COC 2 Module
COC 2 Module
SET UP
COMPUTER
NETWORKS
IDENTIFY TYPES OF NETWORK CABLES AND
CONNECTORS
BRIEF
There are three specific types network cables, and the connectors associated
with each, that you must know for this exam: fiber, twisted pair, and coaxial.
Fiber is the most expensive of the three and can run the longest distance. A
number of types of connectors can work with fiber, but three you must know
are SC, ST, and LC.
Coaxial cabling is not as popular as it once was, but it's still used with cable
television and some legacy networks. The two most regularly used connectors
are F-connectors (television cabling) and BNC (10Base2, and so on).
Fiber-optic cabling is the most expensive type of those discussed for this
exam. Although it's an excellent medium, it's often not used because of the
cost of implementing it. It has a glass core within a rubber outer coating and
uses beams of light rather than electrical signals to relay data. Because light
doesn't diminish over distance the way electrical signals do, this cabling can
run for distances measured in kilometers with transmission speeds from 100
Mbps up to 1 Gbps higher.
Often, fiber is used to connect runs to wiring closets where they break out
into UTP or other cabling types, or as other types of backbones. Fiber-optic
cable can use either ST, SC, or LC connector. ST is a barrel-shaped
connector, whereas SC is squared and easier to connect in small spaces. The
LC connector looks similar to SC but adds a flange on the top (much like an
RJ-45 connector) to keep it securely connected.
Note: In addition to these listed in the A + objectives, other connectors are
used with fiber. FC connectors may also be used but are not as common. MT-
RJ is a popular connector for two fibers in a small form factor.
TWISTED PAIR
There are two primary types of twisted-pair cabling (with categories beneath
cach that are shielded twisted pair (STP) and unshielded twisted pair (UTP).
In both cases, the cabling is made up of pairs of wires twisted around each
other.
UTP offers no shielding (hence the name) and is the network cabling type
most prone to outside interference. The interference can be from a fluorescent
light ballast, electrical motor, or other such source (known as electromagnetic
interference [EMI]) or from wires being too close together and signals
jumping across them (known as crosstalk), STP adds a foil shield around the
twisted wires to protect against EMI.
Two wiring standards are commonly used with twisted-pair cabling: T568A
and T568B (sometimes referred to simply as 568A and 568B). These are
telecommunications standards from TIA and EIA that specify the pin
arrangements for the RJ-45 connectors on UTP or STP cables. The number
568 refers to the order in which the wires within the Category 5 cable are
terminated and attached to the connector. The signal is identical for both.
T568A was the first standard, released in 1991. Ten years later, in 2001,
T568B was released. Pin numbers are read left to right, with the connector tab
facing down. Notice that the pin-outs stay the same, and the only difference is
in the color coding of the wiring.
Note: Mixing cables can cause communication problems on the network.
Before installing a network or adding a new component to it, make sure the
cable being used is in the correct wiring standard.
icobus.com/news/news/identify
Here we fill find advanced sharing options, which are configured for each
network profile. A separate network profile is created for each network we
use. For different profiles we can have different sharing options depending on
the network we are connected to.
In our case we are currently connected to our work network, so let’s check
out options in that profile. The first option is “Network discovery”. Network
discovery option enables our computer to discover (to see) other computers
on the network, and other computers will be able to discover our computer.
Work Profile Part 1
The Public folder sharing option enables network users to access our public
folder. Public folders can be read and written to by all users. Even network
users will be able to write files to our public folder. Files shared with public
folder sharing are found in the C:\Users\Public folders. Public folder sharing
is more simple and quicker, but we can’t set permissions for individual users
(all users have access).
Another option is Media streaming. When media streaming is on, people and
devices on the network will be able to access pictures, music and videos on
our computer. Also, our computer will be able to find media resources on the
network. In Media streaming options we will be able to name our media
library, choose on which networks to share, and what type of media to share.
Media Streaming
The Password protected sharing option means that only users which have a
user account and password on our computer can access our shared files and
printers, and Public folders. If we want to give other users access, we’ll have
to turn off this option.
https://www.utilizewindows.com/advanced-sharing-settings-in-windows-7/
Windows Firewall
A firewall, at its most basic level, permits or denies communications between
computers, between networks, or between computers and networks (for
example, your home computer and the Internet) based on the firewall’s
configuration rules. You can access the settings for Windows Firewall
through the Network and Security section in the Control Panel.
Almost all computers and networks communicate by establishing connections
between two hosts using an IP address and a port. Although there are many
types of firewalls, the most common type of firewall (and the type used in
Windows 7, provided by Windows Firewall) permits or denies
communications based on IP address and port information.
Only connections that are explicitly allowed, using firewall rules, are
permitted. Windows Firewall, by default, allows all outbound connections,
and permits only established inbound connections (that is, an inbound
connection that is in direct response to an outbound connection initiated from
your computer or network).
There are firewalls protecting Microsoft’s Web servers and your ISP’s DNS
servers. In order for your computer to connect to Microsoft’s Web servers,
Microsoft must first create firewall rules to allow the communication. This is
accomplished by creating a firewall rule that essentially says to allow any
inbound IP address to connect to 207.46.232.182 (Microsoft’s Web server) on
port 80 (HTTP). Your ISP must create a similar rule on their firewall that
essentially says to allow any inbound IP address to connect to its DNS servers
on port 53 — which is the standard port for DNS.
Windows Firewall permits your outbound DNS request to your ISP’s DNS
server, and your computer’s outbound HTTP request to Microsoft’s Web
server. In your outbound request, your computer first sends the DNS request
to your ISP’s DNS server on port 53, and tells your ISP’s DNS server on
what port it will be listening for a response.
Your computer selects a random port number between 49,152 and 65,535,
and Windows Firewall automatically creates a temporary rule that allows an
inbound connection from the IP address of your ISP’s DNS server to the IP
address of your computer, on that random port number.
After the response is received (or if a response is not received within a
specified period of time, say 30 seconds), the rule is automatically deleted
from the firewall and the connection is again blocked. A similar process is
then repeated to connect to Microsoft’s Web server.
https://www.dummies.com/computers/computer-networking/network-
security/what-are-windows-firewall-and-windows-defender/
COMMAND PROMPT
Command Prompt is a command line interpreter application available in most
Windows operating systems. It's used to execute entered commands. Most of
those commands automate tasks via scripts and batch files, perform advanced
administrative functions, and troubleshoot or solve certain kinds of Windows
issues.
https://www.lifewire.com/command-prompt-
2625840#:~:text=Command%20Prompt%20is%20a%20command,certain%20kinds
%20of%20Windows%20issues.
PING
Ping is a command-line utility, available on virtually any operating system
with network connectivity, that acts as a test to see if a networked device is
reachable.
The ping command sends a request over the network to a specific device. A
successful ping results in a response from the computer that was pinged back
to the originating computer.
What does Ping stand for?
According to the author, the name Ping comes from sonar terminology. In
sonar, a ping is an audible sound wave sent out to find an object. If the sound
hits the object, the sound waves will reflect, or echo, back to the source. The
distance and location of the object can be determined by measuring the time
and direction of the returning sound wave.
Similarly, the ping command sends out an echo request. If it finds the target
system, the remote host sends back an echo reply. The distance (number of
hops) to the remote system can be determined from the reply, as well as the
conditions in-between (packet loss and time to respond). While the author of
the ping utility said the name of the program was simply based on the sound
of sonar, others sometimes say that Ping is an acronym for Packet InterNet
Groper.
IP Address
An IP address (internet protocol address) is a numerical representation that
uniquely identifies a specific interface on the network.
Addresses in IPv4 are 32-bits long. This allows for a maximum of
4,294,967,296 (232) unique addresses. Addresses in IPv6 are 128-bits, which
allows for 3.4 x 1038 (2128) unique addresses.
The total usable address pool of both versions is reduced by various reserved
addresses and other considerations.
IP addresses are binary numbers but are typically expressed in decimal form
(IPv4) or hexadecimal form (IPv6) to make reading and using them easier for
humans.
IP stands for Internet Protocol and describes a set of standards and
requirements for creating and transmitting data packets, or datagrams, across
networks. The Internet Protocol (IP) is part of the Internet layer of the
Internet protocol suite. In the OSI model, IP would be considered part of the
network layer. IP is traditionally used in conjunction with a higher-level
protocol, most notably TCP. The IP standard is governed by RFC 791.
IPv4 addresses are composed of two parts. The first numbers in the address
specify the network, while the latter numbers specify the specific host. A
subnet mask specifies which part of an address is the network part, and which
part addresses the specific host.
A packet with a destination address that is not on the same network as the
source address will be forwarded, or routed, to the appropriate network. Once
on the correct network, the host part of the address determines which
interface the packet gets delivered to.
Subnet masks
A single IP address identifies both a network, and a unique interface on that
network. A subnet mask can also be written in dotted decimal notation and
determines where the network part of an IP address ends, and the host portion
of the address begins.
When expressed in binary, any bit set to one means the corresponding bit in
the IP address is part of the network address. All the bits set to zero mark the
corresponding bits in the IP address as part of the host address.
The bits marking the subnet mask must be consecutive ones. Most subnet
masks start with 255. and continue on until the network mask ends. A Class C
subnet mask would be 255.255.255.0.
Class A
In a Class A network, the first eight bits, or the first dotted decimal, is the
network part of the address, with the remaining part of the address being the
host part of the address. There are 128 possible Class A networks.
0.0.0.0 to 127.0.0.0
However, any address that begins with 127. is considered a loopback address.
Example for a Class A IP address:
2.134.213.2
Class B
In a Class B network, the first 16 bits are the network part of the address. All
Class B networks have their first bit set to 1 and the second bit set to 0. In
dotted decimal notation, that makes 128.0.0.0 to 191.255.0.0 as Class B
networks. There are 16,384 possible Class B networks.
Example for a Class B IP address:
135.58.24.17
Class C
In a Class C network, the first two bits are set to 1, and the third bit is set to 0.
That makes the first 24 bits of the address the network address and the
remainder as the host address. Class C network addresses range from
192.0.0.0 to 223.255.255.0. There are over 2 million possible Class C
networks.
Example for a Class C IP address:
192.168.178.1
Class D
Class D addresses are used for multicasting applications. Unlike the previous
classes, the Class D is not used for "normal" networking operations. Class D
addresses have their first three bits set to “1” and their fourth bit set to “0”.
Class D addresses are 32-bit network addresses, meaning that all the values
within the range of 224.0.0.0 – 239.255.255.255 are used to uniquely identify
multicast groups. There are no host addresses within the Class D address
space, since all the hosts within a group share the group’s IP address for
receiver purposes.
Example for a Class D IP address:
227.21.6.173
Class E
Class E networks are defined by having the first four network address bits as
1. That encompasses addresses from 240.0.0.0 to 255.255.255.255. While this
class is reserved, its usage was never defined. As a result, most network
implementations discard these addresses as illegal or undefined. The
exception is 255.255.255.255, which is used as a broadcast address.
Example for a Class D IP address:
243.164.89.28
https://www.paessler.com/it-explained/ip-address
Default Gateway
The default gateway is used as the destination of all traffic that is not on the
same subnet. The gateway is a layer 3 device such as a router or multi-layer
switch that is used to route traffic on a hop-by-hop basis. But for the purposes
of this discussion, the only thing the end device needs to know is whether the
data is on the same subnet. If it's not, the source device delivers traffic to the
end device through the default gateway.
The default gateway always resides in the same subnet as the end device IP.
The gateway can really be any unique address within the subnet itself, but
most network administrators designate the first number of the subnet as the
gateway. Therefore, 192.168.99.1 would be the default gateway of our source
device given the fact that we have a 255.255.255.0 subnet mask.
https://www.networkcomputing.com/network-security/ip-addresses-subnet-
masks-and-default-gateways/page/0/3
DNS Definition
The domain name system (DNS) connects URLs with their IP address. With
DNS, it’s possible to type words instead of a string of numbers into a
browser, allowing people to search for websites and send emails using
familiar names. When you search for a domain name in a browser, it sends a
query over the internet to match the domain with its corresponding IP. Once
located, it uses the IP to retrieve the website’s content. Most impressively,
this whole process takes just milliseconds.
It might seem like magic when you go online shopping, video chat across
continents, and stream videos or music to your phone, but this is all thanks to
the sophisticated engineering achievement that is the domain name system
(DNS). DNS is a powerful network that keeps billions of internet users and
over 300 million domain names connecting.
The DNS underpins the internet we use every day. This transparent network
runs in the background whenever you send an email, or load a website. DNS
is often likened to the internet’s version of a telephone book. To call
someone, you must first find their telephone number. To do so you look up a
contact name, similary, DNS converts email addresses and websites humans
read into computer-readable, numerical IP addresses.
DNS is a complicated topic with many aspects that affect your day to day life,
especially if you own a website. If you’re a domain owner, listen up, because
theDNS controls different aspects of your domain name. If you simply want
to broaden your knowledge of what’s going on behind the scenes of the world
wide web in general, stay with us.
In this article, we will discuss the ins and outs of the domain name system,
including the basics of how it works, why it exists and how the DNS relates
to your domain name.
3. Once the DNS server finds the domain name Amazon.com, the server
returns the domain name, and it’s IPS address to the requesting DNS
server, along down the line until it arrives back at your computer.
4. Once the IP address has reached your computer, your browser finds it
on the internet. Next up, it communicate with the domain name hosted
to request any associated files. The host server returns the files which
display Amazon.com in your web browser.
https://www.namecheap.com/dns/what-is-dns-domain-name-system-
definition/#:~:text=The%20domain%20name%20system%20(DNS,send%20emails%20using
%20familiar%20names.
DNS in a Nutshell
URLs (such as www.ehow.com) are used online since they are a lot more
memorable than anonymous, phone number-like numerical IP addresses (for
example, something like 52.3.77.115).
But to reach a website, your browser still needs to know the actual IP address
of your destination. And that means that computers need some way of
converting URLs into IPs. To do this, they send requests to their designated
DNS server and ask for the IP address that corresponds to a web link, or vice
versa. The following illustration is from an excellent infographic
that describes the Domain Name System.
This simplified diagram explains how DNS server work
Image Credit: WebHostingGeeks.com
Why doesn't your computer just maintain the DNS list on its own? Well, by
sending these requests to a remote server, local computers don't need to store
large lists of IPs and URLs, which would be hard to keep up-to-date.
Preferred DNS servers act as a device's "first choice" when making DNS
requests. Alternate servers, on the other hand, are only used when the primary
DNS server does not respond. They act as a backup for the DNS system as a
whole.
It's important to note that if a primary server is functioning properly but it
can't convert a particular URL into an address, the device will not contact the
alternate DNS to see if it has better luck. This is because primary and
alternate DNS servers share the same data.
DHCP definition
DHCP stands for dynamic host configuration protocol and is a network
protocol used on IP networks where a DHCP server automatically assigns an
IP address and other information to each host on the network so they can
communicate efficiently with other endpoints.
In addition to the IP address, DHCP also assigns the subnet mask, default
gateway address, domain name server (DNS) address and other pertinent
configuration parameters. Request for comments (RFC) 2131 and 2132 define
DHCP as an Internet Engineering Task Force (IETF)- defined standard based
on the BOOTP protocol.
DHCP simplifies IP address management
The primary reason DHCP is needed is to simplify the management of IP
addresses on networks. No two hosts can have the same IP address, and
configuring them manually will likely lead to errors. Even on small networks
manually assigning IP addresses can be confusing, particularly with mobile
devices that require IP addresses on a non-permanent basis. Also, most users
aren’t technically proficient enough to locate the IP address information on a
computer and assign it. Automating this process makes life easier for users
and the network administrator.
Components of DHCP
DHCP server: A networked device running the DCHP service that holds IP
addresses and related configuration information. This is most typically a
server or a router but could be anything that acts as a host, such as an SD-
WAN appliance.
DHCP client: The endpoint that receives configuration information from a
DHCP server. This can be a computer, mobile device, IoT endpoint or
anything else that requires connectivity to the network. Most are configured
to receive DHCP information by default.
IP address pool: The range of addresses that are available to DHCP clients.
Addresses are typically handed out sequentially from lowest to highest.
Subnet: IP networks can be partitioned into segments known as subnets.
Subnets help keep networks manageable.
Lease: The length of time for which a DHCP client holds the IP address
information. When a lease expires, the client must renew it.
DHCP relay: A router or host that listens for client messages being broadcast
on that network and then forwards them to a configured server. The server
then sends responses back to the relay agent that passes them along to the
client. This can be used to centralize DHCP servers instead of having a server
on each subnet.
Since the client has no way of validating the authenticity of a DHCP server,
rouge ones can be used to provide incorrect network information. This can
cause denial-of-service attacks or man-in-the-middle attacks where a fake
server intercepts data that can be used for malicious purposes. Conversely,
because the DHCP server has no way of authenticating a client, it will hand
out IP address information to any device that makes a request. A threat actor
could configure a client to continually change its credentials and quickly
exhaust all available IP addresses in the scope, preventing company endpoints
from accessing the network.
https://www.networkworld.com/article/3299438/dhcp-defined-and-how-it-
works.html
LAN vs WAN Relating to IP Address
The following information details the difference between LAN vs WAN for
clarification. Review the difference between LAN vs WAN as follows:
If needing to find your LAN IP address, it is fairly easy to do. Search or find
your command prompt within Windows from your Start menu. There are
different versions of Windows but simply under Windows programs or
Windows System folder. With the Command Prompt open simply
type "ipconfig". Under the LAN adapter will have quite a bit about your
connection, but more specifically the label with IPv4 Address would be your
Local Area Network.
To find your WAN IP address, it is also fairly easy to do, but it will require to
log into your router . With that said, open a web browser. Log in to the
router that connects to the Internet by entering its local IP address. The
username and password is required to access your router and can be found in
the router documentation. Find the WAN IP address in the router's
configuration. As stated earlier, it could be called Internet IP or even a
different name, depending on your router type.
Conclusion
Okay, so you know that they are defined area networks. But really what is
the difference.
At this point we won’t get into a MAN (Metropolitan Area Network) for the
time being as that would be another article at a later time. However, it is area
network similar to a LAN and WAN.
https://www.whatismyip.com/lan-vs-wan/
ROUTERS
A router is a physical or virtual appliance that passes information between
two or more packet-switched computer networks. A router inspects a given
data packet's destination Internet Protocol address (IP address), calculates the
best way for it to reach its destination and then forwards it accordingly.
Other network devices, such as wireless access points and switches may
include built-in router functionality.
Other network devices, such as wireless access points and switches may
include built-in router functionality.
Many routers also perform network address translation (NAT), shielding the
private IP addresses of a local area network (LAN) by readdressing all
outgoing traffic with a single shared public IP address. NAT helps both
conserve globally valid IP addresses and improve network security.
Types of routers
Core routers used by Internet Service Providers (ISPs) are the fastest and
most powerful, sitting at the center of the internet and forwarding information
along the main fiber optic backbone. Enterprise routers connect large
organizations' networks to these core routers.
A wireless router works in the same way as the router in a hard-wired home
or business local area network (LAN), but allows greater mobility for
notebook or portable computers. Wireless routers use
the 802.11g specification, a standard that offers transmission over short
distances.
https://searchnetworking.techtarget.com/definition/router
Wi-Fi access points and range extenders can both play key roles in the
delivery of wireless service to the clients on a network. However, they
perform highly different roles, with access points designed to create a
wireless network and range extenders designed to relay an existing
network. Knowing when to use each technology could help you in the
creation and maintenance of your business's Wi-Fi links.
Wi-Fi Transmission
Understanding the difference between access points and range extenders
requires some knowledge of Wi-Fi transmission. Wi-Fi is a computer
networking technology that allows devices to communicate through radio
waves rather than over cables. These waves are broadcasted and received by
Wi-Fi antennae located in networking hardware and wireless-enabled
devices, in much the same way that a radio station broadcasts its signal to
your home or car. Like all radio waves, Wi-Fi signals are subject to
interference, especially if they have to travel a long distance to reach their
destination.
Access Point
An access point can be thought of as the base station for a Wi-Fi signal.
Access points generate the radio waves needed for Wi-Fi transmission, and
manage the connection and disconnection of new clients to the network.
They can be used as standalone devices, but are often combined with other
networking hardware such as modems and switches. For example, many
networks use a wireless combination modem/router to handle both external
Internet communication and internal wireless networking.
Range Extender
Range extenders are a kind of wireless repeater. They do not broadcast a
unique Wi-Fi signal, but instead rebroadcast the signal already created by an
access point. As such, they usually sit in between an access point and a
network's most distant clients, helping to extend the usable range of that
network. However, using range extenders can have a performance impact on
a network, with increased latency (signal travel time) and reduced signal
strength. This phenomenon is especially prevalent if several wireless
extenders are used in a chain.
Uses
Range extenders are generally used to gain a small increase in the reach of a
network. They work best with clients which do not require a strong signal to
function, and which are not used for time-sensitive applications such as
gaming or streaming. For high-performance networks, it is usually better to
extend the range of the network through the use of multiple access points
rather than range extenders. This option is often more expensive, but makes
for a more even and strong coverage across the network's outer regions.
https://yourbusiness.azcentral.com/difference-between-wifi-access-point-
range-extender-24134.html