Chapter 4 Connecting to the Internet through an ISP

Similar documents
CCNA Discovery Chapter Four

Network Design. Yiannos Mylonas

Chapter 2 TCP/IP Networking Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Appendix B Network, Routing, Firewall, and Basics

Chapter 5. Data Communication And Internet Technology

COMPUTER NETWORK TECHNOLOGY (300)

Networks. The two main network types are: Peer networks

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Cisco Network Performance Evaluation Using Packet Tracer

SSVP SIP School VoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification

COMPUTER NETWORK TECHNOLOGY (40)

Technical Support Information Belkin internal use only

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

Study Guide CompTIA A+ Certification, Domain 2 Networking

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Chapter 1 Personal Computer Hardware hours

Chapter 15: Advanced Networks

Networking 4 Voice and Video over IP (VVoIP)

Ethernet Patch Cord Wiring

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

11/22/

ADSL BROADBAND BASICS FOR THE DOMESTIC USER. The Main Limitations of ADSL Broadband are as follows.

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

TCP/IP Networking Basics. NETGEAR, Inc Great America Parkway Santa Clara, CA USA

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Cisco - Ethernet 100BaseTX and 10BaseT Cables: Guidelines and Specifications

Introduction to Computer

How to Choose the Right Cable Category

Networking Technology Online Course Outline

Computers Are Your Future Prentice-Hall, Inc.

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Security & Surveillance Cabling Systems

T3 Mux M13 Multiplexer

Networking Devices. Lesson 6

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Presenters Brett Weiss, Gabe Martinez, Brian Kroeger.

Telecommunications, Networks, and Wireless Computing

The Internet and Its Uses

Cabling LANs and WANs

ADSL MODEM. User Manual V1.0

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Chapter 3 Connecting the Router to the Internet

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks

Advanced Higher Computing. Computer Networks. Homework Sheets

SHEET 5 CABLE TELEVISION SYSTEM

Local-Area Network -LAN

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements

Broadband Phone Gateway BPG510 Technical Users Guide

The Conversion Technology Experts. Media Conversion: Cost-Effectively Integrating T1 into your Fiber Network

Computer Networks I Laboratory Exercise 1

Things You Must Know About Gigabit Ethernet 1. Understanding Gigabit Ethernet

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

2. IP Networks, IP Hosts and IP Ports

Networks 2. Gabriela Ochoa University of Stirling CSCU9B1 Essential Skills for the Information Age. Content

Home Network. Installation Instructions

PROFINET Diagnostics Software and Tools

ANSI/TIA/EIA A, Commercial Building Telecommunications Cabling Standard.

Chapter 4 Customizing Your Network Settings

Technical Glossary from Frontier

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

Data Transmission. Data Communications Model. CSE 3461 / 5461: Computer Networking & Internet Technologies. Presentation B

DSL-2600U. User Manual V 1.0

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

Linksys Gateway SPA2100-SU Manual

Broadband 101: Installation and Testing

Telecommunications systems (Part 2)

Service Definition. Internet Service. Introduction. Product Overview. Service Specification

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

The OSI Model: Understanding the Seven Layers of Computer Networks

CSCI Topics: Internet Programming Fall 2008

Page 1 of 7. Computer Networking

Session 2; Cabling Technology in the Data Centre Media Choices; Copper Twisted Pair

Christopher Rathgeb ECE 453 Dr. Qi 9/19/2006. Task 1: Make an Ethernet cable yourself.

Fiber Distributed Data Interface

Chapter 3: IP Addressing and VLSM

LevelOne IFE Port PoE + 1-Port TP Industrial Fast Ethernet Switch User Manual

HIGHSPEED ETHERNET THE NEED FOR SPEED. Jim Duran, Product Manager - Americas WHITE PAPER. Molex Premise Networks

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK

EDGE FX Network configuration

Network Basics GRAPHISOFT. for connecting to a BIM Server (version 1.0)

How To Understand The Network Protocol Of A Network (Netware) 2.5 (Networchestra) 2 (Netwire) 2) (Netrocessor) 2-Way (Networking) 2,5 (Network)

Chapter 2 - The TCP/IP and OSI Networking Models

Contents. Section A Networking Basics Learning the Basics Section B Wired Ethernet Networking... 17

CompTIA Network+ (Exam N10-005)

2 Setting Up the Hardware for a Wired Ethernet Network Setting Up the Software for an Ethernet Network... 21

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Transcription:

Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No one gets on the Internet without a host computer, and no one gets on the Internet without going through an Internet service Provider (ISP). 2. Explain in detail what a Point of Presence or (POP) is. Individual computers and local networks connect to the ISP at a Point of Presence (POP). 3. Explain what an internet backbone is and what it does. The Internet is made up of very high-speed data links that interconnect ISP POPs and ISPs to each other. These interconnections are part of the very large, high capacity network known as the Internet Backbone. 4. Explain what services an integrated router or integrated services router (ISR) provides? This includes a switch to connect multiple hosts on a local network, and a router to move packets from your local network to the ISP network. A home networking device, such as an integrated router, can provide these functions, as well as wireless capability, in a single package. 5. Characteristics of asymmetric and symmetric data transfer: a. Asymmetric: Most commonly used for the home. Download speeds are faster than upload speeds. Necessary for users that download significantly more than upload. Most Internet users, especially those who use graphics or multimedia intensive web data, need lots of download bandwidth. b. Symmetric: Most commonly used for business or individuals hosting servers on the Internet. Used when necessary to upload large amounts of traffic such as intensive graphics, multimedia, or video. It can carry large amounts of data in both directions at equal rates. Networking for Home and Small Businesses Page 1 of 13

7. Ping utility: The ping utility tests end-to-end connectivity between source and destination. Checks whether the transmission is successful. 8. Traceroute (tracert) utility: The traceroute utility traces the route from source to destination. Each router through which the packets travel is referred to as a hop. Traceroute displays each hop along the way and the time it takes for each one. 9. What type of device would be required for an end user using DSL technology? If the end-user is using DSL technology to connect, the ISP must have a DSL Access Multiplexer (DSLAM) to accept these connections. 10. What type of device would be required for an end user connecting through cable? For cable modems to connect, the ISP must have a Cable Modem Termination System (CMTS). 11. What are the advantages of an integrated router or integrated service router (ISR) for home use? Integrated routers can perform several functions, including: Wireless LAN access point, switching, routing, firewalls and various address functions. An integrated router may support some or all of these functions. Networking for Home and Small Businesses Page 2 of 13

12. Draw a line between the correct device and the matching requirement. 13. What are three physical and environmental factors which must be considered when setting up a home or small business network? Environmental factors, such as heat and humidity. Cable management is another area of concern. 14. Networking media: A channel, or medium, provides a path over which the information is sent. It can be physical cable or electromagnetic radiation, in the case of wireless networking. 15. Types of network cabling: Twisted Pair - Modern Ethernet technology generally uses a type of copper cable known as twisted pair (TP) to interconnect devices. Because Ethernet is the foundation for most local networks, TP is the most commonly encountered type of network cabling. Coaxial Cable - Coaxial cable is usually constructed of either copper or aluminum, and is used by cable television companies to provide service. It is also used for connecting the various components which make up satellite communication systems. Fiber Optic - Fiber optic cables are made of glass or plastic. They have a very high bandwidth, which enables them to carry very large amounts of data. Fiber is used in backbone networks, large enterprise environments and large data centers. It is also used extensively by telephone companies. Networking for Home and Small Businesses Page 3 of 13

16. Two types of interference commonly found with twisted pair cables. a. A twisted pair cable is susceptible to electromagnetic interference (EMI), noise. b. A source of interference, known as crosstalk, occurs when cables are bundled together for long lengths. The signal from one cable can leak out to adjacent cables. 17. Three types of twisted pair cabling: a. UTP - unshielded twisted pair b. STP - shielded twisted pair c. ScTP - screened twisted pair 18. Explain what the following cables are used for, and common data speeds they can handle. Category 3 (10-16 Mbps) Used of Voice communication Most often used for phone lines Category 5 and 5e Used for Data transmission Cat 5 supports 100 Mbps and can support 1000 Mbps but it is not recommended Cat 5e can support 1000 Mbps Category 6 Used for Data transmission An added separator is between each pair of wires allowing it to function at higher speeds Supports 1000 Mbps (1 Gbps) 10 Gbps, though 10 Gbps is not recommended 19. What terminator is commonly used with all UTP cabling? All Categories of data grade UTP cable are traditionally terminated into an RJ-45 connector. 20. Why is UTP cable more commonly used than coaxial cable in local networks? Although coax has improved data carrying characteristics, most LANs uses twisted pair because coax is physically harder to install and is more expensive. 21. Why is fiber optic cable preferred for use in areas where electricity or electrical components is an issue? Fiber optic cable is constructed of either glass or plastic, neither of which conducts electricity. This means that it is immune to EMI and is suitable for installation in environments where interference is a problem. Networking for Home and Small Businesses Page 4 of 13

22. Label the parts of a fiber optic cable. 23. Two types of fiber optic cabling: Multimode Multimode is the less expensive and more widely used. Each ray of light takes a separate path through the multimode core. Multimode fiber optical cables are generally suitable for links of up to 2000 meters. Single Mode Single mode fiber optic cables are constructed in such a way that light can follow only a single path through the fiber. Single mode fibers can transmit data for approximately 3000 meters and is used for backbone cabling including the interconnection of various NOCs. 24. Activity Decide if fiber is the best solution to a cabling requirement. Put a check mark in the correct choice. 25. What is the difference between T568A and T568B pinouts. The orange and green pairs of wires are reversed. T568A starts with Green pair and T568B starts with Orange pair. Networking for Home and Small Businesses Page 5 of 13

26. What type of cable is needed for like devices? Crossover cable 27. What type of cable is needed for unlike devices? Straight through cable 28. Identify if a crossover or straight through cable is necessary to connect the devices listed below. Crossover Cable Straight Through Cable Crossover Cable Crossover Cable Crossover Cable Straight Through Cable Straight Through Cable Crossover Cable Computer to Computer Switch to Computer Router to Computer Router to Router Hub to Switch Switch to Router Hub to Computer Hub to Hub 29. Patch panel: The use of patch panels enables the physical cabling of the network to be quickly rearranged as equipment is added or replaced. These patch panels use RJ-45 jacks for quick connection on the front, but require the cables to be punched down on the reverse side of the RJ-45 jack. 30. Difference between a cable tester and a cable certifier: Networking for Home and Small Businesses Page 6 of 13

31. Cable faults: Short A short occurs when the copper conductors touch each other. As the electric pulse travels down the wire, it will cross onto the touching wire. Open An open circuit occurs when the wire is not properly pushed into the connector and there is no electrical contact. An open can also occur if there is a break in the wire. Split Pair A split-pair fault occurs when one wire from one pair is switched with one wire from a different pair at both ends. Reversed-Pair - The reversed-pair fault occurs when a wire pair is correctly installed on one connector, but reversed on the other connector. For example if the white/green wire is terminated on pin 1 and the green wire is terminated on pin 2 at one end of a cable, but reversed at the other end. 32. Identify the wire faults: Reversed Pair Open Short Split Pair Networking for Home and Small Businesses Page 7 of 13

33. Explain the term near-end crosstalk (NEXT). Crosstalk is the leakage of signals between pairs. If this is measured near the transmitting end it is termed near-end crosstalk (NEXT). 34. Explain the term far-end crosstalk (FEXT). If measured at the receiving end of the cable it is termed far-end crosstalk (FEXT). 35. Six recommended steps, called best practices, to ensure that cable termination is successful: 1. It is important that the type of cables and components used on a network adhere to the standards required for that network. Modern converged networks carry voice, video and data traffic on the same wires; therefore the cables used on converged networks must be able to support all these applications. 2. Cable standards specify maximum lengths for different types of cables. Always adhere to the length restrictions for the type of cable being installed. 3. UTP, like all copper cable, is susceptible to EMI. It is important to install cable away from sources of interference such as high-voltage cables and fluorescent lighting. Televisions, computer monitors and microwaves are other possible sources of interference. In some environments it may be necessary to install data cables in conduit to protect them from EMI and RFI. 4. Improper termination and the use of low quality cables and connectors can degrade the signal carrying capacity of the cable. Always follow the rules for cable termination and test to verify that the termination has been done properly. 5. Test all cable installations to ensure proper connectivity and operation. 6. Label all cables as they are installed, and record the location of cables in network documentation. Networking for Home and Small Businesses Page 8 of 13

36. Chapter 5 Network Addressing 1. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32 2. The logical 32-bit IP address is hierarchical and is made up of two parts. These two parts are: a. network portion b. host portion 3. Which portion of an IP address identifies a specific host on a network? Host portion 4. If your computer has the IP address of 172.14.35.77 and a default 255.255.0.0 subnet mask, which IP addresses listed below will it be able to communicate with? Check all that apply. X 172.14.35.78 172.16.35.76 192.168.10.15 X 172.14.14.25 172.15.100.10 Networking for Home and Small Businesses Page 9 of 13

5. Draw a line between the PC s and the correct network they can communicate with. 6. Expand on the following address classes. (ie. How their octets are divided, what the default subnet mask is, and where that class of address is commonly used.) a. Class A Class A addresses have only one octet to represent the network portion and three to represent the hosts. The default subnet mask is 8 bits (255.0.0.0). These addresses are typically assigned to large organizations. b. Class B Class B addresses have two octets to represent the network portion and two for the hosts. The default subnet mask is 16 bits (255.255.0.0). These addresses are typically used for medium-sized networks. c. Class C Class C addresses have three octets for the network portion and one for the hosts. The default subnet mask is 24 bits (255.255.255.0). Class C addresses are usually assigned to small networks. 7. What is the first octet range of all five address classes? Class A 1-127 Class B 128-191 Class C 192-223 Class D Class E 224-239 (multicasting) 240-255 (experimental) Networking for Home and Small Businesses Page 10 of 13

8. All hosts that connect directly to the Internet require a unique public IP address. 9. How many private host addresses are available for each class of address? a. Class A allows for over 16 million private addresses. b. Class B allows for over 65,000 addresses. c. Class C allows up to 254 hosts. 10. How many networks are available for each class of private addresses? a. Class A 1 b. Class B 16 c. Class C 256 11. List the private address network ranges for each class of address. a. Class A 10.X.X.X b. Class B 172.16.X.X 172.31.X.X c. Class C 192.168.X.X * APIPA 169.254.X.X 12. What is an advantage of using private addresses? The use of private addresses can provide a measure of security since they are only visible on the local network, and outsiders cannot gain direct access to the private IP addresses. 13. What is the address range 127.0.0.0 used for? There are also private addresses that can be used for the diagnostic testing of devices. This type of private address is known as a loopback address. The class A, 127.0.0.0 network, is reserved for loopback addresses. 14. Where is a unicast packet destined to go? A specific host 15. For a unicast packet to be sent and received, what must be included? A destination IP address must be in the IP packet header. A corresponding destination MAC address must also be present in the Ethernet frame header. The IP address and MAC address combine to deliver data to one specific destination host. 16. List the default broadcast addresses for the following IP addresses. a. 192.168.1.0-192.168.1.255 b. 172.16.0.0-172.16.255.255 c. 10.0.0.0-10.255.255.255 d. 210.25.77.0-210.25.77.255 e. 145.188.0.0-145.188.255.255 Networking for Home and Small Businesses Page 11 of 13

17. What is the MAC address of a multicast address always start with? 01-00-5E 18. Explain in detail how static and dynamic addresses work, and their advantages and disadvantages. Static With a static assignment, the network administrator must manually configure the network information for a host. At a minimum, this includes the host IP address, subnet mask and default gateway. Static assignment of addressing information can provide increased control of network resources. Errors are more likely to occur. Dynamic It is easier to have IP addresses assigned automatically. This is done using a protocol known as Dynamic Host Configuration Protocol (DHCP). DHCP is generally the preferred method of assigning IP addresses to hosts on large networks since it reduces the burden on network support staff and virtually eliminates entry errors. Another benefit of DHCP is that an address is not permanently assigned to a host but is only leased for a period of time. If the host is powered down or taken off the network, the address is returned to the pool for reuse. This is especially helpful with mobile users that come and go on a network. 19. What is the purpose of a DHCP server? The DHCP server assigns an IP address when you boot your computer. 20. How a computer uses a DHCP server to get its IP address? A client that needs an IP address will send a DHCP Discover message which is a broadcast with a destination IP address of 255.255.255.255 (32 ones) and a destination MAC address of FF-FF- FF-FF-FF-FF (48 ones). All hosts on the network will receive this broadcast DHCP frame, but only a DHCP server will reply. The server will respond with a DHCP Offer, suggesting an IP address for the client. The host then sends a DHCP Request to that server asking to use the suggested IP address. The server responds with a DHCP Acknowledgment. 21. What is each interface on a router connected to? a separate network Networking for Home and Small Businesses Page 12 of 13

22. Three methods hosts can be connected to an ISP. a. Direct Connection - Some customers have just a single computer with a direct connection from the ISP through a modem. b. Connection Through an Integrated Router - When there is more than one host that needs access to the Internet, the ISP modem can be attached directly to an integrated router instead of directly to a single computer. This enables the creation of a home or small business network. c. Connection Through a Gateway Device - Gateway devices combine an integrated router and a modem in one unit, and connect directly to the ISP service. As with integrated routers, the gateway device receives a public address from the ISP and internal PCs will receive private addresses from the gateway device. 23. From where does Integrated Router receive public address? The integrated router receives a public address from the ISP, which allows it to send and receive packets on the Internet. It, in turn, provides private addresses to local network clients. Private addresses are not allowed on the Internet. 23. Network Address Translation (NAT): The process used to convert private addresses to Internet-routable addresses is called Network Address Translation (NAT). With NAT, a private (local) source IP address is translated to a public (global) address. The process is reversed for incoming packets. Networking for Home and Small Businesses Page 13 of 13