1. Trang chủ
  2. » Công Nghệ Thông Tin

CompTIA Network+ Certification Study Guide part 14 ppt

10 289 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 10
Dung lượng 175,61 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Network Interface Cards Network interface cards, also referred to as network adapter cards or sim-ply network cards, are the key components that allow computers or other devices to commu

Trang 1

In addition to speed, ISDN supports multiple devices set up in one link

In an analog system, a single line is required for each device attached For example, a separate phone line is needed for a normal phone, a fax machine,

or a computer modem Because ISDN supports multiple devices, you can use each one of these items on a single line It will also be clearer due to the fact that the data is being passed in a digital format

Because ISDN uses a separate channel, the D channel for signaling, it removes the administrative overhead required This means that the data

is not hindered by the session setups and the communications required

by the devices The D channel keeps all of this information off the data streams Because of the separation, the setup and takedown of each session

is much faster In addition, ISDN equipment is able to handle calls more intelligently

CSU/DSU

The somewhat lengthy acronym CSU/DSU is short for Channel Service Unit/Data Service Unit A CSU/DSU is a device that takes a signal from a

digital medium and multiplexes it Although a CSU and a DSU can be sepa-rate components, they are generally packaged as a single unit The CSU is used to connect a terminal to a digital line, while a DSU performs diagnostic and protective functions

A CSU/DSU terminates the end of a leased T-carrier line, which is a high-speed line that can be used to connect a LAN to a wide area network (WAN) The CSU/DSU is similar to a modem in that it connects to the media that will carry the data, but because the T-carrier transmits the data digitally, there is no need for device to modulate and demodulate between digital and analog formats The CSU/DSU can be a separate component that attaches to a router and provides an interface between the routers, but many newer routers have more modular capabilities that allow you to purchase what are sometimes referred to as WAN interface cards, or WICs for short This is a card that incorporates the CSU/DSU into the actual port and cable connection so you do not have an external CSU; it’s built directly into the router itself, thereby easing maintenance and management

A T-carrier line is a leased telephone line that runs over fiber-optic cabling and can provide different speeds depending on the level used A T1 line con-sists of 24 separate channels called DS0s that are 64 Kbps each In total, this equals 1.544 Mbps for a full T1 line Because some companies may not need this amount of bandwidth, it is possible to lease only a portion of the channels For example, if you rented two channels on a T1 line, you would have a 128 Kbps connection When only a portion of the T1 line is used, it

is referred to as fractional T1 If more than 1.544 Mbps of bandwidth was

Trang 2

needed, a company could also lease another level of a T-carrier line called a

T3 line, which provides speeds of 44.736 Mbps

Network Interface Cards

Network interface cards, also referred to as network adapter cards or

sim-ply network cards, are the key components that allow computers or other

devices to communicate with the rest of the network Installed on

work-stations, servers, printers, and other network devices, it provides an

inter-face to the network that allows data to be transmitted and received across

the network media

Simply put, the NIC performs the following functions:

It translates data from the parallel data bus to a serial bit stream for

transmission across the network

It formats packets of data in accordance with protocol

It transmits and receives data based on the hardware address of the

card

An NIC works as an interface between a computer’s expansion bus and

the medium that’s used to transmit and receive data across the network In

many cases, this means that it attaches to the cable used on a network, but

wireless NICs are also available that allow data to be transferred through the

air Although the NIC can be integrated into the system board, it is typically

NoTES FroM ThE FIEld…

Multiplexing defined

Multiplexing is defined as the sending of multiple

sig-nals over one communications channel at the same

time The cable television system is a perfect example

of multiplexing in action Cable TV is a simple

technol-ogy where your available channels are all sent along

a single cable, and you are able to select a channel

to view a specific program based on your numbered

selection In the world of data transmission, the

tech-nology is very much the same If you have a T1, for

example, and you need to break that 1.544 Mbps of

bandwidth down to smaller amount, you can do so with

a fractional T1.

What about the rest of that bandwidth, is it wasted?

Of course not, not with multiplexing As a service provider, you can designate half of the bandwidth to company A and then the rest to company B Data is sent along the whole T1, and no bandwidth is wasted The technology of multi-plexing is used in many ways to conserve bandwidth.

There are two different types of multiplexing: time division multiplexing (TDM) and frequency division multiplexing (FDM) In TDM, each signal is broken up into many segments, each having short durations or time slots on the whole of the available bandwidth FDM does the same thing as TDM except that TDM is based

on digital signaling and FDM is based on analog.

Trang 3

an add-on component for a computer, much like a video card or sound card The NIC is normally installed as an expansion board by plugging it into a bus slot, and it has a connector that allows the network media to be attached to it

Installing an NIC

Installing an NIC is like installing any other interface card in a computer You have to determine the slot it will go in and have the right tools to remove the expansion slot cover and to remove and insert screws Newer computers do not require any tools, not even screwdrivers The ability to work on a com-puter with your hands free of tools is making any technician’s job easier The Network exam will challenge you to know what to do in certain situations

In this section you will learn several troubleshooting techniques and how to recognize the common issues that you will face with network interface cards NICs are built for computer bus types such as Industry Standard Architec-ture (ISA), Extended Industry Standard ArchitecArchitec-ture (EISA), Micro Channel Architecture (MCA), and Peripheral Component Interconnect (PCI) Most of the newer NICs support plug and play features and can be automatically con-figured by the operating system once the physical installation is done This fea-ture makes installation of the NIC considerably easier than with older cards Before you begin the physical installation of the NIC, or network adapter,

be sure to address the following issues:

Ensure that the adapter is compatible with the data bus, the protocol,

the media, and the network operating system In the case of Win-dows network operating systems, the hardware compatibility list (HCL) lists adapters that have been verified for use with a particular operating system (such as NT, 2000, 2003, 2008, Vista, and XP) Ensure that there is an open bus slot on the machine in which you

want to install the adapter

Ensure that the adapter includes all items necessary for

installa-■

tion, including external transceivers or adapters, a T-connector for a thinwire Ethernet adapter, and product documentation

Ensure that the software, including the network driver and utilities

for testing and configuring the adapter, is included If a software driver is not provided, a driver may be included with operating system installation media If not, drivers and driver updates may

be available for download from the adapter manufacturer via the Internet or a bulletin board service

Remember that the NIC cannot do any useful work until high-level

protocols and network services have also been installed and configured

Trang 4

ExErcisE 3.1 Enabling and Disabling a Nic card with Windows xP

Professional

In this exercise we will learn how to enable or disable an NIC card for

secu-rity reasons If you are not using an interface, disable it Make sure that you

do not disable interfaces that you may need

To enable or disable an interface, you need to first open the Network

Connections dialog box To do this, double click My Network Places on

your desktop Click View Network Connections, and you will see your

cur-rent connections (Figure 3.4)

FIGurE 3.4

Viewing Your Network Connections.

Trang 5

FIGurE 3.5

Enabling a Connection

with Windows XP

Professional.

Note that in Figure 3.4, LAN has an x This indicates that the connec-tion might have an issue, such as a disconnected RJ-45 connector on the NIC itself LAN2 is grayed out, indicating that the connection is disabled To

enable it, you only need to right click the connection and select Enable from

the shortcut menu (Figure 3.5) The NIC will enable itself barring any other issues, and the icon in the Network Connections window will be shown in full color

NIC Types and Operation

Although NICs are all designed to allow computers and devices to access a network, not all NICs are the same As we discussed in Chapter 2, there are many different types of media and connectors that may be used on a net-work, which is why there are different NICs Because of this, NICs are often defined by the following criteria:

The type of Data Link Protocol they support, such as an Ethernet or

Token Ring The type of media they connect to

The data bus for which they were designed

In using NIC, the computer must have a software driver installed to interact with the NIC, just as it must for any other peripheral device These drivers enable the operating system and higher level protocols to control the functions of the adapter

The NICs that exist in the various workstations on a network commu-nicate with each other using their own unique addresses The MAC address,

or hardware address, is a 12-digit number consisting of digits 0–9 and letters

Trang 6

A–F It is a hexadecimal (base16) number assigned to the card by the

manu-facturer The MAC address consists of two pieces: the first signifies which

vendor it comes from, the second is the serial number unique to that

manu-facturer This address must be unique on each network card on a network

You may wonder how a manufacturer can ensure uniqueness among all the

network cards in the world No doubt there are network cards that have

the same address, but each manufacturer is assigned a range by the various

network standards organizations, and they use only that range Within the

range, a manufacturer may have duplicates, but the duplicates are so spread

out over time that it is almost impossible for a network, small or large, to

have two devices with the same MAC address

Transceivers

As we discussed in Chapter 2, the term transceiver is short for transmitter-

receiver, and it is a component of an NIC that transmits and receives

electrical signals across the transmission media Transceivers are also

the part of the interface that actually connects to the media Although

transceivers can be external to the network card, they are typically built

onto the NIC A transceiver that’s built onto a card is called an onboard

transceiver.

Although NICs are generally designed to connect to a particular type

of media, they can also connect to multiple media types A transceiver

type setting is required for network adapters that are capable of

attach-ing to more than one media type Typical cards of this nature include

Ethernet cards that have both twisted-pair and coaxial connectors This

is one of the more common oversights in configuring a NIC and the card

can be rendered nonfunctional if it is configured for the wrong media

con-nection To alleviate this problem, some cards of this type have an auto

setting that causes the card to search for the transceiver that has media

connected to it

Exam warning

NICs are the most common interface for a computer or device to connect to media on

the network They operate at the data link layer of the OSI model.

Exam warning

Transceivers and media converters are similar in some aspects but are not identical

Media converters (primarily used with fiber cabling solutions) are used to allow for

connection of different (or dissimilar) connection types or interfaces.

Trang 7

Media Converters

Media converters are used when you have two types of dissimilar media that need to be converged together Most commonly used when deploying fiber-based networks, media converters come in handy when you need to connect

up to multiple different connection types, fiber switches, and storage arrays These are primarily used and seen on storage area networks (SAN)

Modern Network devices

Although many of the devices we’ve discussed so far have been used since the early days of networking, a number of devices either have taken over the roles of these devices or are a predominant part of a modern network envi-ronment These devices are crucial to a network’s ability to handle data and ensure it reaches its intended destination as its being transmitted

Routers

Routers route data packets across a network by opening the packet and

making routing decisions based on the contents On a network that uses Transmission Control Protocol/Internet Protocol (TCP/IP) as its communi-cation protocol, IP addresses are used as a method of identifying computers This identification is used to ensure that data is sent to the correct computer

on the network For these computers to communicate, however, a device is needed to guide the TCP/IP network traffic to its destination This is where routers come in

The network layer, or Layer 3, is responsible for addressing messages and translating their logical addresses into an actual physical address It is important to remember that a router is protocol dependent That means that

a TCP/IP router can connect to a TCP/IP network In other words, this is the layer of the OSI model that is responsible for determining where to send the TCP/IP packets to their destinations Routers essentially separate different broadcast domains from one another and route traffic based on the destina-tion, or Layer 3, address (the Layer 2 address is the MAC address)

When you want to communicate with another computer network, your computer essentially looks within the local network first before heading out

to search for a remote address For example, when your computer needs to access a file on another computer, your computer first checks its Address Resolution Protocol (ARP) cache to see if that computer has a recognizable MAC address If it does not, your computer checks the local subnet by either broadcasting or asking a name server for help

If the address is not found on the local subnet or network, your computer checks to see if you have a default gateway or router to send the information

Trang 8

to Your computer sends this information to your router and the router routes

the message accordingly The router receives the data with the address

infor-mation and checks its routing tables to see where it should send your data

The type of router sometimes affects how quickly your data arrives at its

destination

Routers are either static or dynamic In most cases, you’ll only have to

deal with a dynamic router – a router whose routing tables are populated

automatically by receiving updates from other routers Static routers have

fixed routing tables that have to be updated manually These static routers

are at a disadvantage because they cannot communicate with any type of

router in case a network route changes due to hardware failure or change to

the network layout

The main benefit of a dynamic router is that, depending on which type

of routing protocol is used, it will attempt to route your network traffic to

your destination as quickly as possible, for example, if you have a network

that is standardized on Cisco routers (dynamic) that all communicate with

one another using the Open Shortest Path First (OSPF) Routing Protocol

All of your routers are communicating with one another via broadcasts that

they send whenever there is a change in their routing This comes in very

handy and adds a layer of redundancy so that if a segment of the network

fails, your routers will be able to route the network traffic through other paths

so that no matter what happens to the network, your data will always arrive

at its destination

If you were using a static router and you had a segment fail on your

net-work, your network traffic would cease until the segment was repaired or

another static route was mapped on the router This puts static routing at a

severe disadvantage in a large, complex network environment

understanding static and Dynamic routing

When it comes to routing, there is a huge difference between static and

dynamic Early routers had to be programmed with exactly which networks

they could route between which interfaces, especially if there were many

network interfaces This is called static routing, and network

administra-tors had to add, maintain, and delete routes of the network routing devices

manually In a small company this may not be much of a chore, but for

medium to large networks, this can be nearly impossible These larger

net-works almost always employ many logical subnets, which require you to

update the route tables on each routing device If these remote subnets are

connected by routers with static route tables, you have to add the exact static

route to communicate between the two subnets Table 3.3 shows an example

of what is contained in the routing table

Trang 9

In this simplified table you can see how you only specify the router to be used to reach the destination, not the actual destination itself The number

of hops determines which route is the most efficient If a route claims it can reach the destination in one fewer hop than the next router, then it is sent

to that router If there are two identical routes to the same destination, the route with the fewest hops will be used

One change to a network address means visiting every routing device that employs static routing and updating the entry What do we do if our net-work is fairly large and complex? We must then use routing devices capable

of dynamically updating the routing tables

Dynamic routing does not require the network administrator to edit complex routing tables to communicate with other networks or segments These routers communicate with each other using a powerful routing pro-tocol such as Routing Information Propro-tocol (RIP) or OSPF They can also query other routers for updated route information, which can create more efficient paths for sending packets or locate an alternative route if the origi-nal route fails The routers can broadcast the routes they have discovered

to neighboring routers, and, in turn, accept routes from other neighbor-ing routers The Internet comprises many dynamic routers, which is an example of why dynamic routing is so important Could you imagine hav-ing to update a static routhav-ing table on thousands of static routers? I don’t think so

These dynamic routers, however, cannot update the route tables of static routers or non-dynamic routers There are a few situations in which inte-grating static and dynamic routers is acceptable:

When you have a router at either end of a slow WAN link: This

router will not increase traffic by broadcasting updated route infor-mation to the router on the other end of the link

When you require a packet to travel the same path each time to a

remote network, add the path you would like the packet to take to

Table 3.3 Information Contained in a Routing Table

destination Adjacent router hops

Trang 10

reach the destination network You cannot enter the entire path

over several routers, only the path to the first router

When you want to configure a static router to point towards a

dynamic router to take advantage of the dynamic router indirectly

This is the next best thing to using a dynamic router You can hand

off the packet to the dynamic router and let this router determine

the most efficient path to the destination based on the paths it has

learned from neighboring dynamic routers

switching routers

Switches have the ability to perform the tasks normally associated with other

devices A Layer 3 switch has the ability to open a packet and view the IP address

and MAC address of the computer the packet is destined for The switch can

then review routing tables on the switch to determine the best route to send

the data By performing these functions, the switch is able to do the work of a

router and get the packet to its intended destination by using the best route

Security Integration

As reports of hacking, viruses, worms, and other attacks on networks become

commonplace in the news, the need for security in network devices and

net-works in general continues to grow Equipment and software can be added to

a network, which can work with existing devices to protect your LAN and its

data Choosing which security measures to implement can be challenging,

as there is an increasing number of products available However, the more

protected your network, the less chance there will be of it being damaged

from outside sources

Convergence of security

Just as devices are including more and more features in them that make other

devices obsolete or unnecessary to a network, devices are also including more

security features that historically had to be purchased separately As

demon-strated with routers that are used for DSL or cable Internet, features such as a

built-in firewall are now being included with the router The hardware-based

firewall provides a barrier to incoming traffic from the WAN, and thereby

pre-vents it from reaching your local computer or LAN The hardware firewall,

how-ever, is limited in restricting and monitoring the incoming and outgoing traffic

and should be complemented by a software firewall and antivirus software

Exam warning

Routers operate at the network layer of the OSI model The exam will deal with questions

regarding both routers and the OSI model.

Ngày đăng: 04/07/2014, 13:21

TỪ KHÓA LIÊN QUAN