber optic cables. Single-mode fiber is
typically used for long-distance
transmission, while multi-mode fiber is
used for shorter distances.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Types of Media Converters:
3. Ethernet Speed Converters: Some media
converters can convert data rates, allowing
devices with different Ethernet speeds
(e.g., 10/100/1000 Mbps) to communicate
over the same network.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Transmission Media
1. Copper cabling
1. Coaxial cable,
2. Twisted pair cable
2. Fiber Optic Cabling
1. Single-mode fiber
2. Multimode fiber
3. Wireless transmission
1. Radio waves
2. Microwaves
3. Infrared waves
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Network Interfaces
The Network Interface Card (NIC) provides the physical
interface between the transmission medium (such as Ethernet)
and the device (node).
Ethernet cabling support 10/100/1000 operation
• 10BASE-T (10 Mbps)
• Fast Ethernet (100 Mbps)
• Gigabit Ethernet (1000 Mbps)
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Ethernet Frame Format
When data is transmitted over Ethernet, it is encapsulated within
a structure known as a frame. The Ethernet frame contains
various headers and fields that control how data is handled by the
network. An Ethernet frame includes information such as source
and destination MAC addresses, the data payload, and error-
checking codes to ensure that the data is received intact.
Preamble SFD Destination
MAC
Source
MAC
Ether
Type
Payload
FCS
Basic Ethernet Frame Format
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Ethernet Frame Format
1. Preamble (7 Bytes)
The preamble consists of alternating 1s and 0s, and its
main function is to synchronize communication between
sender and receiver by indicating the start of a frame.
Preamble SFD Destination
MAC MAC
Source Ether
Type
Payload
FCS
Basic Ethernet Frame Format
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Attendance code
y5g9o2
17-10-2024 15h00 – 16h50
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Ethernet Frame Format
2. Start Frame Delimiter (SFD) (1 Byte)
This is a specific sequence (10101011) that
marks the end of the preamble and signals
the actual beginning of the Ethernet frame.
Preamble SFD Destination
MAC
Source
MAC
Ether
Type
Payload
FCS
Basic Ethernet Frame Format
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Ethernet Frame Format
3. Destination MAC Address (6 Bytes)
This field contains the MAC address of the
device that is intended to receive the
frame. It's used to identify the receiver
within the local network.
Preamble
SFD Destination
MAC
Source
MAC
Ether
Type
Payload
FCS
Basic Ethernet Frame Format
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Ethernet Frame Format
4. Source MAC Address (6 Bytes)
This field contains the MAC address of the
device that is sending the frame. It
identifies the sender.
Preamble SFD Destination
MAC
Source
MAC
Ether
Type
Payload
FCS
Basic Ethernet Frame Format
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Ethernet Frame Format
5. EtherType / Length (2 Bytes)
If the value is greater than 1536 (0x0600 in hexadecimal), it indicates
the EtherType, which specifies the protocol encapsulated in the frame
(e.g., IPv4, ARP). If the value is less than or equal to 1536, it specifies
the length of the payload in bytes.
Preamble SFD Destination
MAC
Source
MAC
Ether
Type
Payload
FCS
Basic Ethernet Frame Format
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Ethernet Frame Format
6. Payload (46–1500 Bytes)
This is the actual data being transmitted. It
contains the encapsulated protocol data (such as
an IP packet). If the payload is less than 46 bytes,
padding is added to meet the minimum Ethernet
frame size of 64 bytes.
Preamble
SFD Destination
MAC
Source
MAC
Ether
Type
Payload
FCS
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Ethernet Frame Format
7. Frame Check Sequence (FCS) (4 Bytes)
The FCS is a checksum value used to detect errors
in the frame. The sender calculates a Cyclic
Redundancy Check (CRC) and appends it here. The
receiver recalculates the CRC and compares it to
this value to ensure data integrity.
Preamble SFD Destination
MAC
Source
MAC
Ether
Type
Payload
FCS
Basic Ethernet Frame Format
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Ethernet Frame Format
• Preamble – Synchronizes sender and receiver.
• SFD – Marks the start of the frame.
• Destination MAC Address – Identifies the receiving device.
• Source MAC Address – Identifies the sending device.
• EtherType/Length – Identifies the protocol or specifies the
frame length.
• Payload – Carries the data being transmitted.
• FCS – Ensures data integrity through error checking.
Preamble SFD Destination
MAC MAC
Ether Payload
Source
TypeFormat
FCS
Basic Ethernet Frame
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Short break
Classes resume 16h10
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting
• Protocol analyzers
• Packet sniffers
A protocol analyzer inspects the traffic received by a host or passing
over a network link, providing deep insights into the protocols in use,
the structure of the frames, and any potential issues.
A packet sniffer is a specific type of protocol analyzer used to
Preamble
capture frames as they move across the network. For
example, Wireshark
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting
• Protocol analyzers
• Packet sniffers
A protocol analyzer inspects the traffic received by a host or passing
over a network link, providing deep insights into the protocols in use,
the structure of the frames, and any potential issues.
A packet sniffer is a specific type of protocol analyzer used to
Preamble
capture frames as they move across the network. For
example, Wireshark
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting
• Protocol analyzers
• Packet sniffers
A protocol analyzer inspects the traffic received by a host or passing
over a network link, providing deep insights into the protocols in use,
the structure of the frames, and any potential issues.
A packet sniffer is a specific type of protocol analyzer used to
Preamble
capture frames as they move across the network. For
example, Wireshark
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Network Evaluation
A network is a system of interconnected devices,
such as computers, servers, printers, and other
equipment, that communicate and share resources
Networks operate through a combination of
hardware and software. Devices communicate by
sending data in small units called packets. These
Preamble
packets travel across the network using switches
and routers, which ensure that the data reaches its
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Network Evaluation
The process of communication within a network
relies on protocols. The most common protocol is
the Internet Protocol (IP), which provides unique
addresses to devices on the network, allowing
them to communicate effectively.
Another key protocol is Transmission Control
Preamble
Protocol (TCP), which ensures that data is
transmitted reliably between devices.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Why Networks are Important
Networks play a crucial role in both personal and
business environments for several key reasons:
• Resource sharing – hardware, file, software
• Data access & Collaboration – share data and
collaboration in real time
• Communication - email, messages, video
Preamble
conferencing
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Why Networks are Important
Networks play a crucial role in both personal and
business environments for several key reasons:
• Scalability – expansion
• Security and centralized management – data
access, security policies, monitoring across
connected devices
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Why is Network Evaluation Important
• Performance lapses – bandwidth, inefficient routing, high
latency (delay in data transfer)
• Security – firewalls, encryption, access control
• Reliability – uninterrupted service
• Scalability – Growth(devices)
Preamble
• Compliance – regulatory standards
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Steps in Network Evaluation
1. Document your Network Infrastructure
2. Monitor your Network’s Performance
3. Security (audits)
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Attendance code
qvu5xl
22-10-2024 15h00 – 16h50
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Steps in Network Evaluation
1. Document your Network Infrastructure
2. Monitor your Network’s Performance
3. Security (audits)
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Steps in Network Evaluation
1. Document your Network Infrastructure
2. Monitor your Network’s Performance
3. Security (audits)
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Steps in Network Evaluation
4. Network Policy review
5. Check device health (firmware, software bugs,
hardware failures)
6. Create action plan (upgrade, network configs,
new security measures)
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Network Evaluation Tools
• Network monitoring tools e.g. SolarWinds, PRTG,
Nagio
• Vulnerability scanners e.g. Nessus, OpenVAS
checks for outdated software, misconfigurations
or weak encryption protocols
Preamble
• Bandwidth analysis tools e.g. Wireshark, Netflow
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting Methodology
1. Identify the problem
2. Establish a theory of probable cause
3. Test theory to determine cause
4. Establish a plan of action to resolve the problem and
identify potential effects
5. Implement the solution or escalate as necessary
6. Verify full system functionality if applicable and
implement preventive measures
Preamble
7. Document finding, actions and outcomes
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting Methodology
1. Cable issues
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting Methodology
2. Network interface card
• Solid green—The link is connected but there is no traffic.
• Flickering green—The link is operating normally (with traffic).
The blink rate indicates the link speed.
• No light—The link is not working, or the port is shut down.
• Blinking amber—A fault has been detected (duplex mismatch,
excessive collisions, or redundancy check errors, for instance).
• Solid amber—The port is blocked by the spanning tree algorithm,
which works to prevent loops within a switched network.
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting Methodology
3. Cable tester
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting Methodology
3. Wire map testers and tone generators
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting Methodology
4. Attenuation and Interference Issues
Cross talk
Termination
Bad cable
Poor network connectors
Interference
Electrical ampliances
Industrial areas
Data centers
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting Methodology
5. Fibre optic cable testing tools
• Fiber Light Meter: Measures optical power (in dBm or μW) to verify
signal strength and detect losses.
• Optical Spectrum Analyzer (OSA): Analyzes optical spectrum to
identify wavelength, power, and signal quality.
• Optical Time Domain Reflectometer (OTDR): Measures fiber length
detects faults and locates breaks or losses along the fiber cable.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Troubleshooting Methodology
Fibre optics
• Dirty optical cables
• Incorrect transceivers
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Network Components
• Network Interface Card
• Cabling and connectors
• Crimping Process
• Routers
• Access Points
• Firewall
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Functions of a Router
• Routing traffic between networks
• IP addressing (NAT: private to public address)
• Firewall and Security
• Dynamic and Static routing
• RIP, OSPF, BGP
• Load balancing
• Wireless access
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Switches
When a switch receives data, it examines the destination
MAC address and directs the data only to the specific
device connected to the corresponding port, thus
preventing broadcast traffic from overwhelming the
network.
This feature, known as unicast forwarding, is particularly
Preamble
useful in environments where multiple devices are active,
such as in office buildings or enterprise networks
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
When to use a Switch
• When multiple devices need to communicate
within a single network (LAN)
• When connecting servers, storage system and
network equipment in data centers
• When increasing bandwidth between devices
(link aggregation)
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Network Evaluation Tools
Tools for evaluating a network's performance, security, and overall health include
• Network Monitoring Tools: Tools such as SolarWinds, PRTG, and Nagios
provide real-time insights into network traffic, bandwidth usage, and device
health. They can alert administrators to potential performance issues before
they become major problems.
• Vulnerability Scanners: Tools like Nessus and OpenVAS are used to scan for
known security vulnerabilities within the network, such as outdated software,
misconfigurations, or weak encryption protocols.
• Bandwidth Analysis Tools: Wireshark and NetFlow help analyze network
traffic patterns and identify bandwidth bottlenecks that could impact network
performance and reliability.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Configuring Network devices
• Physical setup
• IP Addressing and NAT
• Routing configuration
• Security setup
• Wireless setup
Preamble
Week 4: Lesson 6
IPv4 Addressing
Learning Outcomes
Demonstrate understanding of how computer
communicate in a network
Preamble
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Attendance code
ngnu6d
23-10-2024 08h00 – 09h50
Week 4: Lesson 6
IPv4 Addressing
Learning Outcomes
1.1 Explain what computer networks are
1.2 Compare and contrast the Open Systems Interconnection (OSI) model layers
and encapsulation concepts.
1.3 Explore the applicability of the OSI layers in transmission of data in a network.
1.4 Configure SOHO networks..
1.5 Describe addressing and distinguish between an IP address and a MAC
address
1.6 Describe the process of a domain name server resolution and the role of an
IP address.
1.7 Demonstrate an understanding of how addressing works and the roles of IP
and MAC Addresses.
Week 4: Lesson 6
IPv4 Addressing
IP addresses provides logical addressing and packet
forwarding or routing between different networks
Week 4: Lesson 6
IPv4 Addressing
IP addressing is the process of assigning unique
logical address to devices on a network for
communication
• Routing
• Network organization
• Device identification
• Network security
Week 4: Lesson 6
IPv4 Addressing
- IP Address Structure: IP addresses consist of 32-bit (IPv4) or 128-bit (IPv6) binary numbers, typically represented
in dotted decimal (IPv4: xxx.xxx.xxx.xxx) or hexadecimal (IPv6: xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx) notation.
- IP Address Classes: IPv4 addresses are divided into five classes (A-E), determining the network and host portions.
IPv6 does not use classful addressing.
- Subnet Mask: A subnet mask determines the network portion of an IP address, allowing for subnetting and
supernetting.
- Public vs. Private IP Addresses: Public IP addresses are routable on the internet, while private IP addresses (e.g.,
192.168.x.x, 10.x.x.x) are used internally and require NAT (Network Address Translation) for internet access.
- IPv4 vs. IPv6: IPv4 (32-bit) has limited address space, whereas IPv6 (128-bit) provides vastly more addresses,
supporting future internet growth and IoT devices.
Week 4: Lesson 10
IPv4 Addressing
Addressing at Different Layers
• Data Link Layer MAC Address: Every Network Interface Card (NIC) in the world is
assigned a unique MAC address at the Data Link Layer. A MAC address is a 48-bit
identifier usually written as six hexadecimal digits separated by colons (e.g.,
00:60:8C:00:54:99). MAC addresses allow devices within a local area network (LAN) to
communicate with each other. MAC addressing is essential for device-to-device
communication within the same network segment.
• Network Layer IP Address: An IP address is issued to every network interface or
node connection at the Network Layer. If a device’s IP address is publicly accessible on
the Internet, it can be located by other devices. Browsers, applications, and services rely
on IP addresses to send and retrieve information. The primary function of an IP address is
for routing traffic between devices on different
Week 4: Lesson 10
IPv4 Addressing
IP Addressing
There are two main methods to assign an IP address to a device:
•Static IP Addressing: A static IP address is manually assigned and
remains constant over time. This is often used for servers and
devices that need a consistent address for other devices to connect
to.
•Dynamic IP Addressing (via DHCP): A Dynamic Host
Configuration Protocol (DHCP) server assigns IP addresses
dynamically. Devices request an IP address from the DHCP server
whenever they connect to the network, ensuring there are no
conflicts and reducing administrative overhead.
Week 4: Lesson 10
IPv4 Addressing
IPv4 Addressing
IPv4 (Internet Protocol version 4) is the fourth version of the Internet Protocol and remains the core
protocol used to route most internet traffic. It is a connectionless protocol, meaning that data is
transmitted to the receiver without checking whether the recipient is available. This can sometimes
lead to packet loss or retransmissions but simplifies the protocol's operation.
• Loopback (localhost): Loopback addresses, such as 127.0.0.1, are used to test the IP stack on a
local machine. Any IP address in the range 127.0.0.1 to 127.255.255.254 is reserved for loopback
testing.
• Layer 2 Broadcasts: These broadcasts are sent to all nodes within a LAN, using the MAC address as
the destination.
• Layer 3 Broadcasts: These broadcasts are sent to all nodes within the network, using the IP
address to target all devices (e.g., 255.255.255.255).
• Unicast: A unicast address is used to send data to a single specific destination device, identified by
its IP address.
• Multicast: A multicast address is used to send packets from a single source to multiple recipients
across different networks. This is often referred to as “one-to-many” communication.
Week 3: Lesson 6
Ethernet Switches & Troubleshooting
Attendance code
ngnu6d
23-10-2024 08h00 – 09h50
Week 4: Lesson 10
IPv4 Addressing
IPv6 Addressing
IPv6 was created to overcome the limitations of IPv4, such as the limited address space. It
enhances routing capabilities, speeds up communication, and allows for many more unique
public IP addresses.
• IPv6 addresses are 128-bit in length and are written as eight blocks (quartets) of
hexadecimal digits separated by colons, e.g.,
2001:0DB8:0B80:0000:0000:00D3:9C5A:00CC.
• Each block in the address is 16 bits long. For example, the first block 2001 is represented
in binary as 0010 0000 0000 0001.
• Leading zeroes can be omitted from a four-character hex block, so
2001:0000:B80:0000:0000:D3:9C5A:CC is a valid shorthand.
• If an entire block contains only zeroes, it can be replaced with double colons (::).
However, this can only be done once in an address to avoid confusion. For example,
2001::B80:0000:0000:D3:9C5A:CC is equivalent to 2001:0000:B80::D3:9C5A:CC.
Week 4: Lesson 10
IPv4 Addressing
Port
- A logical connection point for devices to communicate
- Identifies a specific process or service on a device
Types of Ports:
- Physical Ports (e.g., Ethernet, USB)
- Logical Ports (e.g., TCP/UDP ports)
Key Port Concepts:
- Port Numbers (0-65535)
- Port States (Open, Closed, Filtered)
- Port Protocols (TCP, UDP, SCTP)
Week 4: Lesson 10
IPv4 Addressing
Port
Common Port Ranges:
- Well-known Ports (0-1023): Standard services (HTTP, FTP, SSH)
- Registered Ports (1024-49151): Registered services (MySQL, PostgreSQL)
- Private Ports (49152-65535): Custom or dynamic ports
Port Functions:
- HTTP (80), HTTPS (443): Web services
- FTP (20, 21): File transfer
- SSH (22): Secure remote access
- DNS (53): Domain name resolution
Importance of Ports:
- Enables multiple services on a single IP address
- Facilitates network communication and connectivity
- Crucial for network security and firewall configuration
Week 4: Lesson 10
IPv4 Addressing
TCP vs UDP
Week 4: Lesson 10
IPv4 Addressing
TCP vs UDP
• TCP (Transmission Control Protocol): TCP is a connection-oriented protocol
that ensures reliable data transmission. It establishes a connection between the
sender and receiver before data transfer begins, verifying that each packet has
been received correctly. If packets are lost, TCP retransmits them. TCP is
commonly used for services that require data reliability, such as web traffic
(HTTP/HTTPS), email (SMTP), and file transfers (FTP).
• UDP (User Datagram Protocol): UDP is a connectionless protocol that sends
data without establishing a connection. It doesn't guarantee the delivery of
packets, nor does it handle retransmissions. UDP is faster but less reliable than
TCP. It is typically used for services where speed is more critical than reliability,
such as live streaming, online gaming, and DNS queries.
Week 4: Lesson 10
IPv4 Addressing
Port Numbers in Action
• The IP address of a host is like the street address of
a building—this identifies the location (the host) on the network.
• A port number is analogous to an apartment number
in that building. If a device is the building,
the port identifies which "apartment" (process or service)
inside the device should receive the incoming message.
Week 4: Lesson 10
IPv4 Addressing
Socket address
Socket address = IP address + Port number
e.g. 192.168.1.3:21
Week 4: Lesson 10
IPv4 Addressing
Common TCP/UDP Ports
• HTTP (TCP port 80): The standard port for transmitting web pages over the Internet
using the Hypertext Transfer Protocol.
• HTTPS (TCP port 443): Used for secure web traffic, encrypting data between the client
and server using SSL/TLS.
• DNS (UDP port 53): The Domain Name System service that resolves domain names to
IP addresses, allowing users to access websites using human-readable names.
• FTP (TCP ports 20 and 21): Used for file transfers over the network. Port 21 is used to
establish the connection, while port 20 is used to transfer data.
• SMTP (TCP port 25): Simple Mail Transfer Protocol used for sending email between mail
servers.
• DHCP (UDP ports 67 and 68): Used by the Dynamic Host Configuration Protocol to
automatically assign IP addresses to devices on a network.
Week 4: Lesson 10
IPv4 Addressing
Network Troubleshooting
Whether you're diagnosing connectivity issues or verifying configurations, tools like
• ipconfig (Windows only),
• ifconfig (Linux & MacOS), nslookup, and dig (Linux only) provide essential insights.
Ping
Ping, which stands for "Packet Internet Groper," is a tool used to verify that TCP/IP is installed, bound to the NIC,
correctly configured, and communicating with the network. Think of ping as similar to how a whale sends out a signal
and listens for the echo—this echo provides crucial information about the environment and the object that the signal
collided with.
•The ping command sends an echo request to another device on the network. The target device responds with
an echo reply if it is reachable.
•This process uses the ICMP (Internet Control Message Protocol), a lightweight protocol designed to transmit
error messages and information about network conditions.
•Ping is commonly used to test network connectivity and measure the round-trip time for data packets sent from the
source to the destination and back.
Week 4: Lesson 10
IPv4 Addressing
Network Troubleshooting Tools
Windows ipconfig /all
Linux/MacOS ifconfig -a
Week 4: Lesson 10
IPv4 Addressing
Network Troubleshooting Tools
• ping,
• ipconfig, ifconfig,
• nslookup, and
• dig
Week 4: Lesson 10
IPv4 Addressing
Subnetting
Why Subnetting Matters
Subnetting is essential for modern networks, especially as organizations grow and expand. It provides
several key benefits:
• Improved Traffic Management: By dividing a network into smaller subnets, traffic can be confined
within each subnet, reducing the overall traffic load on the network and improving performance.
• Better Security: Subnetting allows administrators to apply specific security policies to different
subnets. For example, sensitive departments such as HR or finance can be placed on isolated
subnets, restricting access from other parts of the network.
• Efficient Use of IP Addresses: Subnetting enables more efficient allocation of IP addresses. In
large networks, subnetting can prevent the waste of IP addresses by ensuring that addresses are
only assigned where needed.
• Broadcast Traffic Containment: Broadcast traffic is limited to each subnet, preventing
unnecessary broadcasts from overwhelming the entire network. This makes the network more
scalable and easier to manage as it grows.
Week 4: Lesson 10
IPv4 Addressing
Subnetting
• Breakdown of logical
IP network
OR
• the division of a larger classful
network into smaller
manageable networks
(called subnets)
Week 4: Lesson 10
IPv4 Addressing
Subnetting
- Divides a larger network into smaller subnets
- Uses a fixed subnet mask
- Conserves IP addresses, improves organization and security
- Example: 192.168.1.0/24 divided into 4 subnets
Week 4: Lesson 10
IPv4 Addressing
Variable Length Subnet Masking
- Uses different subnet masks within a network
- Allows for more efficient IP address use
- Combines subnetting with variable mask lengths
- Example: 192.168.1.0/24, 192.168.2.0/30, 192.168.3.0/28
Week 4: Lesson 10
IPv4 Addressing
Supernetting
- Combines multiple subnets into a larger network
- Uses a shorter subnet mask
- Increases address space, simplifies routing
- Example: 192.168.1.0/24, 192.168.2.0/24 combined into
192.168.0.0/23
Week 4: Lesson 10
IPv4 Addressing
Addressing
• Layer 3 addressing or forwarding (Router)
• Layer 2 addressing or forwarding (Switch)
Week 4: Lesson 10
IPv4 Addressing
IP Networking
• IP address
• MAC address
• Default Gateway
• Address Resolution Protocol (ARP)
o Protocol for device-to-device communication
o ARP request (broadcast message)
o ARP reply
Week 4: Lesson 10
IPv4 Addressing
Comparing Addressing Methods
Each addressing method is suited to different network communication scenarios.
Here’s a summary of when each method is used:
• Multicast: Ideal for one-to-many communication where a single stream of data
needs to reach multiple devices (e.g., video conferencing, IPTV).
• Unicast: The most common form of communication, used for one-to-one
exchanges (e.g., browsing the web, sending emails).
• Broadcast: Useful for delivering messages to all devices in a network (e.g., ARP
requests, DHCP discovery).
• Anycast: Used for optimized delivery to the nearest available device in a
distributed network (e.g., DNS queries, content delivery networks).
Week 4: Lesson 10
IPv4 Addressing
Comparing Addressing Methods
Each addressing method is suited to different network communication scenarios.
Here’s a summary of when each method is used:
• Multicast: Ideal for one-to-many communication where a single stream of data
needs to reach multiple devices (e.g., video conferencing, IPTV).
• Unicast: The most common form of communication, used for one-to-one
exchanges (e.g., browsing the web, sending emails).
• Broadcast: Useful for delivering messages to all devices in a network (e.g., ARP
requests, DHCP discovery).
• Anycast: Used for optimized delivery to the nearest available device in a
distributed network (e.g., DNS queries, content delivery networks).
Week 4: Lesson 10
IPv4 Addressing
Network Segmentation & Subnetting
What is a Network Segment?
A network segment is a portion of a larger network that is isolated or separated
for management purposes. Segments can be divided based on departments,
geographic locations, or specific functions within an organization. By separating
the network into smaller segments, traffic is confined to specific areas, reducing
the amount of unnecessary broadcast traffic and making the network more
efficient.
At the Network Layer (Layer 3), network segments are represented
as subnets. Each subnet functions as an individual network with its own IP
address range, but all subnets are part of the larger organizational network.
Week 4: Lesson 10
IPv4 Addressing
Network Segmentation & Subnetting
https://youtu.be/s_Ntt6eTn94?si=7KLMAlCpZYtC7cYt
https://youtu.be/uyRtYUg6bnw?si=py1LLnUP4I7FIeBV
Week 4: Lesson 10
IPv4 Addressing
Network Segmentation & Subnetting
Network Segmentation is the division of a large network into a smaller manageable
network
A Subnet described the network segment. It is the logical subdivision of an IP network
A Network segment is a small portion of the network isolated for management purpose.
Each subnet is identified by its own range of IP addresses, typically determined by a
combination of the IP address and subnet mask.
Week 4: Lesson 10
IPv4 Addressing
Network Segmentation & Subnetting
Benefits of Network Segmentation with Subnets
•Improved Performance: Subnetting reduces network traffic by confining data
transmission to specific subnets. This minimizes the impact of broadcast traffic on
the overall network, ensuring that devices in one subnet don’t overwhelm others
with unnecessary traffic.
•Enhanced Security: By isolating different parts of the network into subnets,
organizations can implement stricter security controls. For example, sensitive
areas of the network, such as finance or HR, can be placed on their own subnet,
with firewalls and access control lists (ACLs) used to limit who can access these
segments.
Week 4: Lesson 10
IPv4 Addressing
Network Segmentation & Subnetting
Benefits of Network Segmentation with Subnets
•Network Management: Network administrators can manage subnets more
effectively. Network issues, such as troubleshooting or upgrades, can be isolated
to a specific subnet without disrupting the entire network. Subnetting also allows
for efficient IP address allocation and easier monitoring of network activity.
•Scalability: As organizations grow, subnets make it easier to expand networks.
Rather than adding devices to a single large network, administrators can create
new subnets as needed, ensuring that the network infrastructure scales efficiently.
Week 4: Lesson 10
IPv4 Addressing
Network Segmentation & Subnetting
Practical Uses of Subnets
Subnets are used in a wide variety of networking scenarios:
•Departmental Separation: An organization may create separate subnets for
different departments, such as IT, Sales, and Finance. Each department has its
own isolated network environment, improving both security and network
performance.
•Geographic Segmentation: For organizations with multiple office locations,
subnetting can be used to segment networks by location. Each office or branch
can have its own subnet, with a dedicated range of IP addresses.
•VLAN Integration: Subnets can be combined with Virtual Local Area Networks
(VLANs) to further enhance network segmentation. VLANs allow devices to be
grouped logically, regardless of their physical location, and each VLAN can be
assigned its own subnet for traffic isolation.
Week 4: Lesson 10
IPv4 Addressing
Virtual LAN (VLAN)
A Virtual LAN (VLAN) is a logical network
segmentation technique that
• Divides a physical network into multiple virtual
networks
• Groups devices by function, department, or
security requirements
• Enhances security, flexibility, and scalability
Week 4: Lesson 10
IPv4 Addressing
Virtual LAN (VLAN)
VLAN Benefits
• Improved security
• Reduced broadcast traffic
• Increased flexibility
• Better network organization
• Simplified management
Week 4: Lesson 10
IPv4 Addressing
Classful Addressing
Classful addressing is an IP addressing scheme
in which the IP address space is divided into five
classes (A, B, C, D, and E), each with predefined
network and host portions. This scheme allocates a
network ID based on the first octet (8 bits) of the IP
address, determining the number of networks and
hosts that can be supported in each class.
Week 4: Lesson 10
IPv4 Addressing
Classful Addressing
Classful addressing is an IP addressing scheme
in which the IP address space is divided into five
classes (A, B, C, D, and E), each with predefined
network and host portions. This scheme allocates a
network ID based on the first octet (8 bits) of the IP
address, determining the number of networks and
hosts that can be supported in each class.
Week 4: Lesson 10
IPv4 Addressing
Classful addressing was used in the early days of
the Internet, but it has limitations in terms of
flexibility and scalability, which is why CIDR
(Classless Inter-Domain Routing) is now used.
However, classful addressing established important
IP address ranges that still affect how public and
private IP addresses are assigned today.
Week 4: Lesson 10
IPv4 Addressing
Classful Addressing
• Based on fixed IP address classes (A, B, C)
• Subnet masks fixed for each class
• Limited subnetting flexibility
• Example: 192.168.1.0/24 (Class C)
Classless Inter-Domain Routing (CIDR)
• Variable-length subnet masks (VLSM)
• Flexibility in subnetting
• Supports route summarization
• Example: 192.168.1.0/26
Week 4: Lesson 10
IPv4 Addressing
IPv4 Address Scheme Design
Number of IP Networks and Subnetworks
Required
Before assigning IP addresses, it is crucial to determine
how many distinct networks and subnetworks are
needed. Organizations often need multiple subnets to
separate departments, locations, or different functions
(e.g., guest networks vs. internal networks). Subnetting
allows you to allocate IP ranges to specific segments of the
network, ensuring that each network can operate
Week 4: Lesson 10
IPv4 Addressing
Types of IP Address
1. Public IP addresses: Routable on the internet.
2. Private IP addresses: Used internally, requiring NAT.
https://geotargetly.com/blog/what-is-a-private-ip-addresses-full-guide
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Attendance code
azi5tr
29-10-2024 15h00 – 16h50
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Learning Outcomes
• Demonstrate an understanding of ethernet switching
and troubleshooting of ethernet networks
• Demonstrate an understanding of network
management in relation to risk and performance
management
• Demonstrate an understanding of the performance
and recovery of network
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Introduction to Planning Network
Configuration
Effective network planning is required in every IT organizational
infrastructure. This planning requires careful consideration on IP
address distribution, communication pathways for devices and
security of the network.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Introduction to Planning Network
Configuration
Proper planning entails
• performance optimization
• scalability
• easy troubleshooting
• securing the network
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Introduction to Network Planning
• IP addressing and Subnetting
• Static & Dynamic IP assignment
o Static IP addressing results in IP conflicts,
o Dynamic allow automatic IP assignment and management
• Network Security
o Private IP address range
o Network Address Translation
o Access Control
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
IP Addressing & Subnetting
By assigning IP addresses and dividing networks into smaller sub-
networks, we can
• control traffic,
• enhance security, and
• manage resources efficiently.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
IP Addressing & Subnetting
Type IP addresses Subnet Number of
addresses
Class A 1.0.0.0 - 126.0.0.0 255.0.0.0 16 million
Class B 128.0.0.0 - 191.255.0.0 255.255.0.0 65,536
Class C 192.0.0.0 - 233.255.255.0 255.255.255.0 256
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
IP Addressing & Subnetting
Type IP addresses
Class D 224.0.0.0 - 239.255.255.255
Class E 240.0.0.0 - 255.255.255.255
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Subnetting
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Attendance code
famha5
30-10-2024 08h00 – 09h50
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Subnetting
Subnetting allows the division of large IP networks into
smaller manageable network segments.
For example,
192.168.1.0/24
We know this is a class C network with a subnet mask of 255.255.255.0
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Subnetting
So, if we break 192.168.1.0/24 and borrow two bit
We have 192.168.1.0/26
• Subnet 1: 192.168.1.0/26 - Hosts: 192.168.1.1 to 192.168.1.62 (192.168.1.0 is the network
address, 192.168.1.63 is the broadcast)
• Subnet 2: 192.168.1.64/26 - Hosts: 192.168.1.65 to 192.168.1.126 (192.168.1.64 is the network
address, 192.168.1.127 is the broadcast)
• Subnet 3: 192.168.1.128/26 - Hosts: 192.168.1.129 to 192.168.1.190 (192.168.1.128 is the
network address, 192.168.1.191 is the broadcast)
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Subnetting
First, we must know the required number of
IP addresses, the division required and the subnet
we would like to use to achieve the requirement
in a way that allows us to scale the network in the future
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Subnetting
First, we must know the required number of
IP addresses, the division required and the subnet
we would like to use to achieve the requirement
in a way that allows us to scale the network in the future
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Subnetting
The principle of subnetting in IPv4 also applies to IPv6
For example, in IPv6, a typical subnet might be 2001:0db8:85a3::/64, where the /64 prefix indicates the first 64
bits are used for the network portion, leaving 64 bits for hosts.
IPv6 Address: 2001:0db8:85a3:0000:0000:8a2e:0370:7334
Subnet Prefix: /64 -> Network portion (2001:0db8:85a3)
Host Portion: Remaining bits -> 0000:0000:8a2e:0370:7334
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
DHCP
Dynamic Host Configuration Protocol provides automation of the allocation
• IP addresses,
• subnet masks,
• default gateways, and
• DNS information
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
DHCP
4 steps process for automatic IP address assignment
• DHCP Discovery: The client sends a broadcast message (DHCPDISCOVER) to locate available
DHCP servers on the network.
• DHCP Offer: The DHCP server responds with a DHCPOFFER, offering an IP address and other
configuration details.
• DHCP Request: The client replies with a DHCPREQUEST, indicating its acceptance of the
offered IP address.
• DHCP Acknowledgment: The DHCP server finalizes the process with a DHCPACK, confirming
the lease of the IP address and other network parameters.
These four steps complete the IP assignment process, enabling the client device to connect to the
network with minimal manual configuration.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Setting up a DHCP Server
The server defines the
• scope (range)
• lease duration
• network parameters
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Setting up a DHCP Server
• IP Address Scope: Define the range of IP addresses that the DHCP server can allocate.
For example, a DHCP scope of 192.168.1.100 to 192.168.1.200 allows up to 101 devices
to connect within that range.
• Subnet Mask: Specify the subnet mask for devices. For instance, a subnet mask of
255.255.255.0 (Class C) is common for smaller networks.
• Lease Duration: Determine how long a device can hold an IP address lease before
needing to renew. Shorter leases (e.g., 8 hours) suit environments with high device
turnover, while longer leases (e.g., 7 days) are ideal for static setups.
• Default Gateway: Configure the router’s IP as the default gateway, directing traffic to
external networks. For a network with IP 192.168.1.0, the gateway might be 192.168.1.1.
• DNS Server: Provide DNS server addresses to enable domain name resolution. Common
entries include Google DNS (8.8.8.8) or Cloudflare DNS (1.1.1.1).
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Setting up a DHCP Server
• IP Address Scope: Define the range of IP addresses that the DHCP server can allocate.
For example, a DHCP scope of 192.168.1.100 to 192.168.1.200 allows up to 101 devices
to connect within that range.
• Subnet Mask: Specify the subnet mask for devices. For instance, a subnet mask of
255.255.255.0 (Class C) is common for smaller networks.
• Lease Duration: Determine how long a device can hold an IP address lease before
needing to renew. Shorter leases (e.g., 8 hours) suit environments with high device
turnover, while longer leases (e.g., 7 days) are ideal for static setups.
• Default Gateway: Configure the router’s IP as the default gateway, directing traffic to
external networks. For a network with IP 192.168.1.0, the gateway might be 192.168.1.1.
• DNS Server: Provide DNS server addresses to enable domain name resolution. Common
entries include Google DNS (8.8.8.8) or Cloudflare DNS (1.1.1.1).
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
DHCP Lease Renewal
•Devices automatically renew their IP addresses before the lease expires, preventing IP
conflicts and ensuring continued network connectivity. Renewal occurs through the
following stages:
•T1 Timer (Renewal): When 50% of the lease time has passed, the client sends a
renewal request (DHCPREQUEST) directly to the DHCP server.
•T2 Timer (Rebinding): If no response is received, the client enters the rebinding
phase, broadcasting the DHCPREQUEST to any available DHCP server. This occurs at
87.5% of the lease time.
•Lease Expiry: If no DHCP server responds, the client’s lease expires, and it must
restart the DHCP discovery process to obtain a new IP.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Static IP Reservation with DHCP
In some cases, specific devices require a consistent IP address but benefit from DHCP’s central management.
DHCP reservations assign a permanent IP to a device based on its MAC address:
# DHCP Reservation Example
host printer {
hardware ethernet 00:1A:2B:3C:4D:5E;
fixed-address 192.168.1.150;
}
•
•In this example, a printer with MAC address 00:1A:2B:3C:4D:5E is assigned a fixed IP of 192.168.1.150. This
setup allows the printer to always receive the same IP while remaining managed by the DHCP server.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Benefits of DHCP Configuration
Configuring DHCP provides several advantages:
• Efficient IP Management: Automatically assigns IPs to new devices,
minimizing administrative workload.
• Reduces Configuration Errors: Minimizes manual entry, decreasing the
chance of errors.
• IP Conflict Prevention: Manages IP leases to avoid duplicate IP addresses
on the network.
• Network Scalability: DHCP’s dynamic allocation supports networks with
varying numbers of connected devices.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Static IP assignment
Manual IP configuration
Advantages of Static IPs
• Reliability: Essential for devices that need a permanent address, such as servers, printers, and network
infrastructure (e.g., routers).
• Improved Network Management: Enables administrators to easily identify and locate devices within a
network.
• Direct Access: Facilitates remote access to devices (such as web servers or database servers) without
needing to update IP addresses.
Disadvantages of Static IPs
• Time-Consuming Configuration: Manual assignment for each device can be labor-intensive, especially in
large networks.
• IP Conflict Risk: Incorrect assignments can lead to duplicate IPs, causing connectivity issues.
• Limited Scalability: Static IPs are less flexible and require regular management if the network frequently
changes.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Dynamic IP assignment
Advantages of Dynamic IPs
• Scalability: DHCP automates IP assignment, supporting networks with many devices or frequent
connectivity changes.
• Reduced Administrative Overhead: Minimizes the need for manual IP configuration, which can be labor-
intensive.
• Prevention of IP Conflicts: The DHCP server manages and reclaims IP addresses, reducing the risk of
duplicate IPs.
Disadvantages of Dynamic IPs
• Inconsistent IPs: Devices may receive different IP addresses on reconnecting, which can complicate
network management.
• Limited Accessibility: Dynamic IPs are less suitable for devices requiring consistent access, such as web
servers or network printers.
• Lease Dependency: Devices must renew their IP leases periodically, requiring connectivity to the DHCP
server.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
DHCP Reservations for Dynamic yet Consistent IPs
Some devices may require a dynamic IP with consistency. DHCP reservations allow the DHCP server to assign the
same IP address to a device based on its MAC address, providing the benefits of DHCP with the consistency of
static IPs.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
When to Use Static vs. Dynamic IPs
The choice between static and dynamic IP assignment depends on the device type,
network structure, and connectivity requirements. Here are some typical use cases:
• Use Static IPs for: Servers, network printers, infrastructure devices (e.g., routers),
and any device that requires consistent IP access.
• Use Dynamic IPs for: Client devices (e.g., laptops, smartphones) that connect
temporarily to the network, especially in environments where device count
fluctuates.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Network Security in Address Planning
Address planning in network design plays a crucial role in enhancing security. By
carefully managing IP address allocation, subnetting, and access control, administrators
can prevent unauthorized access, control traffic flow, and ensure data privacy.
Implementing secure address planning is essential in protecting network resources and
ensuring compliance with security standards.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Private IP Addressing
• Private IP Ranges: The following IP ranges are reserved for private networks and
are not routable on the public internet:
• Class A: 10.0.0.0 to 10.255.255.255
• Class B: 172.16.0.0 to 172.31.255.255
• Class C: 192.168.0.0 to 192.168.255.255
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Network Address Translation (NAT)
Network Address Translation (NAT) enables private IP addresses to access the internet by mapping them to a
public IP address. This hides the internal IPs from external networks, adding an extra layer of security.
• Basic NAT: Maps a single public IP address to a private IP, enabling external access while maintaining
internal address privacy.
• Port Address Translation (PAT): A form of NAT where multiple private IP addresses share a single public IP.
PAT assigns a unique port number to each session, preserving individual connections.
• # Example of PAT Configuration (Cisco Router)
• ip nat inside source list 1 interface FastEthernet0/0 overload
• access-list 1 permit 192.168.1.0 0.0.0.255
•
• Security Benefits: NAT and PAT provide an additional barrier by masking internal IPs, making it difficult for
external attackers to identify and reach internal devices.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Subnetting for Enhanced Security
Subnetting divides a network into smaller segments, controlling data flow between sections. Each subnet can be
isolated with its own access controls, which restricts access based on user or device roles.
• Role-Based Segmentation: Different departments (e.g., HR, finance, IT) can be assigned separate subnets,
ensuring sensitive data is accessible only to authorized users.
• Reduced Broadcast Traffic: By dividing the network into smaller subnets, broadcast traffic is contained
within each subnet, improving performance and reducing exposure to broadcast-based attacks.
• Subnet ACLs: Access Control Lists (ACLs) define permissions for each subnet, allowing administrators to
permit or deny traffic based on IP addresses, protocols, and ports.
• # Example of Subnet ACL (Cisco Router)
• access-list 100 permit tcp 192.168.1.0 0.0.0.255 any eq 80
• access-list 100 deny tcp any any
• interface FastEthernet0/0
• ip access-group 100 in
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
IP Filtering and Access Control Lists (ACLs)
IP filtering and ACLs limit access to network resources by specifying which IP addresses can communicate with
certain network segments or services. ACLs provide granular control, allowing or blocking traffic based on
conditions set by administrators.
Standard ACLs: Control traffic based solely on the source IP address. Standard ACLs are typically used in
smaller networks.
# Standard ACL Example (Cisco Router)
access-list 10 permit 192.168.1.0 0.0.0.255
access-list 10 deny any
•
• Extended ACLs: Offer more detailed filtering by allowing administrators to specify source and destination
IPs, protocols, and port numbers.
• # Extended ACL Example (Cisco Router)
• access-list 110 permit tcp 192.168.1.0 0.0.0.255 10.0.0.0 0.0.0.255 eq 22
• access-list 110 deny ip any any
•
• Benefits of ACLs: ACLs prevent unauthorized access by filtering traffic at the network level, ensuring only
trusted devices can communicate with sensitive resources.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
DHCP Security and IP Binding
DHCP security measures like IP binding ensure that only authorized devices receive IP
addresses on the network. This prevents unauthorized devices from connecting and
helps track devices based on MAC addresses.
MAC Address Binding: Configures the DHCP server to reserve specific IP addresses
for known MAC addresses. This method ensures a consistent IP for critical devices and
prevents unauthorized access.
# DHCP Binding Example (Linux DHCP Server)
host secure_printer {
hardware ethernet 00:1D:7E:1A:2B:3C;
fixed-address 192.168.1.150;
}
•
• IP Exclusions: Administrators can configure the DHCP server to exclude IP ranges,
reducing the risk of conflicts and reserving addresses for specific functions.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Implementing VLANs for Traffic Isolation
Virtual LANs (VLANs) segment network traffic based on logical groups rather than
physical location, adding an additional layer of security by isolating departments or
user groups.
Enhanced Isolation: VLANs separate traffic, limiting the spread of attacks and
allowing fine-tuned access control.
# VLAN Configuration Example (Cisco Switch)
vlan 10
name Finance
interface FastEthernet0/1
switchport access vlan 10
•
• Role-Based Access: By placing sensitive departments (e.g., finance) on a separate
VLAN, administrators can control access to specific data and systems.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Network Security & Address Planning
1. Private IP addressing
2. Network Address Translation
3. Subnetting
4. IP Filtering and Access Control Lists
5. DHCP Security and IP Binding
6. VLAN for traffic isolation
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
1. Command-Line Tools for Diagnostics
o ping –c 5 –s 1024 google.com
o traceroute –m 20 eduvos.com
o tracert –m 20 eduvos.com
o netstat –an
o arp –a
o nslookup google.com
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
2. Advanced IP Configuration and
Verification
o detect IP conflicts
o confirm subnet configurations
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
3. Network Performance Monitoring
o wireshark
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
4. Routing and Path Troubleshooting
o verify routing tables
o correcting static and dynamic routes
route -n
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Attendance code
1lsp0v
31-10-2024 15h00 – 16h50
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
5. Security & Unauthorized Access
Detection
o firewall rule checks
o detecting unauthorized access with
packet sniffers
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
5. Security & Unauthorized Access
Detection
Firewall Rule Checks: Ensure firewalls are correctly configured to permit valid traffic
and deny unauthorized access. Misconfigured firewall rules can prevent legitimate
traffic or leave networks exposed.
Detecting Unauthorized Access with Packet Sniffers: Packet sniffers like tcpdump
or Wireshark monitor for anomalies, such as unexpected data spikes or login attempts.
# capture packet with tcpdumps
sudo tcpdump –i eth0
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
6. Logs
o syslog servers
o event viewer
tail –f /var/log/syslog
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
7. System Approach to
Troubleshooting
• Physical Layer Check: Start by confirming physical connections, cable
integrity, and power sources.
• Link Layer Verification: Check MAC addresses, VLAN configurations, and
switches for misconfigurations.
• Network Layer Analysis: Verify IP addresses, routing paths, and
subnetting configurations.
• Application Layer Inspection: Check for application-specific issues, such
as protocol errors or service outages.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing
Concepts
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
Routing is a fundamental aspect of network design, responsible for directing
data packets across interconnected networks to reach their intended
destinations.
By leveraging routing protocols and algorithms,
• routers can efficiently manage and optimize data paths,
• ensuring that information is delivered reliably and promptly.
Effective routing is essential for maintaining connectivity, supporting network
growth, and optimizing resource use.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
Routers use routing tables, which store information about network paths, to
make decisions on where to forward packets. The selection of these paths is
determined by various routing protocols and metrics that prioritize routes
based on factors like distance, bandwidth, and reliability.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
•Routing Types: The two main types of routing—static and dynamic—define
how routes are set and updated within a network. Each type has unique
advantages suited for specific network configurations.
•Routing Protocols: Routing protocols like RIP, OSPF, and EIGRP allow
routers to communicate and share path information. These protocols ensure
networks can dynamically adjust routes based on topology changes.
•Interior vs. Exterior Routing: Routing protocols are designed for either
internal networks (IGPs) or external networks (EGPs), each handling routing
within and between organizations.
•Metrics and Path Selection: Metrics such as hop count, bandwidth, and
delay help routers evaluate and select the best path for data transmission.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
A routing table is a database stored in a router or other forwarding device
that contains information about the routes to various network destinations. It
essentially serves as an address map, guiding the router on where to send
packets based on their destination IP address. The routing table is typically
stored in the router’s RAM, allowing it to be updated dynamically in the case of
dynamic routing protocols or modified manually when static routes are
configured
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
•Protocol: This parameter specifies the source of the route, such
as static routes, routes learned through routing protocols like
OSPF or RIP, or routes automatically configured by the operating
system.
•Destination: This field identifies the destination network or
host. While routing tables can contain routes to specific hosts,
they are generally directed to network IDs. If multiple routes
match the destination, the most specific route (with the longest
subnet mask) is chosen as the forwarding path.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
•Interface: This parameter defines the local network interface
that will be used to forward the packet along the chosen route. It
may be represented as the IP address of the interface or a Layer
2 interface ID, depending on the network’s configuration.
•Gateway/Next Hop: This field specifies the IP address of the
next router (gateway) along the path to the destination. Routers
use this to forward packets toward the final destination by
directing them to the appropriate next hop
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
Static Routing: In static routing, routes are manually configured
by a network administrator. This means that each route is
predetermined, and packets must follow that specific path to
reach a particular destination. Static routing is simple to set up
and requires fewer resources, but it lacks the flexibility of
dynamic routing and may not be suitable for large or complex
networks where routes need to change frequently.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
Dynamic Routing: In dynamic routing, routers exchange routing
information with each other using routing protocols such as OSPF,
RIP, or BGP. This allows the network to automatically adjust to
changes, such as network failures or added links, by updating the
routing tables dynamically. Dynamic routing is more flexible and
scalable, making it ideal for larger, more complex networks.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
A default route is a special type of static route that specifies the
next hop for packets destined for any network that does not have
a specific route in the routing table. It acts as a catch-all route,
ensuring that packets with unknown destinations are still
forwarded, typically toward the Internet or a main router within
the network. The default route is usually denoted as 0.0.0.0/0 in
the routing table
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
The Time To Live (TTL) field in the IP header determines the
maximum number of hops a packet can take before it is
discarded. Each time a packet passes through a router, the TTL
value is reduced by at least 1. If the TTL reaches zero, the packet
is dropped, and an ICMP "Time Exceeded" message is sent back
to the source. TTL prevents packets from circulating endlessly in
case of routing loops and helps manage the lifespan of data
packets on the network
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
Packet Forwarding: This is the process by which routers send
incoming packets to the next hop or final destination based on
the information in the routing table. The decision to forward is
made based on the destination IP address of the packet and the
best match in the routing table.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
Hop Count: This refers to the number of routers (or hops) a
packet must traverse to reach its destination. Each router the
packet passes through is considered one hop. Hop count is often
used as a metric in routing protocols like RIP, where the shortest
path is defined by the fewest number of hops.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
Fragmentation: When a packet is too large to be transmitted
over a network link (due to the link’s maximum transmission unit
or MTU), it is divided into smaller fragments. Each fragment is
then sent separately and reassembled at the destination.
Fragmentation is important for ensuring that large packets can
traverse networks with varying MTUs.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Routing Concepts
Routing tables are central to how routers manage the flow of data
across networks, using parameters such as destination, next hop,
and interface to determine the best path for each packet.
Understanding static and dynamic routing, as well as related
concepts like TTL, packet forwarding, and fragmentation, is key to
managing efficient and reliable network traffic. With a solid grasp
of routing tables and these core concepts, network administrators
can optimize network performance and troubleshoot routing
issues more effectively.
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Attendance code
dv2vyl
05-11-2024 15h00 – 16h50
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Dynamic Routing Concepts
Dynamic routing protocols use algorithms and metrics to
automatically build and maintain a routing information base (also
known as the routing table).
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Dynamic Routing Concepts
Convergence is the process by which routers running dynamic
routing protocols agree on the network topology and routing
information. When convergence occurs, all routers in the network
share a consistent view of the routes available, ensuring that data
can be forwarded efficiently to its destination. The speed of
convergence is an important factor in determining how quickly a
network can recover from changes, such as a failed link or router
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Dynamic Routing Concepts
• Interior Gateway Protocols (IGPs) (Autonomous system)
• RIP (15 hop count max)
• OSPF
• EIGRP (Cisco)
• Exterior Gateway Protocols (EGPs) (Different autonomous
systems)
• BGP
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Dynamic Routing Concepts
• IGP
• Distance Vector Protocols
• RIP
• EIGRP
• Link-State Protocols
• OSPF
• IS-IS
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security
Network security encompasses the strategies, processes, and
controls put in place to safeguard data, protect network
infrastructure, and ensure business continuity. The goal of
network security is to make systems and hosts resilient to various
types of attacks, including unauthorized access, data breaches,
malware, and denial-of-service (DoS) attacks. A well-implemented
network security framework ensures that data assets are
protected from internal and external threats while maintaining
the availability and integrity of network resources.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security
Objectives of Network Security
The primary goals of network security are often referred to as the
CIA triad, which stands for:
• Confidentiality
• Integrity
• Availability
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Overview Management Services
Importance of Network Management:
•Reliability: Regular monitoring helps prevent outages, ensuring
that services remain available.
•Performance Optimization: Identifying bottlenecks allows
administrators to make necessary adjustments, enhancing overall
performance.
•Cost Efficiency: Efficient resource management reduces
operational costs and improves return on investment.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Overview Management Services
Network management involves the monitoring and
maintenance of a business’s information technology. You can
have an in-house network management team or hire the services
of network management providers. Vendors of network
management services provide a wide range of services:
•implementing upgrades
•monthly status reporting
•user administration
•network maintenance
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Overview Management Services
Managed Network Services
•Network administration: This covers tracking of network
resources, such as switches, servers, and routers. Software
updates and performance monitoring are also part of network
administration.
•Network maintenance: This includes fixes and upgrades to
network resources. Remediation activities and proactive
measures are executed here. They may include replacing
switches, routers, or other network gears.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Overview Management Services
Managed Network Services
•Network operation: This ensures the smooth running of the
network. The network manager closely monitors activities to
identify and fix issues as they happen.
•Network provisioning: Often, you’ll need to configure network
resources to support the requirements of specific services.
Network provisioning lets you do that. For instance, you can
increase bandwidth requirements to accommodate more users.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security
Confidentiality: Ensuring that sensitive information is only
accessible to authorized users. Techniques like encryption and
access controls help protect data from being disclosed to
unauthorized parties.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security
Integrity: Ensuring that data remains accurate and unaltered
during transit or storage. Integrity is maintained through
mechanisms like hashing, checksums, and digital signatures,
which detect unauthorized modifications to data.
Availability: Ensuring that network services and resources are
accessible to authorized users when needed. This is achieved by
preventing disruptions through network redundancy, firewalls,
and intrusion prevention systems (IPS) to defend against DoS
attacks.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security
Integrity: Ensuring that data remains accurate and unaltered
during transit or storage. Integrity is maintained through
mechanisms like hashing, checksums, and digital signatures,
which detect unauthorized modifications to data.
Availability: Ensuring that network services and resources are
accessible to authorized users when needed. This is achieved by
preventing disruptions through network redundancy, firewalls,
and intrusion prevention systems (IPS) to defend against DoS
attacks.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security
Types of Network Security Threats
• Unauthorized access
• Malware
• Denial-of-service (DoS) attacks
• Man-in-the-middle attacks
• Phishing
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security
Unauthorized Access: This occurs when
attackers gain access to a network or system
without proper authorization. Techniques like
password attacks, social engineering, and
exploiting software vulnerabilities are common
methods used to gain unauthorized access.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security
Unauthorized Access: This occurs when
attackers gain access to a network or system
without proper authorization. Techniques like
password attacks, social engineering, and
exploiting software vulnerabilities are common
methods used to gain unauthorized access.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security
Malware: Malware, or malicious software, includes
viruses, worms, Trojans, ransomware, and spyware.
These threats can cause data theft, system corruption,
or complete disruption of services. Anti-malware
software, firewalls, and intrusion detection systems
(IDS) are used to detect and mitigate these threats.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security
Malware: Malware, or malicious software, includes
viruses, worms, Trojans, ransomware, and spyware.
These threats can cause data theft, system corruption,
or complete disruption of services. Anti-malware
software, firewalls, and intrusion detection systems
(IDS) are used to detect and mitigate these threats.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security
Network Security Assessment
• Vulnerability (security breach)
• Threat (intentional and non-intentional)
• Risk (likelihood of attack)
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security
Risk management is the process of identifying,
assessing and mitigating vulnerabilities and threats to
the critical functions of an organization
• Identify
• Assess
• Implement
• Monitoring
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Introduction to Network Security
Security Information and Event Management
(SIEM) is a security control that automates the
collection, aggregation and analysis of log data from
multiple systems within an organization.
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Security concepts
• Penetration testing
• Privileged Access Management (PAM)
• policies, procedures and technical controls
implemented to prevent misuse of privileged
account
• Least privilege
• Role-Based Access Control (RBAC)
• Zero trust
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Security concepts
• Penetration testing
• Privileged Access Management (PAM)
• policies, procedures and technical controls
implemented to prevent misuse of privileged
account
• Least privilege
• Role-Based Access Control (RBAC)
• Zero trust
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Authentication Methods
Network Authentication Methods
• Access control systems technical
security controls that govern how users,
devices or other entities (subjects) are
permitted to interact with resources
(objects)
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Authentication Methods
Identity and Access Management (IAM)
• Identity
• Authentication
• Authorization
• Accounting
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Authentication Methods
Multi-factor Authentication
• code
• answer a security question
• fingerprint scan
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Authentication Methods
Local Authentication
• Windows (Active Directory)
• Linux (Username and password)
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Authentication Methods
• Single Sign-On (SSO) authenticate
once
• Digital Certificates and Public Key
Infrastructure (PKI)
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Security Appliances
• Firewalls
• Packet Filtering Firewalls
• Stateful Inspection Firewalls
• Next-Generation Firewalls (NGFW)
• IDS/IPS
• Network Access Control
• VPN
• IPSec
• SSL/TLS
Week 5: Lesson 13
Configure and Troubleshoot IP
Networks
Security Appliances
• Data Loss Prevention
• Endpoint security ( antivirus, anti-malware)
• Security Information and Event Management
Week 6: Lesson 14
Organization and Physical Security
Concepts
Learning Outcomes
•Demonstrate an understanding of network management in
relation to risk and performance management.
•Demonstrate an understanding of the performance and recovery
of network.
Week 6: Lesson 14
Organization and Physical Security
Concepts
The cabling, switches, routers, security
appliances, servers, and clients that make up a
local network must all be located within a
company premise. Managing the company
premises so that the network is highly available
and secure involves creating policies and best
practices, supported by documentation.
Week 6: Lesson 14
Organization and Physical Security
Concepts
Security Policies
IT Policies include ;
1. Password Policy
2. Acceptable Use Policies
3. Bring-your-own-device (BYOD) Policy
4. Remote Access Policy
5. Data Loss Prevention Policy
Week 6: Lesson 14
Organization and Physical Security
Concepts
Security Policies
Common Agreements
1.Service level agreement (SLA)
2.Non-Disclosure Agreement (NDA)
3.Memorandum of understanding (MOU)
Week 6: Lesson 14
Organization and Physical Security
Concepts
IT Documentation and Policies
Operating Plans and Procedures
Week 6: Lesson 14
Organization and Physical Security
Concepts
IT Documentation and Policies
System Life Cycle Plans and Procedures
The asset register include;
1.Audit reports
2.Assessment Reports.
3.Physical Network Diagrams
4.Logical network diagrams
5.Rack Diagrams
Week 6: Lesson 14
Organization and Physical Security
Concepts
IT Documentation and Policies
Security Response Plans and Procedures
1.Incident Response Plan
2.Business Continuity Plan
3.Disaster Recovery Plan
Week 6: Lesson 14
Organization and Physical Security
Concepts
IT Documentation and Policies
Physical Security Methods
1.Access Control Hardware
2.Smart lockers
3.locking cabinets
4.Locking racks
5.CCTVs
6.Assets tags
7.Alam and tamper detection.
Week 6: Lesson 14
Organization and Physical Security
Concepts
Internet of Things
Internet of Things (IoT) describes the global network of personal devices, home
appliances, home control systems, vehicles, and other items that have been
equipped with sensors, software, and network connectivity.
Week 6: Lesson 14
Organization and Physical Security
Concepts
Internet of Things
1. Consumer-grade Smart Devices
2. Physical Access Control Systems and Smart Buildings
Cellular network
• Z-wave, wireless protocol
• Zigbee, open-source competitor
Week 6: Lesson 14
Organization and Physical Security
Concepts
Internet of Things
Placement & Security
1.consumer-grade devices,
2.smart building technology, and
3.industrial systems.
Week 6: Lesson 14
Organization and Physical Security
Concepts
Disaster Recovery
Disaster recovery (DR) is an organization’s ability to
restore access and functionality to IT infrastructure after
a disaster event, whether natural or caused by human
action (or error).
IT disaster recovery refers to a combination of policies,
tools, and processes used to recover or continue
operations of critical IT infrastructure, software, and
systems after a natural or human-made disaster.
Week 6: Lesson 14
Organization and Physical Security
Concepts
Disaster Recovery
• High availability
• Fault tolerance
• Redundancy
• Recovery
Week 6: Lesson 14
Organization and Physical Security
Concepts
Disaster Recovery
Other Important issues to consider are;
1.Heating, Ventilation and Air Conditioning (HVAC)
2.Power Management.
3.Network Device Backup Management
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Learning Outcomes
•Demonstrate an understanding of network
management in relation to risk and performance
management.
•Demonstrate an understanding of the performance and
recovery of network
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Network Attacks
• Internal attacks
• External attacks
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Network Attacks
• Internal attacks
• External attacks
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Types of Attacks
1.Footprinting and Fingerprinting Attacks.
2.Spoofing Attacks.
3.Denial of Service Attacks.
4.MAC Spoofing and IP Spoofing.
5.ARP Spoofing.
6.Rogue DHCP
7.DNS Poisoning Attacks
8.VLAN Hopping Attacks
9.Rogue Access Points
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Types of Attacks
10. Evil Twins
11.De-authentication Attacks
12.Distributed DoS Attacks and Botnets.
13.Viruses and worms.
14.Potentially unwanted programs (PUPs)/Potentially unwanted applications
(PUAs)
15.Trojan
16.Password Attacks
17.Phishing Attacks
18.Shoulder Surfing
19.Tailgating and Piggybacking
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Network Hardening
Network hardening refers to the processes that
minimize security gaps within a cybersecurity
infrastructure. Network hardening standards help guide
the processes used in optimizing network security
across your organization’s cybersecurity infrastructure.
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Device and Service Hardening
1. Change default passwords/credentials.
2. Enforce password complexity/length requirements.
3. Configure role-based access.
4. Disable unneeded network services
5. Disable unsecure protocols
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Endpoint Security and Switchport
Protection
1.Disable Unneeded Switch Ports.
2.MAC Filtering and Dynamic ARP Inspection.
3.DHCP Snooping.
4.Neighbor Discovery Inspection and Router Advertisement
Guard.
5.Port Security/IEEE 802.1X Port-Based Network Access Control
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Endpoint Security and Switchport
Protection
1.Disable Unneeded Switch Ports.
2.MAC Filtering and Dynamic ARP Inspection.
3.DHCP Snooping.
4.Neighbor Discovery Inspection and Router Advertisement
Guard.
5.Port Security/IEEE 802.1X Port-Based Network Access Control
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Endpoint Security and Switchport
Protection
1.Disable Unneeded Switch Ports.
2.MAC Filtering and Dynamic ARP Inspection.
3.DHCP Snooping.
4.Neighbor Discovery Inspection and Router Advertisement
Guard.
5.Port Security/IEEE 802.1X Port-Based Network Access Control
Week 5: Lesson 12
Configure and Troubleshoot IP
Networks
Attendance code
er4ugs
06-11-2024 08h00 – 09h50
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Wireless Security
1. Preshared keys (PSKs)
2. Extensible Authentication Protocol.
3. Captive portal
4. MAC filtering
5. Geofencing
6. Antenna placement and power levels
7. Wireless client isolation
8. Guest network isolation
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Other Network consideration
1. IoT Access considerations
2. Patch And Firmware management
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Cloud computing
Cloud computing is on-demand access, via the internet,
to computing resources—applications, servers (physical
servers and virtual servers), data storage, development
tools, networking capabilities, and more—hosted at a
remote location managed by a cloud services provider
(or CSP).
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Cloud computing
Advantages
• Lower IT costs
• Improve agility and time-to-value
• Scale more easily and cost-effectively
• Elasticity
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Cloud computing
Cloud Deployment Models
•Public (or multitenant)
•Hosted private
•Private
•Community
•Hybrid
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Cloud computing
Cloud Deployment Models
1. Infrastructure as a Service.
2. Software as a Service (SaaS)
3. Platform as a Service (PaaS).
4. Desktop as a Service
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Cloud computing
Virtualization is the process of running a virtual
instance of a computer system in a layer
abstracted from the actual hardware
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Cloud computing
What is a Hypervisor?
A hypervisor is software that creates and
manages virtual machines (VMs), allowing
multiple operating systems to run on a single
physical host
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Cloud computing
Types of Hypervisor
1. Type 1 Hypervisor (Bare-Metal Hypervisor)
• Runs directly on the host machine's hardware (bare
metal)
• No underlying operating system required
• Examples: VMware ESXi, Microsoft Hyper-V, KVM
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Cloud computing
Types of Hypervisor
2. Type 2 Hypervisor (Hosted Hypervisor)
• Runs on top of an existing operating system (host OS)
• Uses host OS resources and drivers
• Examples: VMware Workstation, VirtualBox, Parallels
Desktop
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Cloud computing
Types of Hypervisor
2. Type 2 Hypervisor (Hosted Hypervisor)
• Runs on top of an existing operating system (host OS)
• Uses host OS resources and drivers
• Examples: VMware Workstation, VirtualBox, Parallels
Desktop
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Cloud computing
A virtual network interface card
(vNIC) represents the configuration of a VM
connected to a network. A VM can be configured
to have multiple vNICs. Within the VM, the virtual
NIC (vNIC) will look exactly like an ordinary
network adapter and will be configurable in the
same way.
Week 7: Lesson 15
Network Attacks, Cloud & Virtualization
Cloud computing
A storage area network (SAN) provisions access to
storage devices at block level. Each read or write
operation addresses the actual location of data on the
media (Block I/O). A SAN is isolated from the main
network. It is only accessed by servers, not by client PCs
and laptops. SAN clients are servers running databases
or applications that require access to shared storage.