Académique Documents
Professionnel Documents
Culture Documents
Table of Contents
Domain 1.0 - Media and Topologies 20% ................................................................................................................... 6
1.1 Recognize the following logical or physical network topologies given a diagram, schematic or description:......... 6
Star Topology............................................................................................................................................................ 6
Bus Topology ............................................................................................................................................................ 6
Mesh Topology ......................................................................................................................................................... 6
Ring Topology........................................................................................................................................................... 6
1.2 Specify the main features of 802.2, 802.3, 802.5, 802.11, and FDDI networking technologies: ........................ 6
IEEE 802.2 LLC (Logical Link Control) ..................................................................................................................... 6
IEEE 802.3 Ethernet ................................................................................................................................................. 7
IEEE 802.5 Token Ring ............................................................................................................................................ 7
IEEE 802.11 Wireless ............................................................................................................................................... 7
Fiber Distributed Data Interface (FDDI) .................................................................................................................... 8
1.3 Specify the characteristic (for example: speed, length, topology, and cable type) of the following cable
standards:...................................................................................................................................................................... 9
1.4 Recognize the following media connectors and describe their uses: ................................................................... 10
RJ-11 ...................................................................................................................................................................... 10
IEEE 1394 (FireWire).............................................................................................................................................. 11
1.5 Recognize the following media types and describe their uses: ............................................................................ 11
Twisted Pair STP and UTP ..................................................................................................................................... 11
Coaxial Cable.......................................................................................................................................................... 12
Fiber-Optic Cable.................................................................................................................................................... 12
1.6 Identify the purpose, features, and functions of the following network components: ........................................... 12
Gateways ................................................................................................................................................................ 13
CSU/DSU (Channel Service Unit/Data Service Unit) ............................................................................................. 14
NICs (Network Interface Cards).............................................................................................................................. 14
ISDN (Integrated Services Digital Network) Adapters ............................................................................................ 14
WAPs (Wireless Access Points) ............................................................................................................................. 14
Modems .................................................................................................................................................................. 15
Transceivers (Media Converters) ........................................................................................................................... 15
Firewalls.................................................................................................................................................................. 15
1.7 Specify the general characteristics (carrier speed, frequency, transmission type and topology) of the following
wireless technologies: ................................................................................................................................................. 16
1.8 Identify factors which affect the range and speed of wireless service (for example: interference, antenna type
and environmental factors).......................................................................................................................................... 16
Domain 2.0 - Protocols and Standards 20%........................................................................................................... 17
2.1 Identify a MAC (Media Access Control) address and its parts. ............................................................................ 17
Bus Topology
A bus physical topology connects all network devices to a common backbone or bus. PCs connect to the bus by using
network cable that attaches or taps into the backbone directly. Network signals are sent along the bus in both
directions on most buses. This topology was commonly used for 10BASE5 and 10BASE2 networks and is seldom
used today.
Mesh Topology
In a mesh physical topology, every device on the network is connected to every other device on the network. Partial
mesh networks don't incur quite the same expense in terms of cabling but, of course, lose some of the redundancy.
This topology is most commonly used in WAN (Wide Area Network) configurations for redundancy and maximum fault
tolerance.
Ring Topology
In a ring physical topology, network devices are wired and connected in a conceptual circle. A ring topology is almost
always implemented in a logical ring topology on a physical star topology. Each device is attached to two other devices
and uses the same network transmission signal, forming a path in the shape of a ring. Network data flow is
unidirectional, and a controlling device, such as a hub or switch, intercepts and manages the data flow to and from the
ring. Each device has a NIC (Network Interface Card) that contains a network transceiver, which both sends and
receives signals. This topology uses network token-passing access methods referred to as Token Ring. Token Ring is
the most common type of ring network.
Table 2 - Current Wireless LAN Standards Including Speed, Frequency, and Advantages/Disadvantages
Standard
Data Speed
Frequency
Advantages/Disadvantages
IEEE 802.11
Up to 2 Mbps
2.4 GHz
5 GHz
2.4 GHz
2.4 GHz
Up to 2 Mbps
2.45 GHz
Up to 75 Mbps
IEEE 802.11a
Wi-Fi
IEEE 802.11b
Wi-Fi
IEEE 802.11g
Wi-Fi
Bluetooth
802.16
WiMAX
Up to 54 Mbps
Up to 11 Mbps
Up to 54 Mbps
Standard
Speed
Access Method
Topology Types
Cable Types
802.3
CSMA / CD
Logical bus
802.5
4 or 16 Mbps
Token passing
Physical star,
logical ring
STP
802.11
1, 11 or 54 Mbps
CSMA / CA
Cellular
FDDI
100 Mbps
Token passing
Fiber-optic cable
1.3 Specify the characteristic (for example: speed, length, topology, and
cable type) of the following cable standards:
Table 4 - Ethernet and Fast Ethernet
Designation
Media
Type
10BASE-T
Cat 3 or
100 meters
better UTP
10BASE-FL
10 Mbps
100 meters
RJ-45
ST fiberStar
optic cable
plug
100 Mbps
100BASE-FX Micro
412 meters (half duplex)
multimode 2km without a repeater (full
optical fiber duplex)
Star
RJ-45
Star
Star
usually set up
only as point-topoint
Designation
Media Type
Max Transfer
Speed
Connector
Topology
1000BASE-T
Cat 5, 4pr
100 meters
1 Gbps
RJ-45
Star
1000BASE-CX
Twinax STP
25 meters
1 Gbps
RJ-45
Star or point-topoint
1000BASE-SX
1 Gbps
SC fiber-optic
connector
Point-to-point
1000BASE-LX
Multimode or
single mode
550 meters
1 Gbps
(multimode) or 5000
SC fiber-Optic
t
Point-to-point
Fiber optic
meters (single
mode)
connector
Designation
Media Type
Max Transfer
Speed
Connector
Topology
10 GBASE-SR
Multimode
optical fiber
300 meters
10 GBps
850-nm serial
LAN
Point-to-point
10 GBASE-LR
Multimode
optical fiber
10 kilometers
10 GBps
1310-nm serial
LAN
Point-to-point
10 GBASE-ER
Multimode
optical fiber
40 kilometers
10 GBps
1550-nm serial
LAN
Point-to-point
1.4 Recognize the following media connectors and describe their uses:
RJ-11
RJ-11 stands for Registered Jack-11. This is a four-wire connector used mainly to connect telephone equipment in
North America. A phone circuit uses two wires; the RJ-11 jack uses four wires. The RJ-11 connector looks very similar
to the RJ-45 connector. Be careful not to confuse the RJ-11 with the RJ-45 connector, which holds eight wires and is
slightly larger. The RJ-11 connector is used in computers to connect a phone line to a computer modem.
RJ-45
RJ-45 connectors are used on 10BASE-T and 100BASE-T networks and are defined in IEEE 802.3 standard. The RJ45 connector is used with CAT 5, CAT5e, and CAT 6 cables. RJ-45 connectors connect computers in LANs to hubs
and switches. If your computer is attached to a standard Ethernet network, disconnect the RJ-45 cable in the back of
your computer and have a look. The RJ-45 is a connector for digital transmission over 4-pair copper wire, either
untwisted or twisted. The interface has eight wires or pins.
F-Type
An F-Type media connector is a threaded, coaxial signal connector typically used in consumer applications, such as a
coaxial cable connection to a TV or VCR. An F-Type media connector is inexpensive because the pin of the connector
is actually the center conductor in the coaxial cable.
ST
ST stands for Straight Tip. This is a fiber-optic cable connector youll see in 100BASE-FX networking environments.
This is one of two commonly used fiber optic connectors. It uses a BNC attachment mechanism much like what you
see in F-Type connectors.
SC
SC stands for standard connector or subscriber connector. This fiber-optic cable connector is sometimes called a
square connector because of its shape. SC connectors are latched and require a button or release to disconnect it. SC
connectors work with both single-mode or multimode optical fibers and last for around 1,000
connections/disconnections. Although not as common as ST connectors, they are seeing increased use in 1000BASECX and 1000BASE-LX LAN connections.
1.5 Recognize the following media types and describe their uses:
Twisted Pair STP and UTP
Bundled pairs of twisted, insulated copper wire are used for telephone lines and Ethernet computer networks
throughout the United States and elsewhere. Twisted-pair media cable carries a signal a maximum distance of 100
meters. Twisted pair cable comes in two types: STP and UTP. STP contains a metal foil sheath to reduce signal
degradation, crosstalk, EMI (electro magnetic interference) and RFI (radio frequency interference) and is a better
choice than UTP in industrial settings where high-voltage machinery operates. UTP is used to wire Ethernet, Fast
Ethernet, and 1000Base-T LANs and is somewhat susceptible to electromagnetic interference and crosstalk. Twistedpair cabling is the most common type of cabling in use today. Both STP and UTP cable are inexpensive.
Major categories of UTP and STP cable that you need to know for the exam include: Category 3, Category 5, Category
5e, and Category 6
Coaxial Cable
Coaxial cable today is used mostly in telephone and cable television systems. In the past, coaxial cable was used in
10Base5 (Thicknet) and 10BASE2 (Thinnet) Ethernet networks. Coaxial cable uses BNC connectors. The heavy
shielding offered by coaxial cable helps protect data offering longer maximum cable lengths than the more prevalent
Cat 5 cable. However, coaxial cable is expensive and the connectors are harder to make. For longer communication
distances and higher data transfer rates, fiber-optic cable is used today
Fiber-Optic Cable
Fiber-optic cable uses pulses of light instead of electrical signals to transmit data. Fiber-optic cable includes a center
core containing the glass fibers surrounded by a glass cladding composed of varying layers of reflective glass that
refract light back into the core. An outer layer of PVC and inner layers of protective buffer material protect the inner
glass core. Using fiber-optic cable, maximum cable lengths of 25 kilometers and data transmission rates are up to
2Gbps are possible. Fiber-optic cable carries laser light encoded with digital signals, and is capable of reliably
transmitting billions of bits of data per second. It also offers greater security (much more difficult to tap), emitting no
EMI or RFI. Several connectors are used to connect fiber to networking devices. The most common connector used is
the SC connector. Fibers main disadvantage is its expense. The cable itself is more expensive to buy, more expensive
to install, and more expensive to maintain. There are two types of fiber-optic cable: SMF (single mode fiber) and MMF
(multimode fiber).
1.6 Identify the purpose, features, and functions of the following network
components:
Hubs
Hubs operate in Layer 1, the Physical layer, of the OSI Reference Model. A hub is a device that connects all the nodes
of a single network. Each device is connected to a single cable that connects directly into the hub. All transmissions
that come into a physical port are rebroadcast to all other connections. That means if one device sends network
packets, all the other devices will receive them. All devices connected by a hub are in the same collision domain. A
hub generally uses Category 5 media cabling. Types of hubs include standard (10 Mbps), Fast Ethernet (100 Mbps),
and 10/100 combo versions. Small peer-to-peer networks (less than 10 devices) are a good candidate for a hub.
Larger networks call for switches. Several types of hubs are available: Passive hubs, active hubs, switching hubs
and intelligent hubs.
Switches
Switches have a thing or two in common with hubs. Both devices can connect multiple segments of a single network
and both allow those network devices to communicate. Like hubs, switches are used in Ethernet environments and
support speeds of 10 Mbps, 100 Mbps, and 1000 Mbps. Like hubs devices connected by a switch reside in the same
collision domain. Switches even look a lot like hubs. There is, however, one key difference: A switch filters and
forwards packets between LAN segments, making a direct connection between the transmitting device and the
destination device. Compare that to a hub, which rebroadcasts signals out from all ports. On a switched network, only
the sending device and the receiving device transmit and receive the signal. The main benefit of a switch over a hub is
that no bandwidth is wasted by sending signals to devices that dont need the signal. Switches are also used to
connect VPNs (virtual private networks). Switches operate in Layer 2, the Data Link layer, and sometimes in Layer 3,
the Network layer of the OSI Model. Layer 2 switches read the MAC address to determine where a packet is going.
Operating at Layer 2 or Layer 3, switches support the use of packet protocols.
Layer 3 switches can perform some routing functions like Layer 3 forwarding from the hardware but they do not take
the place of routers in a network, Layer 3 switches function like Layer 2 switches but use IP or network addresses to
communicate. A Layer 3 switch allows you to use switching hardware for routing, which is faster because it eliminates
a lot of the latency you'll normally see in regular routers. Switches are a little more expensive than hubs, but because
of their speed advantages, are more commonly used today in all types of Ethernet networks.
Bridges
Bridges provide an inexpensive and easy way to connect network segments, much as hubs and switches do. Like
switches, they connect two segments of the same LAN or they connect two LANs using Ethernet or Token Ring.
Similar to a switch, a bridge operates at Layer 2 on the OSI Reference Model. Bridges and switches both isolate and
contain collision domains within a segment. They both transmit broadcasts from one segment to another (which can
lead to broadcast storms). Similar to switches, bridges also learn and maintain a table where nodes are located based
on MAC addresses.
What sets a bridge apart from a switch is that switches allow simultaneous communications between any two nodes.
Bridges are used primarily to segment networks. A switch is designed to communicate with individual nodes whereas a
bridge communicates with and between network segments.
When designing a network with more than one segment, the debate often comes down to whether to use a bridge, a
switch, or a router. A bridge's best use is to join LANs containing different media types, such as UTP and coaxial.
Bridges are also helpful in creating larger networks, and in keeping network segments free from data that doesn't
belong on a particular segment. Bridges, however, are seldom used to bridge two LANs because they broadcast all
messages to everyone.
Routers
A router, which operates at Layer 3 of the OSI Model, creates and connects several LANs. Howeverand heres the
key difference between a router and a bridge or switcha router also permits two different network topologies, such as
Ethernet and Token Ring on the same LAN, A router provides multiple communication paths (compared to only one on
a bridge) between segments, and map nodes on a segment and the connecting paths using a routing protocol and
internal routing tables. Network broadcasts cannot transverse a router, but they can transverse switches and bridges.
Routing over a segmented network is no different than routing over an Internet network. The router uses the packets
destination IP address (this is what makes it a Layer 3 device). Remember, bridges and switches use the Layer 2 MAC
address to determine where a frame should go. If the destination IP address is on a segment directly connected to the
router, then the router forwards the frame out the appropriate port to that segment. If not, the router will search its
routing table and then send it packets to a matching IP address in the routing table.
When youre thinking about hubs, bridges, switches, and routers, remember that routers are the only devices of the
four that allow you to share a single IP address among multiple network clients.
This is a good place to discuss the brouter. A brouter is a router that can also functions as a bridge. A brouter can
process some information at Layer 2 (MAC addresses) and other information at Layer 3 (IP or IPX addresses). How it
does this is determined by how it is configured. The most useful feature of a LAN router is to isolate certain types of
traffic (such as broadcasts and multicasts) from other networks. The brouter defeats this purpose because, functioning
as a bridge, its passes broadcasts through. Because of this, brouters are now used often today.
Gateways
A gateway is a term for any hardware or software that joins together two dissimilar networks using different network
protocols. In other words, a gateway is a device that stands at the edge of a network and routes traffic from a single
network source to multiple destinations outside the single network. Using this definition, many routers also function as
gateways. Gateways are the most complex of all the network devices CompTIA expects you to know about gateways
because they translate protocols at multiple layers of the OSI reference model.
For instance, lets say you have a gateway that connects an LAN with a mainframe. In a LAN, youve have distributed
processing, baseband communications, and the ASCII character set. Mainframe networks use centralized processing,
broadband communications and he EBCDIC character set. A gateway, when properly configured, translates each LAN
protocol into its mainframe counterpart and vice versa.
CSU/DSU
The CSU/DSU is two devices often bundled as one unit found in equipment
rooms where the network connects via T-series data connectors, like a
leased T1 or T3 line. The CSU/DSU connects a digital carrier, such as the
T1 to the network equipment, usually a router. The CSU terminates the line
at the customer site, whereas the DSU performs the actual transmission
through the CSU. The CSU also provides diagnostics and remote testing
while the DSU provides buffering and data flow control. Typically, the two
devices are packaged together as a single unit. Think of it as a very highpowered, very expensive modem. Such a device is required for both ends of
a leased T1 or T3 connection and both ends must be use the same
communications standard.
Modems
A modem is a device that changes digital data into analog signals transmitted over analog medium, such as telephone
lines. Modem stands for modulator/demodulator.
There are three types of modems you need to know about for the exam:
Traditional (POTS/PSTN) - POTS/PSTN (plain old telephone service/public switch transmission network) is used
by telephones and computer modems. Modems are inexpensive and often built into the motherboard. They
convert the phone lines analog signal into digital signals that the computer understands. The theoretical highest
speed achievable by a modem is 56 Kbps.
DSL (Digital Subscriber Line) - DSL is a popular high-speed technology popular with both consumers and
businesses and is primarily used for connecting to the Internet. Unlike the traditional modem, a DSL line remains
connected to the Internet continuously. This means connections are constantly available or always on. Typical
data download rates with ADSL are up to 1.544 Mbps with upload rates as high as 1,024 MBps. There are two
types of DSLAsymmetric DSL (ASDL) and Symmetric DSL (SDSL).
Cable modems - Provide high-speed Internet access via coaxial cable television lines. At speeds of up to
36Mbps, cable modems using coaxial cable provide much greater bandwidth than telephone lines with speeds
up to 3MBps for accessing the World Wide Web. Cable modems require a special DSL modem and optional
router. Prices for equipment, installation and monthly service vary, though prices have dropped recently and are
competitive with DSL monthly fees.
A disadvantage to using a cable modem for Internet access is that many customers in a local area share access
and thus bandwidththis results in lower transmission rates if everyone in the local area is surfing the Web.
Firewalls
A firewall is a hardware device or software that is most often used to protect networks and home PCs from malicious
attacks from the Internet. Firewalls protect against spyware, hijackers, hackers, viruses, Trojan horses, worms,
phishing, and spam are most often used with other protective software, such as anti-virus, anti-spam, and software.
Although more expensive than software firewalls, hardware firewalls offer better protection than software alone.
LANs and ISPs commonly use hardware routers that contain built-in firewall protection. Router firewalls using packet
filtering and port blocking examine network packets entering or leaving the company's Intranet and block packets that
do not meet specified security criteria. Firewalls can also be configured to use sets of pre-defined "rules" and ACLs
(access control lists). On the software side, proxy servers can be deployed to intercept all packets entering and leaving
Standard
Data Speed
Frequency
Transmission Type
Topology
IEEE 802.11
Up to 2 Mbps
2.4 GHz
FHSS or DSSS
Point-to-point
IEEE 802.11a
Wi-Fi
Up to 54 Mbps
5 GHz
Up to 11 Mbps
2.4 GHz
IEEE 802.11b
Wi-Fi
OFDM
Point-to-point
Point-to-point
IEEE 802.11g
Wi-Fi
Up to 54 Mbps
2.4 GHz
Point-to-point
Bluetooth
Up to 2 Mbps
2.45 GHz
FHSS
Scatternet
1.8 Identify factors which affect the range and speed of wireless service
(for example: interference, antenna type and environmental factors).
Several factors can influence the range and speed of wireless devices, including interference, type of wireless
antenna, environment, and type of security used. The most important factor that directly affects both the wireless
device range and speed is the location of the WAP. The wireless device's data rate, or speed, is directly proportional to
the distance from the WAP. This is especially true with 802.11b wireless products. Studies have shown full theoretical
speeds (11 Mbps) at up to 100 feet, half speed (5.5 Mbps) at 150 feet, and slow speeds of 2 Mbps from 200 plus feet
from the AP. Real-world speeds are about one-half of the theoretical rates. The best location for your AP is in the
center of the area in which you want to roam.
Interference and environmental factors also directly affect wireless RF performance. Objects and environmental factors
that interfere with wireless devices include any large metal object, microwave ovens, 2.4GHz cordless phones, water
heaters, refrigerators, desktop computers, Bluetooth devices, XM radio, many medical devices, garage door openers,
other wireless networks, A/V sending devices, and all forms and types of concrete objects. At work walls, desks,
cubicles, concrete, brick, and other structural objects can interfere with wireless transmission. Many types of electronic
devices can affect your wireless network and your wireless network can also affect electronic devices. A common
source of interference, especially in a home environment is a cordless phone. Other types of interference include
attenuation, a decrease in intensity of a signal, multipath, RF signals arriving at a location using different transmission
paths. reflection, sound waves bouncing back from a surface and refraction, a change of direction of propagation of
signals, Finally, wireless RF interference can be caused from other wireless networks. Optimal wireless performance is
also dependent on selecting and using the right wireless antenna.
2.2 Identify the seven layers of the OSI (Open Systems Interconnect)
model and their functions.
Table 9 - The Seven Layers of the OSI Model
Layer Layer Name Header
Protocol
Data Unit
Protocols and
Services
Functions
Application
Presentation Protocol
Data Unit
Session
Protocol
Data Unit
Transport
Network
Data Link
sublayers
MAC and
LLC
Frames
Physical
Bits
Ethernet, Token
Ring, 802.3APs
Yellow =
Blue
=
Upper layers
Lower layers
2.3 Identify the OSI layers at which the following network components
operate:
Table 10 - Devices and the OSI Model
Device
Hubs
Layer 1 (Physical)
Switches
Bridges
Layer 3 (Network)
NICs
Layer 1 (Physical)
WAPs
IPX/SPX
Routing - Routers that route TCP/IP usually can route IPX/SPX. Routing protocols used to route the IPX/SPX
protocol are RIP, SAP, and NLSP.
Addressing - Each nodes 12-digit hexadecimal address is represented by its own unique 8-digit hexadecimal
IPX network address.
Interoperability - Early NetWare versions (up to NetWare 5.0) used IPX/SPX as the default protocol. Current
Novell operating systems can use the IPX/SPX protocol, which is not as flexible as TCP/IP. The IPX/SPX
protocol stack can communicate with a number of clients, including Windows and Linux. However, many
versions of UNIX and other high-end operating systems, such as OS/400, dont provide built-in support for the
IPX/SPX protocol stack.
Naming - The only devices that use names are servers. Any name can be used, so long as the name contains
no illegal characters. The server name has to contain less than 64 characters (or 47 characters in older versions
of NetWare). IPX/SPX names are not case-sensitive. Names are resolved using the older Novell Bindery
Services or the newer Novell Directory Services (NDS).
NetBEUI/NetBIOS
Routing - Does not use routing discovery protocols. NetBEUI/Network Basic Input/Output System (NetBIOS) are
not routable and are designed instead for LANs only.
Addressing - See Naming.
Interoperability - Almost all Windows-based LANs can use NetBIOS. All early Windows network operating
systems (Windows for Workgroups, Windows 9x, and Windows NT) used NetBEUI as their default protocol.
NetBEUI was first created by IBM for its LAN Manager server. Apple operating systems do not natively support
NetBEUI.
Naming - There is very little network addressing using NetBEUI/NetBIOS. In NetBEUI, naming and addressing
mean the same thing. Each workstation is given a unique name, called the NetBIOS or computer name. All
versions of Windows products can use WINS (Windows Internet Naming Service) that resolves host or computer
names into IP addresses. Even though Windows 2000/XP clients use DNS for name resolution, there are still
some applications and processes that are dependent on WINS for name resolution services. You can use WINS
proxy agents for non-WINS clients, such as UNIX, to resolve the NetBIOS names of Windows clients.
AppleTalk
Routing - Early versions of AppleTalk were not routable. With the release of AppleTalk version 2, however, the
Routing Table Maintenance Protocol (RTMP), a distance vector protocol similar to RIP, is used to route
AppleTalk over IP. Appletalk over IP allows a remote Macintosh client to connect to a remote network server
using IP over the Internet.
Addressing - AppleTalk Uses a 24-bit address, of which 16 bits are allotted to the network. Each network
segment receives either one 16-bit network number or a range of 16-bit numbers, called extended AppleTalk
because it supports more than 254 nodes. Each node automatically assigns itself a node address. AppleTalk
networks also use areas, called zones that allow a network to be segmented into logical areas.
Interoperability - Only Apple MAC computers and Apple laser printers are supported. Most Windows network
operating systems can support both versions of AppleTalk by installing additional network software. Apple
computers can communicate on Ethernet networks using the ELAP (EtherTalk Link Access Protocol). ELAP
encapsulates AppleTalk frames in Ethernet packets. This implementation is commonly called EtherTalk. There
is also an implementation called TokenTalk allowing Apple computer to communicate on Token Ring networks.
Naming - AppleTalk v1 uses NBP (Name Binding Protocol) that associates a computers node name with its
network address. This protocol is broadcast-based, and every device broadcasts its name when it logs onto the
network. Version 2 uses IP naming.
TCP/IP
Routing - TCP/IP uses the IP address of the sender, the recipient, and the next router to determine its path.
Routers build routing tables containing IP addresses using routing protocols, such as RIP and OSPF (Open
Shortest Path First). Networks use IP with TCP (Transmission Control Protocol), to make a connection between
a destination and a source node.
Addressing - IP sends the packets of data to the receiving node, but with no confirmation. TCP/IP is used to
establish and confirm a connection between two hosts. IP network addressing uses DNS (Domain Name
System) to resolve IP addresses into domain names and vice versa. ARP (Address Resolution Protocol)
resolves the IP address into the nodes unique MAC addresses. TCP functions at Layer 4 and IP functions at
Layer 3 in the OSI model.
Interoperability - No protocol is more interoperable than TCP/IP. As the de-facto protocol used on the World
Wide Web, it is used by all modern network operating systems. All modern Windows, Novell, Macintosh, UNIX,
and Linux network operating systems use TCP/IP as their default protocol.
Naming - Named using DNS conventions, which resolves host names into IP addresses.
IPv6
The 32-bit IPv4 addressing scheme can only produce about 3.7 billion unique IP addresses. With the increasing
popularity and use of the Internet and World Wide Web, it soon became apparent that the number of available IPv4
addresses would not be enough. Based on CIDR, IPv6 was standardized in 1994 to overcome these limitations and is
beginning to be implemented.
An IPv6 address looks very different from an IPv4 address. IPv6 uses a 128-bit addressing scheme that can produce
79 octillion IP addresses! IPv6 uses eight octet sets of four hexadecimal digits. IPv6 is backward compatible with the
older IPv4, allowing for gradual upgrades. It is designed to run well on high speed Gigabit Ethernet networks while still
providing efficiencies for low bandwidth networks, such as wireless networks. The 128-bit IPv6 address is divided into
eight 16-bit hexadecimal numbers separated by colons (:). The format is represented by
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx, If part of the address is expressed as :0000: or several sets of zeros, the
shorthand version will look like this:
2342:0000:1F1F:0100:0010:0100:11B0:AFFF
The first 64 bits are used for the network prefix whereas the last 64 bits are used to identify the interface ID, which is
the host. The first 24-bits in the interface ID represent the company ID, and the last 40 bits represent the extension ID
that creates a larger address space for the NIC manufacturer to use. Another key difference between IPv4 and IPv6
addressing is in the way IPv6 configures hosts. Instead of an IP address, subnet mask, and default gateway that IPv4
uses, each node on an IPv6 network is required to have three different addresses. The host receives an address from
the upstream supplier, a local address, and a link local address.
2.6 Identify classful IP ranges and their default subnet masks For
example: Class A, B and C).
Internet addressesaddress ranges and supported hosts and networksare assigned from the following three
classes.
Class A - 1.0.0.0 to 126.255.255.255 - supports 16,777,214 million hosts on each of 126 networks
Class B - 128.0.0.1 to 191.255.255.255 - supports 65,534 hosts on each of 16,000 networks
Class C -192.0.0.0 to 223.255.255.255 - supports 254 hosts on each of 2 million networks
Routers use subnet masks to determine and separate (mask) the network and host portions of the IP address. There
also is a class D address range, which is used for Multicast and Class E address range that is experimental.
Class A networks have a binary value of zero and a decimal number from 1 to 126. The first eight bits represent the
network portion of the subnet mask ID whereas the remaining 24 bits represent the host portion of the subnet mask ID.
Class A networks use the following subnet mask: 255.0.0.0 where 255 represents the network ID and 0.0.0 the host.
Represented as binary, a Class A address is 11111111.00000000.0000000.00000000.
Class B networks have a binary value of 10 and a decimal number from 128 to 191. Class B networks use the first 16
bits to represent the network ID and the last 16 bits represent the host. Class B networks use the following subnet
mask: 255.255.0.0; where 255.255 represents the network ID and 0.0 the host. Represented as binary, a Class B
address is 11111111.11111111.0000000.00000000.
Class C networks have a binary value of 110, and therefore decimal numbers from 192 to 223. Class C networks use
the first 24 bits for the network ID and the remaining 8 bits for the host. Class C networks use the following subnet
mask: 255.255.255.0; where 255.255.255 represents the network ID and.0 the host. Represented as binary, a Class C
address is 11111111. 11111111.11111111.00000000.
Note that 127.0.0.0 represents a loop back address and is reserved. Also network address 0 is reserved for routers
and the network address 255.255.255.255 is used to broadcast network signals.
Telnet
Telnet stands for Telephone Network, so called because most Telnet sessions occur over a dial-up network. Telnet is
a terminal emulation program often used to connect a remote computer to a Web server but can connect to any kind of
server. Once the connection is established, you enter and execute commands using a command prompt. Telnet
depends on TCP for transport services and reliable delivery. To start a Telnet session using a Telnet client, you must
log onto a Telnet server by entering a valid user name and password.
2.12 Identify the well-known ports associated with the following commonly
used services and protocols:
Port Number
Services and
Protocols
Function
20
FTP
Transfers data
21
FTP
22
SSH
23
Telnet
25
SMTP
53
DNS
69
TFTP
80
HTTP
110
POP3
119
NNTP
123
NTP
143
IMAP4
443
HTTPS
Network Service
Purpose
DNS
Translates and resolves IP addresses into host names or the reverse: resolves host
names to IP addresses.
NAT
Allows a LAN to use one set of IP addresses for in-house traffic and a second set of
IP addresses for external or Internet traffic. NAT hides private, internal IP addresses,
reducing the possibility of conflict with other companies IP address assignments.
ICS
Connects multiple computers in one LAN to the Internet through a single connection
and a single IP Address. ICS uses NAT. All versions of Windows except WFWs have
ICS software built into the network operating system.
WINS
SNMP
Monitors the network and network devices. SNMP sends messages to different parts
of a network. SNMP agents store and return data to the SNMP requesters. Uses
Management Information [Data] Bases (MIB) to define what information is available
from a managed network device.
Permits network users to access and use shared files. Similar to peer-to-peer network
file sharing. NFS allows different computer platforms running different OSes to share
files and disk storage space across both a local network and the Internet. Is a
client/server application developed by Sun Microsystems.
Zeroconf (Zero configuration) Cconnects networking devices using an Ethernet cable. Mainly supported by UNIX
systems with a focus on GNU/Linux and BSD. No configuration or DHCP server is
required.
SMB (Server Message Block)
Shares files, directories and devices. A message format used by DOS and early
Windows NOSs. Samba also uses SMB to allow UNIX/Linux and Windows machines
to share directories and files.
Used with TCP/IP, AFP over TCP/IP permits users to access AFP servers. AFP is an
AppleTalk network client/server file sharing protocol. AFP can be installed on nonapple computers allowing them access to an AppleTalk server
Processes LPR client print jobs. The LPD print server queues and prints the file.
Originally used on UNIX servers
Samba
Provides file and print services to SMB clients. An open source version of the SMB
file sharing protocol. Samba, originally developed for UNIX, also runs on Linux,
2.14 Identify the basic characteristics (For example: speed, capacity and
media) of the following WAN (Wide Area Network) technologies:
Packet Switching Versus Circuit Switching
The difference between packet switching and circuit switching is the use of resources. Using circuit-switched networks,
messages are broken into packets. Circuit switching uses a dedicated connection between the sender and receiver
that is maintained throughout the exchange. Network resources using circuit-switched networks are static before the
start and until the end of the data transfer, creating a logical circuit.
Using packet-switched networks, on the other hand, messages are broken into packets, each of which can take a
different route through the network to the destination where the packets are reassembled. So, in packet-switched
networks, resources are not reserved and can travel several routes through various routers.
Not all networks can be classified as pure circuit-switched networks or pure packet-switched networks. An example of
this is Asynchronous Transfer Mode.
X.25
Used in WAN packet-switching networks, the X.25 standard was approved in 1976. The X.25 protocol suite maps to
the lowest three layers of the OSI reference model: layers 1, 2, and 3. The X.25 standard defines how connections
between user devices and network devices are established and maintained. X.25 network devices are often used by
the phone companies and fall into three general categories: data terminal equipment (DTE), data circuit-terminating
equipment (DCE), and packet-switching exchange (PSE).
POTS/PSTN
PSTN is our national public switched or phone network service that carries analog voice data at speeds up to 56 Kbps.
Mentioned earlier, Plain Telephone Service (POTS) is the ordinary phone service we use in our homes. Companies, of
course, use POTS for their business phones and fax machines and often also use computer modems for internal fax
sending and receiving.
Satellite
Satellite broadband technology offers Internet access by using a satellite modem that sends signals to a home-based
satellite disk that, in turn, sends and receives signals to a terrestrial satellite orbiting above the earth. Homes and small
business with twenty or less users can use satellite broadband with download speeds up to 1.5 Mbps and upload
speeds of only 128 Kbps. Due to slower Internet access speeds, satellite broadband is used primarily in rural areas
that don't have access to cable or DSL technology. As with other types of satellite technology, a clear line-of-sight,
southern orientation of the satellite disk is necessary. Satellite broadband Internet access technology hasn't really
caught on due to its slower upload and download speeds.
Wireless
Wireless Internet access technology is increasing in popularity, especially with consumers, due to its mobility.
Businesses, of course, are also providing wireless Internet access for users. Business Internet wireless applications
include e-commerce, e-mail, instant messaging, entertainment, and information services. Wireless access points are
used to send and receive data to users or consumers using wireless network devices such as laptop and notebook
computers. Due to its higher transmission speeds of 54 Mbps, 802.11g wireless network devices are favored today to
access the Web.
2.16 Define the function of the following remote access protocols and
services:
Table 17 - Remote Access Protocols
Protocol or Service
Function
RAS
PPP
SLIP
PPTP
VPN
RDP
2.17 Identify the following security protocols and describe their purpose
and function:
IPSec (IP Security)
IPSec is a security protocol that provides authentication and encryption over the Internet. It operates at the Network
layer and secures all packets operating in the upper OSI layers. It works with IPv4 and IPv6 and has broad Industry
support. IPSec uses either Authentication Header (AH) or Encapsulating Security Payload (ESP) to ensure sender
authentication and data encryption. It is most often used to secure VPN on the Internet using digital certificates sent
from the server to authenticate the sender.
802.1x
The IEEE 802.1x standard includes a method for passing the Extensible Authentication Protocol (EAP) over both wired
and wireless networks. EAP provides authentication services for wireless networks not using PPP.
Kerberos
Kerberos is more than a strong, secure network authentication protocol. Its a full-fledged security system designed to
provide strong authentication for client/server applications by using secret-key cryptography. Created at MIT, Kerberos
establishes a user's identity as soon as he or she logs onto a network where Kerberos is supported. A unique key
(ticket) is issued to each user after the user logs onto the network. All network messages that the user sends over the
network contain this unique key used to identify the user-sender. The user identification and security credentials
contained in the embedded ticket are used throughout the entire network session. The encryption used by Kerberos is
freely available. The source code can also be downloaded via the Internet. The Windows 2000 family, Windows XP,
Windows Server 2003, UNIX, Novell, and Linux all support Kerberos.
UNIX
/ Linux
Client support - Multi-user, multitasking network operating system that comes in many flavors. Linux supports
many different NOS platforms and also uses a graphical user interface (GUI).
Interoperability - Using TCP/IP, can interoperate with Linux, Windows, NetWare, and Mac OS X clients with
often-included server/client OS software.
Authentication - Requests a user password to authenticate identity that is encrypted and compared to password
stored in etc/password directory. Uses NIS authentication on the network and etc/passwd authentication on the
local machine.
File and print services - Uses LPD/LPR printer services; file systems compatibility includes FAT-16, FAT-32, and
NTFS Linux uses Ext2 and Ext3 file systems natively.
Application support and security - Good, but not as much application support as Windows; however, Linux
applications are increasing. As secure as Windows file level security; can be spread out on several texts files as
compared to one file with Windows. Novell is one of the companies at the forefront of improving Linux application
support.
NetWare
Client support - Multi-user, multitasking, graphical user interface (GUI) network operating system.
Interoperability - Using TCP/IP can interoperate with Linux, Windows, Novel and Mac OS X clients with oftenincluded Server/client OS software.
Authentication - Requests a user password to authenticate identity. User public/private keys are stored in NDS
(Novell Directory System).
File and print services - Uses Novell's File and Print directory service. Manages all network resources using
eDirectory which is based on the X500 standard.
Application support and security - Broad application support and extensive security features. Uses NDS and
object security. The primary security features for NetWare, by default, lockdown the server and have to be
opened and changed by the server admin. No users have access to the server until you grant them access.
Windows
Client support - Multi-user, multitasking, graphical user interface (GUI) network operating system. Windows
supports many different NOS platforms.
Interoperability - Using TCP/IP, can interoperate with Linux, Windows, NetWare, and Mac OS X clients with
included server/client OS software.
Authentication - Uses domain username/password authentication
File and print services - Can use FAT-16, FAT-32 and or NTFS file system; includes printer services with large
print vendor driver support. Manages network resources using Active Directory services which is based on the
X500 standard.
Application support and security - Broad application support and extensive security features. Only NTFS offers
file-level security. The NOS, due to popularity, regularly needs security patches and OS updates.
AppleShare IP
AppleShare IP software is fast, scalable, secure, software used to
communicate and exchange information with other AppleShare or Mac
Servers. Contains integrated file, print, mail, and Web services. Server
administration uses shared users and groups. Can also be used to manage
servers remotely with remote administration interface using TCP/IP. Many
optional AppleShare IP security services are sold separately.
VLAN Benefits
Better bandwidth management - Compared to its hub-serviced (and bandwidth challenged) alternative, VLANs
isolate traffic. Even if a device goes off the deep end and sends out broadcasts or multicasts, it only affects the
particular segment that its connected to. No other segment listens to those messages. This is great for dealing
with broadcast storms or troubleshooting a hard to track down issue.
Reduced administration costs - VLANs provide an effective mechanism to control changes, such as physical
movement of users within a network, reducing hub and router configuration costs once your VLAN is set up.
VLAN Memberships
Static VLANs Typically, port switches are assigned to each VLAN. The switch port associated with the VLAN
maintains that association until the administrator changes the port assignment.
Dynamic VLANs All host devices hardware addresses are placed in a database, and the switches are
configured to assign VLANs automatically.
Creating a VLAN
Its fairly easy to create a VLAN with a switch. Just configure, Telnet into the switch and enter your VLAN parameters
(name, domain, port assignments, etc). Once youve configured this, your VLAN is set up and any network segments
connected to the assigned ports will be part of the VLAN. For security reasons, however, many system administrators
prefer to do a direct serial connection and administer the switch using Hyperterminal or the switchs web admin
interface.
You can have more than one VLAN on a switch, but they cannot communicate directly with one another on that switch.
This is an important concept because if VLANs could communicate with each other on the same switch, it would defeat
the purpose of having a VLAN, which is to isolate a part of the network. If you want your VLANs to communicate, youll
usually need to get another switch. The exception would be the router-on-a-stick setup.
VLANs, however, can span across multiple switches, or you can have more than one VLAN on each switch. For
multiple VLANs on multiple switches to be able to communicate via a single link between the switches, you must use a
process called trunking. Trunking is the technology that allows information from multiple VLANs to be carried over
just one link between switches.
Link Redundancy
Depending on the companies size, location, and need for redundancy, data and voice wireless links can be
implemented so that linked transmissions can continue to reach the network backbone providing continuous network
connectivity. This redundancy can, however, become expensive especially when leased lines are used.
For link redundancy, ISDN can be deployed as a backup link that is brought up when the T1 goes down. Wireless
technology, although expensive and not used as often, provides a flexible and scalable alternative to fiber or leased
T1/E1 lines. Wireless plug-and-play Ethernet point-to-point bridges can be employed for link redundancy providing a
variety of solutions for transparent, reliable, high-speed network connectivity. Wireless Ethernet bridges can be
installed on all types of Ethernet LANs between office buildings, factories, warehouses, and remote locations up to
forty miles in distance. Because they can cost five thousand dollars and more, wireless Ethernet bridges are primarily
used by ISPs and for Enterprise LANs and WANs.
Wireless digital spread spectrum transmission devices can also be implemented for link redundancy. Digital
microwave wireless radios can extend or link company locations at distances of up to fifty miles providing wireless
network connectivity. In the event of a network power interruption, hot standby protection switches for either wireless
technology provide instant switchover to the wireless link redundancy devices.
Services
Mission critical network services are provided not only by mission critical servers, but also by various network devices
like switches, routers, gateways and other devices. All these network devices including servers should have UPSs
Backup/Restore
All types and sizes of businesses need to backup their important applications and data daily to a tape backup device.
There are primary types of tape backups.
Table 21 - Backup Types
Full
Backs up all data. Takes the longest time to backup. Clears file archive bit on all backed-up
files.
Incremental
Only backs up files added or changed since the last backup. Backs up faster than differential,
but restore requires multiple tapes and takes longer- last full backup tape plus all incremental
tapes since the last full backup. When restoring incremental tape backups, always take care to
restore tapes in the correct order, oldest to newest. Clears archive bit on all backed-up files.
Differential
Backs up all files since last FULL backup. Differential backups take longer than Incremental to
backup, but faster than Incremental to restore, requiring only two tapes - the most recent full
backup and most recent differential backup. Does not clear file archive bits.
Copy or Mirror
A copy backup is the same as a full backup except, they do not mark files as backed up. This
backup type is most commonly used to make offsite copies of backup data.
Offsite Storage
Besides using a standard backup to tape or disk, cost effective solutions also include Data Warehousing - using a
third party company to store your mission critical databases off site.
Hot and Cold Spares
Hot Spare/Hot Swapping - RAID storage feature that allows a spare SCSI hard drive to be installed and
configured on a on-line, running server for automatic regenerating of lost data in the event of hard disk failure.
Replacing one failed SCSI hard disk drive in a RAID array while the RAID array server is operating.
Cold Spare/Cold Swapping - A spare SCSI hard drive available. The RAID array server has to be shut down and
power off before replacing a SCSI hard drive in a RAID array
Fail Over - When one device, database, server, or network fails, a standby automatically takes its place. This is
an important fault tolerance function for mission-critical environments where constant accessibility to mission
critical data is a must. Banks, for example, often employ this method along with clustering.
Utility
Operating System
Function
config
NetWare
ifconfig
UNIX/Linux
winipfcg
Windows 95/Windows 98
ipconfig
Windows NT/Windows
2000/Windows XP
ping
tracert
Windows 2000/Windows
XP/Windows 2003
traceroute
UNIX/Linux
netstat
UNIX/Linux/NetWare
nbtstat
arp
nslookup
Windows 2000/Windows
XP/Windows 2003
dig
UNIX/Linux
Nslookup equivalent
4.2 Given output from a diagnostic utility (for example: utilities listed in
4.1), identify the utility and interpret the output.
The easiest and best way to become familiar with the troubleshooting utilities listed in Section 4.1 is to execute them at
a command prompt on your own machine. Typing the utility name followed by a space, forward slash, and question
mark displays all the optional switches, along with a brief description of their functions. You should try all the above
listed utilities along with their common switches and settings. You will best learn how to use each utility by opening a
command emulator in your GUI and trying it out.
4.3 Given a network scenario, interpret visual indicators (for example: link
LEDs (light emitting diodes) and collision LEDs) to determine the nature of
a stated problem.
1. Shortly after your PC POST completes, NIC drivers load and the NIC link light displays. The link light LCD
on the back of the NIC is green and the collision LCD light is amber. The link status light should always be
on, emitting a steady, constant green color. If the link light is not displayed or is flickering, the NIC may be
defective.
2. Next, check the LCD link light on the switch port to which the NIC is connected. This light should also
display a steady, constant color, usually green. If the NIC card is defective, the cable is bad, or the switch
port is bad, no light is displayed.
3. The amber color collision light on the back of the NIC should blink intermittently, indicating normal Ethernet
network collision activity. If it stays on continuously, it indicates high network activity caused by many
packet collisions. This result indicates either an overloaded network segment or a defective NIC. Similar
network activity is also displayed on the network activity switch port LCD to which the NIC is connected.
NetWare
Network connectivity issues and is always a good place to start. For example, if your connection to the NetWare server
is slow or intermittently lost, you could change the NICs on the server and client to half-duplex.
Current versions of NetWare like current version of Windows products natively support TCP/IP. Early versions of
Novell's NetWare operating system used proprietary protocols. NetWare 3.11 uses IPX/SPX (Internet Packet
Exchange/Sequenced Packet Exchange) protocols. Windows NT 4, no longer supported by Microsoft, uses NWLink,
which is Microsoft's version of IPX/SPX that communicates with Novell NetWare servers using the IPX/SPX protocol.
Windows 2000 and Windows XP clients also need to install NWLink to use network resources on NetWare servers.
NWLink is a low-level transport protocol that provides services for upper-level protocols. Improperly configuring
NWLink is a common problem and results in lack of connectivity to NetWare servers.
Frame type detection: A frame type is the format a packet uses to communicate on your network. Many
problems on Ethernet networks occur from selecting the wrong frame type. If you selected Manual frame type
detection, and clicked Add, four choices are available: Ethernet 802.2, Ethernet 802.3, Ethernet II, and Ethernet
SNAP. The first two are the most common on a NetWare network. NetWare servers before version 3.12 default
to Ethernet 802.3. Newer NetWare versions default to Ethernet 802.2. Ethernet II and Ethernet SNAP are
usually used for TCP/IP and AppleTalk; select the frame type you use on your network. It's best to leave the
default adapter radio button to Auto frame type detection. Using Auto, Windows tries each frame type until it
finds one that works.
Network number - Also displayed in the Manual frame detection dialog box is the Network number. Routers use
this number to determine whether to route packets to another network. Every network that is segmented with a
router must have a unique IPX network number. This IPX network number is configured on NetWare servers and
routers. NWLink always attempts to auto detect this number. If it can't detect an IPX network number, the default
number zero is used. If you need to troubleshoot the frame type and network number, open a command prompt
and type IPXROUTE CONFIG, which returns a description of your network card, the frame type(s) in use, and
the network number.
Internal network number -The internal IPX network number is also displayed in the NWLink dialog box. This
number refers to a virtual network to which the NetWare server routes. NetWare servers always have an
internal, unique IPX network number. You can also set this number in Windows, but it is usually left at the default
setting because only File and Print Services for NetWare and Multi-Protocol Router services use it.
Client Services for NetWare - Client Services for NetWare (CSNW) runs as a service on Windows workstations
allowing users to access file and print resources on a NetWare server. CSNW uses NWLink to communicate on
the network. CSNW supports NetWare versions 2.x, 3.x, and 4.x in bindery emulation mode.
Gateway Services for NetWare - Gateway Services for NetWare (GSNW) provides similar functionality of
CSNW. GSNW runs only on Windows NT Server and adds a gateway between NetWare servers and Windows
clients. It is often employed on a network when only a few Windows clients need access to NetWare shares.
GSNW lets you share a NetWare volume to Microsoft clients. NetWare uses NetWare Core Protocols (NCPs).
Windows NT uses Server Message Blocks (SMBs). GSNW converts SMB requests from a Microsoft client to
NCP requests. This conversion lets a Microsoft client attach to a share on the Windows NT Server that in
actuality is connected to a NetWare server. GSNW supports NetWare versions 2.x, 3.x, and 4.x in bindery
emulation mode.
Windows
Client for Microsoft Networks Network Connectivity
All Windows clients need to have a network service (Client for Microsoft Networks), a protocol for communicating
(TCP/IP), and a method for sharing files and printers (File and Printer Sharing for Microsoft Networks) installed. During
the network card detection phase on a Windows 2000 or Windows XP installation, the operating system auto detects
the NIC and automatically installs these services and protocol. A dialog box prompts you to either accept the default
typical settingsobtain an IP address automaticallyor you can choose custom and manually configure your TCP/IP
settings.
Troubleshooting Network Connectivity
Make sure your NIC and cable are properly functioning. Use Device Manager to check the functioning of your
computers or servers NIC.
Make sure your TCP/IP configuration settings are accurate by typing Winipcfg (Windows 98) or Ipconfig /all at
a command prompt.
Use the ping command sequences to determine the source of the problem.
Remote Desktop Connection Manager (RDC): Windows 2000 and Windows XP clients can test network connectivity to
a Windows server by using the RDC utility. To access the use the RDC utility, click Start > All Programs >
Accessories > Communications > Remote Desktop Connection, and type the Windows server computer name in
the resulting dialog box. Clients running Windows NT, Windows 98, or Windows 2000 can install the Client for Remote
desktops application by browsing to the following Web site and downloading and installing the Client for Remote
Desktop file: Client for Remote Desktop.
Windows NT and Windows 98 clients can also check server connectivity by clicking Start > Find > Find Computer,
and then entering the computer name of the Windows server.
If you are having problems using PPP, make sure to start PPP logging and review the results. Modems are sensitive to
variations in electrical current. If you are using a dial-up connection and having problems, be sure to test your modem
in: Phone and Modem Applet, Modems tab, Properties, Diagnostic tab, Query Modem button.
Also use Event Viewer to detect and troubleshoot possible operating system issues. Event Viewer displays detailed
information about system events. The information includes the event type, the date and time the event occurred, the
source of the event, the category for the event, and the event ID.
Windows System Information utility is another useful diagnostic tool. You access it by clicking Start > All Programs>
Accessories > System Tools> System Information. Hardware settings and components and Internet and
application settings are all listed and summarized. The NetDiag utility can be run (Start > Run, type NetDiag) to
review diagnostic output information. Finally, to check the status of services, click the Services applet found in the
Administrative Tools folder and review running services relative to network connectivity.
AppleShare IP
Troubleshooting Network Connectivity
Workstations are unable to connect to the server, the screen freezes while connected to the server:
Run a diagnostic repair utility to check and/or repair the hard disk drive. If necessary, run the utility again until no
problems are reported. If the hard disk cannot be repaired, backup and reformat your hard disk, then restore the
software.
Run an anti-virus utility with your latest, updated virus definitions. For Mac OS 8.6 or earlier, uncheck
Remember recently used items in the Apple Menu Options control panel.
Mouse drag the TCP/IP, AppleTalk preferences, and the AppleShare Prep files to the Trash. Click Empty
Trash from the Special menu. Reset PRAM and reconfigure AppleTalk and TCP/IP.
Verify that your version of AppleShare client is compatible with your OS. Use AppleShare client 3.8.1 on
workstations using operating System 7.6 and above.
AppleShare IP 6 Troubleshooting
Use the AppleShare IP 6 Web and File Admin application to enable TCP/IP and SMB connectivity.
In the AppleShare menu, in the Web and File Server Settings window, click Enable File Server Clients to
Connect over TCP.
Using the Windows File Sharing menu, click Enable Windows File Sharing (SMB). Make sure to type the
server name, workgroup name, and description.
AppleShare IP Web Sharing is to test TCP/IP network connectivity. The PING utility is located under the Start menu is
used to ping the IP address of the AppleShare IP server, or you can use Windows Internet Explorer to test
connectivity.
Name resolution requires the use of a DNS or Hosts file. The Hosts file contains text describing the proper syntax and
usage. Because the Hosts file is static, it requires manual updating. A DNS server is the preferred method for resolving
host names into IP addresses.
Windows Clients: Connecting to an AppleShare IP server
Windows 2000 and Windows XP clients can test connectivity to the AppleShare IP server by using the Remote
Desktop Connection (RDC) Manager utility. Review the above section under Windows, Troubleshooting network
connectivity for installation and RDP operation. For Windows 98 and Windows NT clients, click Start and choose
Find, Find Computer, and then enter the computer name of the AppleShare IP server. For frequent access to this
server, create a desktop shortcut. You can also map a drive to the AppleShare server by right-clicking Network
Neighborhood (Windows 98) or right-clicking My Network Places (Windows 2000 and Windows XP) and choosing
Map Network Drive.
DHCP
A DHCP server is used to automatically provide clients with an IP address and other important IP addresses, such as
the network gateway address and preferred DNS server IP address. DHCP servers are first configured with a scope,
or range, of IP addresses so that clients can obtain IP address leases for a certain period of time. Also configured with
the scope is an exclusion range of IP addresses used to manually configure network-shared devices, such as servers.
In addition, DHCP server options, such as the IP addresses of the gateway router, DNS name server, and WINS, are
configured.
Adding DHCP - DHCP servers are commonly used on all types of TCP/IP networks. DHCP clients must have
their TCP/IP configuration set to automatically obtain an IP address. Clients contact the DHCP server after boot
up to obtain their DHCP IP leased address and other DHCP settings. If clients are initially configured with static
IP addresses and a DHCP server is later added to the network, client machines need to be reconfigured to
obtain an IP address automatically. Next, each client either needs to be rebooted to obtain a DHCP IP address
or type ipconfig /renew at a command prompt to obtain a DHCP IP address.
Modifying DHCP - Modifying the DHCP scope so that is contains IP addresses being used by other devices can
cause problems. This results in one of the devices not being able to connect. Additional DHCP scopes can be
added to the DHCP server at any time. Because a current scope is in use, it needs to be deactivated but not
deleted until all DHCP clients are leasing IP addresses from the new scope. For clients to use the new scope, at
each client machine, type ipconfig /release and then type ipconfig / renew to obtain the new scope IP address
and scope options.
Removing DHCP - If a DHCP server is removed from the network, all former DHCP clients need to manually
configure their TCP/IP settings to static IP addresses. Failing to do so results in clients obtaining an APIPA IP
address. Because the APIPA IP address is not in the current subnet range, network shared resources are
unavailable to APIPA clients until their IP settings are manually configured to a valid IP address in the network
subnet.
DNS
A DNS server is used for name resolution. It resolves host names into IP addresses and vice versa. Using name
resolution allows LAN clients to browse and use shared network resources by name rather than memorizing IP
addresses. Typing a URL in your browsers address box is much easier to do than trying to find the IP address of the
server. Using the WWW service on the Internet and typing in URLs is a great example of using DNS name resolution.
DNS servers maintain a list of host names and their associated IP addresses in a dynamic database.
Adding DNS - Adding a DNS server to your TCP/IP LAN reduces network traffic and increases client response to
accessing shared network resources. Note that if clients were using the lmhosts file for name resolution prior to
adding the DNS server, the IP to name statements in the lmhost files need to be commented out because
windows computers look at those files first before using DNS by default, If these statements are not commented
out, the client computers are likely to have name resolution connection problems. Windows DNS-aware clients,
such as Windows 2000 and Windows XP clients, must register their host name and IP address with the new
DNS server. To use the new DNS server, each client either needs to be rebooted to register their host name and
IP address, or type ipconfig / registerDNS at a command prompt to register their host name and IP address.
Note that these actions do not apply to Windows down-level, non-DNS aware clients, such as Windows 98 or
Windows NT.
Modifying DNS - Although DNS servers add DNS records dynamically, administrators can and do add static
Hosts records to the DNS database. Adding a static Hosts record, such as your WWW Web page host name
and IP address, improves response time and does not disrupt LAN functions.
Removing DNS - Removing a DNS server because of a failure or for maintenance results in client network
connectivity problems for all DNS aware clients. Windows 2000 and Windows Server 2003 networks are
essentially non-functional until a new DNS server is configured and running. Clients may have to register with
the new DNS server by typing ipconfig /flushDNS to purge old, stale records and then typing ipconfig
/registerDNS to register their DNS record with the new DNS server. Note that this example is a worst-case
WINS
A WINS server is used to provide name resolution for Windows down-level clients, such as Windows 98 and Windows
NT 4. WINS resolves NetBIOS or computer names into IP addresses and vice versa. A NetBIOS name up to 15
characters is entered during the installation of Windows 95, Windows 98, and Windows NT clients in their Computer
Name text box. Using WINS for name resolution allows WINS-aware clients to browse and use shared network
resources by name rather than IP addresses.
Adding WINS - Adding WINS for down-level Windows clients improves response time to mapped or shared
network drives and resources. Similar to DNS, WINS maintains a dynamic database of computer names and
their associated IP addresses. Note: if your network does not contain any down-level Windows clients, installing
WINS is not necessary.
Modifying WINS - Although WINS records can be added manually, there is seldom a need to do so. Modifying
WINS does not affect client name resolution.
Removing WINS - Removing a WINS server is generally done after all Windows down-level clients are upgraded
to either Windows 2000 or Windows XP. Because Windows 2000 and Windows XP or any other clients such as
Linux, NetWare or AppleShare IP are DNS aware, DNS servers are used for name resolution for these clients. If
a WINS server is removed for maintenance or hardware/software failure, name resolution for Windows downlevel clients is performed by the NOS, and usually results in longer response time to accessing shared
resources.
Star
Troubleshooting a star topology is straightforward and simpler than troubleshooting a bus topology. A bad or defective
cable or cable break, or a defective network device or NIC affects only that node and not the entire network segment.
Begin troubleshooting at the network device NIC by examining the NIC link and activity LCD lights. If they are OK,
examine the segment switch node connector port light for connectivity and network activity. Depending on your results,
replace the defective network device or NIC, or the defective cable or connector. If the entire star topology segment
has failed, troubleshoot or replace the central segment switch.
Mesh
Ring
Although the ring topology eliminates Ethernet network packet collisions, it is similar to bus topology in
troubleshootingit can be difficult to troubleshoot. A defective node on a logical ring causes the entire logical ring
segment to fail. To troubleshoot and determine the defective node, begin troubleshooting at one of the ring's nodes by
examining the NIC status and LCD indicators, cable, and connectors. If the node appears OK, use the included
network browsing utility or the ping command and browse or ping the local node. Continue troubleshooting to the next
node until you can no longer browse the network or ping the node. At that point, isolate the problem to the network
device or NIC, break in or defective cable, bad or loose connector and replace the defective component,
Wireless Networks
To troubleshoot wireless connectivity problems, follow these steps:
Check physical connections. Check media cables and connectors for wired PCs connected to the WAP router
ports. Check both PC NIC and LAN port activity lights.
Check wireless adapter. Check the wireless network adapter properties using the Windows Device Manger. If
you have a yellow question mark or red X, download an install the latest wireless adapter drivers to fix the
problem. Verify that the adapters LAN connection properties status is enabled.
Verify your network configuration. Using a browser, type the routers gateway address and verify that the routers
LAN status is active. If DHCP is enabled, verify that the scope of DHCP addresses is on the same subnet as the
router's gateway address.
Verify PC configuration. Type ipconfig at a command prompt to verify that you have a valid IP address and
default gateway address. Use the ping command to ping the gateway address. Note that you may have to
enable using ping in the router admin console, or you may have to disable personal software firewalls.
No packets received. If your adapter is properly configured, operational and able to ping, but you aren't sending
or receiving packets, then your wireless adapter is not communicating with your WAP router. Check that both
your router and adapter are using the same SSID, WEP, and WPA settings.
A wireless networking troubleshooting tool includes a spread spectrum analyzer, which you use to test for radio
frequency interference and wireless interference.
Interference is a significant problem on wireless networks. Check for nearby wireless networks using the same or
similar channel number, wireless phones using the 2.4 GHz band, microwave ovens, metal objects such as file
cabinets, partitions, and metal blinds that could be deflecting the RF signal. Also, the distance a node is from the
nearest AP makes a big difference in the connection speed: the further away the wireless device is from the AP, the
slower the connection speed.
Troubleshooting Strategies
Following a logical troubleshooting strategy is essential. Begin by identifying the symptoms of the problem, and then
isolate the problem to a hardware or software issue. Remember, software problems are usually repetitive and occur in
the same place at about the same time. Hardware problems are just the opposite, often occurring randomly at different
time intervals. Another clue is whether this problem occurs with just one user or several users. If the problem occurs
with several users, the problem is usually software related (excluding a server hardware failure); with one user, the
problem can be either software or hardware. If this problem occurs with just one user, ask the user what he or she was
doing right before the problem occurred. Based on the user's answers and your own findings, implement a course of
action and probable solution. If you can, test the action plan solution and results before you actually implement it.
Review the results of your implementation and any side effects that occur. Finally, be sure to document your process
and results for future reference.