Network Module Print
Network Module Print
Network Components
Networks are built from media, appliances, and protocols but they exist to provide services and
resources to users. (Image by Svetlana Kurochkina © 123rf.com.)
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 330
Networks in different geographic locations but with shared links are called Networking Concepts
Wide Area Networks (WAN). A WAN is more likely to make use of a service
provider network. Companies that operate national telephone networks are
called telecommunications companies or telcos. Companies that specialize
in providing Internet access are called Internet Service Providers (ISP).
Telcos operate as ISPs themselves but also make parts of their networks
available to smaller ISPs.
Network Media
A network is made by creating communications pathways between the devices
on the network. Network endpoints can be referred to as nodes or hosts.
Communications pathways are implemented using an adapter installed in the
host to transmit and receive signals and network media between the interfaces
to carry the signals. There are two main types of local network connections:
■ Wired data connections use cabling and either electrical signals over
copper wire or light signals over fiber optic to connect nodes. Most local
networks use a wired network standard called Ethernet to implement these
links.
Wide area networks can also use copper or fiber optic cabling and various
types of wireless networking, including point-to-point radio, cellular radio, and
satellite communications.
Networks use multiple protocols. The packet from one protocol can
be wrapped within the packet from another (encapsulation).
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 331
Module 4 / Unit 1
TCP/IP
Packet Transmission
The original research underpinning TCP/IP was performed in the late 1960s
and early 1970s by the Advanced Research Projects Agency (ARPA), which
is the research arm of the US Department of Defense (DoD). The DoD
wanted to build a network to connect a number of military sites. The prototype
was a research network called ARPANET, first operational in 1972. This
connected four university sites using a system described as a packet
switching network.
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Packet switching internetwork. Image © 123rf.com.
Page 332
The figure above shows an example of an internetworking system. A packet Networking Concepts
being sent from Network A to Network D may be sent via Network C (the
quickest route). If this route becomes unavailable, the packet is routed using
an alternate route (for example, A-F-E-D).
As well as the forwarding function and use of multiple paths, data is divided
into small chunks or packets. Using numerous, small packets means that if
some are lost or damaged during transmission, it is easier to resend just the
small, lost packets than having to re-transmit the entire message.
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 333
Module 4 / Unit 1 The four layers are as follows:
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 334
Internet Protocol Networking Concepts
The Internet Protocol (IP) is the primary protocol responsible for the
forwarding function we defined above. It provides packet delivery for all higher-
level protocols within the suite. It provides best effort delivery between hosts
on a local network or within an internetwork of an unreliable and
connectionless nature.
IP Packet Structure
At the IP layer, any information received from the transport layer is wrapped in
a datagram. The transport layer datagram is the payload and IP adds a
number of fields in a header to describe the payload and how to deliver it:
Field Explanation
Source IP address Identifies the sender of the datagram by IP
address.
Destination IP Identifies the destination of the datagram
address by IP address.
Protocol Indicates whether the data should be
passed to UDP or TCP at the destination
host.
Checksum Verifies the packet's integrity upon arrival
at the destination.
Time to Live The number of seconds a datagram is
allowed to stay on the network before
being discarded, otherwise packets could
endlessly loop around an internet. A router
will decrease the TTL by at least one
second when it handles the packet, and is
required to decrement the TTL by at least
the time spent in the router.
Once the fields have been added, the IP datagrams are packaged into a
suitable frame format and delivered over the local network segment.
IP Addresses
As you can see from the fields in the datagram, an IP address is used to
logically identify each device (host) on a given network. An IP address is a 32-
bit binary value. To make this value easier to enter in configuration dialogs, it is
expressed as four decimal numbers separated by periods: 172.30.15.12 for
instance. Each number represents a byte value, that is, an eight-character
binary value, also called an octet, or a decimal value between 0 and 255. This
is referred to as dotted decimal notation.
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 335
Module 4 / Unit 1 Recall that you can convert between binary and decimal by setting out the
place value of each binary digit. For example, you can convert 172 as follows:
128 64 32 16 8 4 2 1
1 0 1 0 1 1 0 0
128*1 64*0 32*1 16*0 8*1 4*1 2*0 1*0
128 + 0 + 32 + 0 + 8 + 4 + 0 + 0
= 172
Refer back to Unit 2.1 for the topic on binary and decimal notation.
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 336
Packet Delivery and Forwarding Networking Concepts
The Internet Protocol (IP) covers addressing and forwarding at a "logical" level
between networks with distinct IDs (network layer). Actual delivery of
information takes place at the lower physical/data link layer. The IP datagram
is put into a frame. Frames can only be delivered over a local network
segment.
MAC Addresses
Frames use a different addressing method than IP. At the data link layer, each
host is identified by the address of its network interface. This is called a
hardware address or a Media Access Control (MAC) address. The MAC
address is assigned to the network adapter at the factory. It is a 48-bit value
expressed in hex notation. It is often displayed as six groups of two
hexadecimal digits with colon or hyphen separators or no separators at all (for
example, 00:60:8c:12:3a:bc or 00608c123abc) or as three groups of
four hex digits with period separators (0060.8c12.3abc).
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 337
Module 4 / Unit 1 Routing
If the destination IP address is a local one (with the same network ID as the
source), the host uses ARP messaging to discover the local destination host. If
the network IDs are different, the sending host uses ARP messaging to
discover a router on the local segment (its default gateway) and uses that to
forward the packet. The router forwards the packet to its destination (if known),
possibly via intermediate routers.
As we have seen, network addressing uses 48-bit MAC values at the data link
layer and 32-bit IP addresses at the network layer. Computers can process
these numbers easily, but they are very difficult for people to remember or type
correctly.
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 338
The namespace is structured like an inverted tree, starting at the root, and Networking Concepts
working down. Below the root are a set of Top Level Domains (TLD) that define
broad classes of entities (.com versus .gov, for instance) or national
authorities (.uk versus .ca, for instance). Within the TLDs, entities such as
companies, academic institutions, non-profits, governments, or even
individuals can all register individual domains. An organization may also create
sub-domains to represent different parts of a business. Domains and sub-
domains contain resource records. These records contain the host name to IP
address mapping information used to resolve queries.
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 339
Module 4 / Unit 1 1) The resolver (client) sends a recursive DNS query to its local DNS server
asking for the IP address of www.comptia.org. The local name server
checks its DNS data corresponding to the requested domain name.
3) The root name server has authority for the root domain and will reply with
the IP address of a name server for the .org top level domain.
An iterative query means that the local name server does not
expect the .com name server to return a record and that it will
accept a referral to another name server. Name servers that are
authoritative for domains will only typically respond to iterative
queries.
6) The local name server now queries the comptia.org name server for the IP
address of www.comptia.org.
Note how each query brings the local name server closer to the IP address of
www.comptia.org.
The URL (or web address) contains the information necessary to identify and
(in most cases) access an item.
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 340
Networking Concepts
3) File path—specifies the directory and file name location of the resource, if
required. Each directory is delimited by a forward slash. The file path may
or may not be case-sensitive, depending on how the server is configured. If
no file path is used, the server will return the default (home) page for the
website.
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 341
Module 4 / Unit 1 HTTP is usually used to serve HTML web pages, which are plain text files with
coded tags (HyperText Markup Language) describing how the page should
be formatted. A web browser can interpret the tags and display the text and
other resources associated with the page, such as picture or sound files.
Another powerful feature is its ability to provide hyperlinks to other related
documents. HTTP also features forms mechanisms (GET and POST) whereby
a user can submit data from the client to the server.
SSL/TLS
One of the critical problems for the provision of early e-commerce sites was the
lack of security in HTTP. Under HTTP, all data is sent unencrypted and there is
no authentication of client or server. Secure Sockets Layer (SSL) was
developed by Netscape and released as version 3.0 in 1996 to address these
problems. SSL proved very popular with the industry and is still in widespread
use. Transport Layer Security (TLS) was developed from SSL and ratified as
a standard by IETF. TLS is now the version in active development, with 1.2 as
the latest version.
Use the padlock icon displayed next to a secure web address to verify the identity of the certificate
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041
holder.· JUL 22 2021
Page 342
Electronic Mail (Email) Networking Concepts
Email is a messaging system that can be used to transmit text messages and
binary file attachments encoded using Multipurpose Internet Mail
Extensions (MIME). Email can involve the use of multiple protocols. The
following process illustrates how an email message is sent from a typical
corporate mail gateway, using the Microsoft Exchange mail server, to a
recipient with dial-up Internet access:
2) When the Exchange SMTP server starts to process the queue, it first
contacts a DNS server to resolve the recipient's address (for example,
[email protected]) to an IP address for the
othercompany.com email server, listed as an MX (Mail Exchanger)
record in DNS.
3) It then uses SMTP to deliver the message to this email server. The delivery
usually requires several "hops," from the mail gateway to the sender's
Internet Service Provider (ISP), then to the recipient's ISP. The hops taken
by a message as it is delivered over the Internet are recorded in the
message header.
Viewing SMTP Internet headers for a mail message. Screenshot used with permission from
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Microsoft.
Page 343
Module 4 / Unit 1 4) The message is put in the message store on the recipient's mail server. To
retrieve it, the recipient uses his or her mail client software to connect with
the mailbox on the server, using the Post Office Protocol v3 (POP3) or
Internet Message Access Protocol (IMAP).
When using POP3, the messages are usually deleted from the server when
they are downloaded, though some clients have the option to leave them on
the server. IMAP supports permanent connections to a server and connecting
multiple clients to the same mailbox simultaneously. It also allows a client to
manage the mailbox on the server, to organize messages in folders and
control when they are deleted for instance, and to create multiple mailboxes.
Configuring Email
To configure an email account, you need the user name, password, and
default email address, plus incoming and outgoing server addresses and
protocol types from the ISP.
Configuring an email account—the incoming server is either POP3 or IMAP while the outgoing
server is SMTP. Screenshot used with permission from Microsoft.
Different mail systems have different requirements for allowed and disallowed
characters in the local part. The local part is supposed to be case-sensitive,
but most mail systems do not treat it as such. An incorrectly addressed email
will be returned with a message notifying that it was undeliverable. Mail may
also be
LICENSED FOR USE ONLY rejected
BY: OMEASH if it is identified
HENRY as spam ·orJUL
· 16157041 if there is some other problem with
22 2021
the user mailbox, such as the mailbox being full.
Page 344
Networking Concepts
1) What is a WAN?
10) Which email protocol(s) are used to download messages from a mail
server?
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 345
Module 4 / Unit 2
Module 4 / Unit 2
Connecting to a Network
Objectives
On completion of this unit, you will be able to:
□ Identify the roles of different network devices in providing local and Internet
network connectivity.
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 346
Internet Service Types Connecting to a Network
The sort of equipment and networks used at home and in small businesses are
often described as SOHO (Small Office Home Office). A SOHO network is
typically based around a single multifunction device. This type of network
device can perform the following sort of functions:
Typical SOHO Internet router/modems—the antennas visible on the one on the left show that it
can also function as a wireless access point. (Image © 123rf.com.)
There are various ways in which the WAN link can be provisioned.
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 347
Module 4 / Unit 2 Digital Subscriber Line (DSL)
Digital Subscriber Line (DSL) is one of the most popular SOHO Internet
service types. DSL works over an ordinary telephone line, providing the line is
of sufficient quality. The DSL modem/router is connected to the telephone line
using a cable with RJ-11 connectors between the WAN port on the router and
the telephone point. Data is transferred over the line using the high frequency
ranges that voice calls don't need to use. The telephone point is fitted with a
microfilter to prevent the data signals interfering with voice calls and vice versa.
Most residential DSL services are asymmetric (ADSL), meaning that the uplink
(up to about 1.4 Mbps) is slower than the downlink (up to about 24 Mbps). The
speeds achievable are heavily depending on the quality of the telephone wiring
and the distance to the local telephone exchange. The maximum supported
distance is about three miles.
Fiber Optic
Faster Internet services can be provisioned using fiber optic networks. Fiber
optic cables perform much better over long distances and are not affected by
noise in the way that electrical signals over copper cable are. Unfortunately,
providing a fiber cable all the way to customer premises, referred to as Fiber
to the Home (FTTH), requires substantial investment by the telecom providers
and is not widely available.
Cable
Where FTTC is offered by providers with origins in the telephone network, a
cable Internet connection is usually provided as part of a Cable Access TV
(CATV) service. These networks are often described as Hybrid Fiber Coax
(HFC) as they combine a fiber optic core network with coax links to customer
premises equipment. Coax is another type of copper cable but manufactured in
a different way to twisted pair.
Network status icons showing (left-to-right) a working connection, a disconnected cable, and a
connection with unknown or incomplete address information. Screenshot used with permission
from Microsoft.
You can test an Internet connection quite simply by trying to browse a website.
While a cabled Internet service will usually offer the best bandwidth, they are
not always available. Wireless services can be used in areas where it is too
difficult or expensive to lay cable.
Microwave Satellite
Satellite systems provide far bigger areas of coverage than can be achieved
using other technologies. The microwave dishes are aligned to orbital satellites
that can either relay signals between sites directly or via another satellite. The
widespread use of satellite television receivers allows for domestic Internet
connectivity services over satellite connections. Satellite services for business
are also expanding, especially in rural areas where DSL or cable services are
less likely to be available.
Cellular Radio
Cellular data connections use radio transmissions but at greater range than
Wi-Fi. Cellular data is more closely associated with Internet access for cell
phones and smartphones than with computers.
That said, a cell phone can share its Internet connection with a
computer (tethering), if the computer has no other means of
Internet access.
There are many different cellular Internet service types, marketed in terms of
"generations" (3G, 4G, and 5G). Support for a particular type is dependent on
the local cell tower. Some of the technologies used include:
■ CDMA2000/Evolution
LICENSED FOR USE ONLY BY: OMEASH HENRYData Optimized
· 16157041 (EV-DO)
· JUL are the main 3G
22 2021
standards deployed by CDMA network providers. EV-DO can support a 3.1
Page 350 Mbps downlink and 1.8 Mbps uplink.
■ Long Term Evolution (LTE) is a converged 4G standard supported by Connecting to a Network
both the GSM and CDMA network providers. LTE has a maximum
downlink of 150 Mbps in theory, but no provider networks can deliver that
sort of speed at the time of writing, with around 20 Mbps far more typical of
the speed that might actually be obtained.
Radio Frequency
As noted above, Radio Frequency (RF) is a means of provisioning a wireless
local network using Wi-Fi standard equipment. While this isn't a means of
Internet service provision in itself, it is a means for a client to connect to a
wireless router offering Internet access.
As well as the wireless router in your home network, you could use an open or
public access point to get on the Internet. You have to be careful to secure
the connections you open when doing this and to avoid using public access
points that have been set up for malicious purposes.
Page 351
Module 4 / Unit 2 The 802.11n standard can use either frequency band and deliver much
improved data rates (nominally up to 600 Mbps). The latest 802.11ac standard
is now widely supported. 802.11ac access points can deliver up to 1.7 Gbps
throughput at the time of writing. 802.11ac works only in the 5 GHz range with
the 2.4 GHz band reserved for legacy standards support (802.11b/g/n).
Most SOHO routers support 802.11g/n or 802.11g/n/ac. This means that you
can have a mix of client devices. For example, you might have a new router
that supports 802.11ac but computers and tablets with wireless adapters that
only support 802.11n. You can use the access point in compatibility mode to
allow these devices to connect.
Look at the SOHO router's setup guide to find out the router's IP address.
Open a web browser and type the router's IP address into the address bar.
This should open a management page for you to log on. Enter the user name
and password listed in the router's setup guide. Most routers will invite you to
complete the configuration using a wizard, which guides you through the
process.
Use the System page to choose a new admin password. The admin password
is used to configure the router. It is vital that this password be kept secret and
secure. You must choose a strong password that cannot be cracked by
password-guessing software. Use a long, memorable phrase of at least 12
characters.
■ SSID (Service Set ID)—a name for the WLAN. This is usually set by default
to the router vendor's name. It is a good idea to change the SSID from the
default to something unique to your network. Remember that the SSID is
easily visible to other wireless devices, so do not use one that identifies
you personally or your address. The SSID can be up to 32 characters.
See Unit 5.3 for more information about ciphers and encryption.
On a SOHO network, you would also generate a Pre-Shared Key (PSK) using
a wireless password. When you type a password into the box, the router
converts it into an encryption key to use with the cipher. You can see the key in
the screenshot above expressed as hex numerals. The same wireless
password must be entered on client devices for them to connect to the WLAN.
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 354
Configuring a Wireless Client Connecting to a Network
status icon in the notification area . Select the network name and then click
Connect. If you leave Connect automatically selected, Windows will save the
password and always try to connect to this SSID when it is in range. In the next
panel, enter the wireless password (PSK):
Connecting to a network and entering the network security key (password). Screenshot used with
permission from Microsoft.
When you connect to a new network, you are prompted to set its location. If
the link is configured as Public (selecting No in Windows 10), your computer is
hidden from other computers on the same network and file sharing is disabled.
If it is configured as Private (home or work) by selecting Yes, the computer is
discoverable and file sharing is enabled.
LICENSED The
FORcomputer
USE ONLY BY: OMEASH
should HENRY
now be part of the· SOHO
16157041 · JULand
network 22 able
2021to connect to
the Internet. To verify, test that you can open a website in the browser.
Page 355
Module 4 / Unit 2 Speed Limitations (Attenuation and Interference)
A device supporting the Wi-Fi standard should have a maximum indoor range
of up to about 30m (100 feet), though the weaker the signal, the lower the data
transfer rate. The distance between the wireless client (station) and access
point determines the attenuation (or loss of strength) of the signal. Each
station determines an appropriate data rate based on the quality of the signal
using a mechanism called Dynamic Rate Switching/Selection (DRS). If the
signal is strong, the station will select the highest available data rate,
determined by the 802.11 standard. If the signal is weak, the station will reduce
the data rate to try to preserve a more stable connection.
Radio signals pass through solid objects, such as ordinary brick or drywall
walls but can be weakened or blocked by particularly dense or thick material
and metal. Other radio-based devices and nearby Wi-Fi networks can also
cause interference. Other sources of interference include devices as various
as fluorescent lighting, microwave ovens, cordless phones, and (in an
industrial environment) power motors and heavy machinery. Bluetooth uses
the 2.4 GHz frequency range but a different modulation technique, so
interference is possible but not common.
An enterprise network uses the same sort of switch, access point, and router
technologies as a SOHO network. In a SOHO network, these technologies are
likely to be combined within a single multifunction appliance. On an enterprise
network, multiple switch, access point, and router appliances will be used.
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Modular wall plate with an RJ-45 patch cord connected. Image by Nikolai Lebedev © 123rf.com.
Page 356
The cabling from each port is routed back to a telecommunications room where Connecting to a Network
it is connected to an Ethernet switch. While the switch in a SOHO Internet
router usually provides four ports, a single enterprise switch will support 20
ports or more. Modular enterprise switches can support hundreds of ports.
Furthermore, the switches can be interconnected to create a switched fabric
supporting thousands of ports within the same LAN.
Cisco Catalyst 3650 Series workgroup switch. Image © and Courtesy of Cisco Systems, Inc.
Unauthorized use not permitted.
Cisco Aironet access point. Image © and Courtesy of Cisco Systems, Inc. Unauthorized use not
permitted.
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 357
Module 4 / Unit 2 Enterprise Network Routers
While the switches and access points can provide thousands of ports and
network connections, it is inefficient to have that many connections to the
same "logical" network. The ports are divided into groups using a technology
called Virtual LAN (VLAN) and each VLAN is associated with a different
subnet. Communications between different VLANs have to go through a router.
Cisco 1000 Series Advanced Services Router. Image © and Courtesy of Cisco Systems, Inc.
Unauthorized use not permitted
The graphic below illustrates how the network components described above
might be positioned. The whole network is connected to the wider Internet via
a router. The router is also used to divide the network into two subnets (A and
B). Within each subnet, a switch is used to allow nodes to communicate with
one another and, through the router, to the other subnet and the Internet. The
link between each node and the switch is a segment.
High bandwidth backbone segments are used between the router and the
Internet and between the router and the two switches.
4) What is the latest Wi-Fi standard and which frequency band(s) does it use?
6) What is the risk of using a free Wi-Fi network to make an order from an
online shop?
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 359
Module 4 / Unit 2
2) If you have a wired connection to the router, make the following checks:
○ The computer is connected to the router via a cable connecting the RJ-
45 ports on the two devices.
○ If you open the web browser then you can view a website such as
www.comptia.org.
3) If you have a wireless connection to the router, make the following checks:
○ If the icon shows that connections are available , click it, select your
wireless network name (SSID) and click Connect, then input the
passkey.
○ If you open the web browser then you can view a website such as
www.comptia.org.
4) Right-click the network status icon and select Open Network & Internet
Settings.
From here, you can configure Wi-Fi or Ethernet (as appropriate) settings,
LICENSED FOR USE ONLY BY:
and OMEASH
also HENRY
create and · 16157041
configure Dial-up·and
JUL VPN
22 2021
connections. You can also
configure your computer as a mobile hotspot.
Page 360
Connecting to a Network
Network & Internet Settings. Screenshot used with permission from Microsoft.
5) Click the WiFi or Ethernet tab (depending on whether your computer has a
wireless or wired connection).
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
WiFi tab. Screenshot used with permission from Microsoft.
Page 361
Module 4 / Unit 2
Network and Sharing Center. Screenshot used with permission from Microsoft.
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 362
7) Under "view your active networks," click the Ethernet link or the SSID Connecting to a Network
(depending on whether your link is wired or wireless). This displays a
Status dialog showing the protocol used by the connection and the link
speed
8) Click the Details button. This shows the configuration of the link, including
the Internet Protocol (IP) address (192.168.1.127 in the example below)
and the IP address of the default gateway—your Internet router
(192.168.1.254).
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 363
Module 4 / Unit 2
Network Connection Details dialog. Screenshot used with permission from Microsoft.
____________________________________________________________
11) Open the web browser then type the IP address of your default gateway
into the address bar.
This should load the configuration page for your Internet router. You could
log on here using the administrative credentials supplied with your router to
change settings or investigate problems.
12) Optionally, shut down your computer if you are not continuing to use it after
this lab.
LICENSED FOR USE ONLY BY: OMEASH HENRY · 16157041 · JUL 22 2021
Page 364
DNS is a client/server-based distributed database system that resolves FQDNs to IP addresses. It operates hierarchically, starting at the root, proceeding to the Top Level Domains, and down to the specific domain. DNS queries are performed in stages until the resolver gets the IP address associated with the FQDN .
DRS optimizes Wi-Fi performance by adjusting the data rate based on signal quality. If the signal is strong, it selects a higher data rate. Conversely, with a weak signal, it reduces the data rate to maintain a stable connection, as determined by the 802.11 standard .
ARP maps the IP address of the destination host to its hardware address (MAC address). Hosts broadcast ARP messages on the local network to discover which MAC address corresponds to a particular IP address. When a destination host responds, the frame can be delivered, and these IP:MAC mappings are cached to reduce the number of ARP messages .
The TTL field in an IP packet specifies the lifetime for the packet on the network in seconds. Routers decrement the TTL by at least one second with each hop; when the TTL reaches zero, the packet is discarded. This prevents packets from looping indefinitely in the network .
Verify the connection status via the network icon, ensure correct cable connections, and check the router's LED indicators. For wireless, confirm the network name and apply the correct passkey. Check IP configurations if there are issues, and attempt to browse the web to verify connectivity .
UDP is advantageous because it involves less overhead in processing and transmitting each packet, which makes it faster than TCP . However, it is unreliable as there is no guarantee that packets will arrive in the correct sequence, and any issues arising from this must be dealt with at the application layer .
When the destination network IDs differ, the router, acting as a gateway, uses ARP to discover routes beyond the local segment and forwards packets, potentially via intermediate routers, until reaching the final network destination. This process ensures that packets navigate correctly through various network segments .
A URL consists of a protocol (defining the service type), a host location (usually represented by an FQDN resolved to an IP address using DNS), and a file path (specifying the directory and file name of the requested resource). These components together specify how and where to access the resource .
FTTC uses a fiber network to a street cabinet and VDSL for connections, offering downlink speeds up to 52 Mbps . Cable Internet combines fiber optics and coaxial cable, typically offering speeds around 100 Mbps with DOCSIS 3.0 . DSL and HFC are other technologies providing varying speeds based on infrastructure and service region. Each technology caters to different geographic and infrastructural contexts .
Signal interference can degrade wireless network performance, causing slower data rates and connection instability. Typical sources include other Wi-Fi networks, Bluetooth devices, microwave ovens, cordless phones, and industrial machinery. Dense materials also weaken signals as they obstruct signal paths .