1. Trang chủ
  2. » Công Nghệ Thông Tin

CompTIA Network+ Certification Study Guide part 61 pot

10 294 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 10
Dung lượng 149,32 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

So just remember when checking the physical layer components for the source of a connectivity problem, be certain to check that the cable is connected and appears to be undamaged, but a

Trang 1

FIGurE 12.3

Windows Vista Device

Manager.

FIGurE 12.4 Updating the Device Driver.

Trang 2

Click

3 Update Driver and follow the prompts to update the driver to the latest

version.

Click

4 OK when you’re finished, and reboot your PC.

problems with Cables and other Network Media

Another type of problem that can mimic TCP/IP protocol configuration

problems is damaged, defective, or improperly installed cables or other

network media Broken or shorted cables can be detected with a cable tester

Some of the more sophisticated and expensive local area network (LAN)

testers will even pinpoint the exact location of the break

As a network administrator, you may have other personnel who handle

hardware and cabling It is important, however, that you are able to recognize

the symptoms of physical layer problems so that you will know when to call

in the technicians, rather than spend your time attempting to fix what isn’t

broken

Damage to the media is not the only factor when considering physical

layer problems All network architectures, such as Ethernet, Token Ring, and

AppleTalk, include specifications that must be met concerning networking

equipment and media If those rules are ignored, connectivity may be lost

completely or you may experience intermittent problems

Some instances in which ignoring these specifications can result in

difficulties in establishing or maintaining a connection include cable type

and grade Following the guidelines surrounding the maximum allowable

segment length for various network/cable types is also important Be sure

that the cabling for your network meets specifications for the particular

architecture For instance, a 10Base2 network requires not just thin coaxial

cable, but a particular type of thin coax: RG-58 A/U (the cable grade is

usually indicated on the side of the cable itself) Don’t try to substitute

something else that is close or looks similar; you will be setting yourself up

for connectivity problems if you do

You may even run into a situation where a cable technician, or perhaps

an administrator with little hardware experience, attempts to replace a

broken or bad length of thin coax cable with RG-58 U or even RG-59 These

cable types are the cable types used for cable TV and are not appropriate in

a networking environment

So just remember when checking the physical layer components for

the source of a connectivity problem, be certain to check that the cable is

connected and appears to be undamaged, but also that the cable type meets

the necessary specifications Another example of improper cable type would

be substituting Category 3 twisted-pair for Category 5 on a 100 Mbps

Trang 3

(100BaseT) or Gigabit Ethernet network An easy way to avoid making this mistake is to verify that the proper cable type is in use The cable type is generally printed on the cable itself

Cable Length Issues

Copper cable is susceptible to attenuation, or signal loss over distance

Because of these different network specifications, place limits on the acceptable length of a segment of cable depending on the architecture and cable type Violating the length specifications may be tempting, especially

if you only need to go “a tiny bit further” to get the cable to a specific office

or other location If you choose to exceed the cable length you may even get

by with it for awhile since typically a cable does not just automatically stop working when you exceed the specified distance, but going beyond these limitations runs the risk of causing connectivity problems Typically, the problems manifest as intermittent and may even cause you to easily mistake issues as being derived from software or the network protocol in use when in reality the trouble lies at the physical level

Troubleshooting physical layer devices

Usually the type of device we associate with an internetwork is the router, which does not actually function at the physical layer of OSI Routing functions occur at the network layer in the OSI model A good thing to keep in mind is that there are other devices which function at a lower-level within OSI that may exist on a network Examples of these include devices such as hubs and repeaters that can provide key functionality The following are some examples of the functionality offered by hubs and repeaters:

Extending the distance limitations of network cable

Connecting network segments that use different media types, for

instance, thin coax and unshielded twisted-pair (UTP)

Segmenting the network to reduce traffic without dividing the

network into separate IP subnets

Because repeaters and hubs operate at the physical layer, problems affecting these devices will be physical problems or hardware problems This layer is not concerned with higher-level protocols like TCP and IP, and problems with these physical layer devices will cause interference with communications regardless of the protocols being used

Trang 4

Something to keep in mind is that physical layer device problems can

often mimic TCP/IP protocol configuration problems Because of this, you

should always consider the physical layer and be sure to rule it out as a root

cause when troubleshooting connectivity problems If the hardware itself

doesn’t work, all the software reconfiguration in the world won’t solve the

problem

Locate the Source of the Problem

If you are unable to establish a connection between computers, you

need to first take some basic steps to help you identify the source of a

problem A good first step to rule out physical issues is to quickly verify

the configuration and operability of the NIC as we discussed earlier in

this section Next confirm that there are no visible breaks or other

prob-lems with the cable If any physical probprob-lems are detected, correct the

issue and then attempt connectivity again If all looks good after a quick

check of the physical components, and connectivity is still failing, then

proceed to the next logical component required for connectivity: the

protocol

First, we need to verify that the TCP/IP stack is properly installed A

simple way to do this is to ping the loopback address of 127.0.0.1 If this

resolves successfully, then the protocol stack is in place and successfully

loaded If this fails, that indicates there is a problem with the protocol

installation that must be corrected

If the ping is successful and you still are unable to connect to any other

devices, there may be a problem with the configuration of the protocol Verify

that all the proper addressing is in place for the network card in use If any

issues are discovered in the TCP/IP addressing configuration of the machine

correct the issue and then reattempt connectivity to another node on the

same segment

If connectivity still fails you would next want to take a look at your

connectivity devices on the network, such as repeaters and hubs:

Ensure that the device has power

Ensure that the computers’ NICs are communicating

with the device (by checking status lights)

Ensure that devices are installed in accordance with the

Institute of Electrical and Electronic Engineers (IEEE)

specifications for that particular network

architecture

Trang 5

Ensure that all ports on the device are functional by checking that

the green light emitting diode (LED) lights when you attach a com-puter to the port via a network cable

The final step in ruling out physical layer problems includes validating compliance with any distance limitations for the media being used and,

for coax networks, the restrictions imposed by the 5-4-3 rule This rule

states that on a 10Base2 or 10Base5 network (using coax cable and a bus configuration), you should have no more than five segments, connected by

no more than four repeaters, and that only three of those segments should

be populated A populated node is one that has nodes (computers or other network devices) attached to it In this context, a network segment is the length of the cable between repeaters

Troubleshooting the hubs that connect a 10BaseT network will depend

in part on the type of hub being used Two types of hubs exist: passive hubs

and active hubs Passive hubs are simply connection points and give you few

clues as to whether they are operating correctly Fortunately, because it is

a simple, non-powered device, not much can go wrong with a passive hub The pins and wiring inside the hub or a damaged female RJ-45 jack could create connection problems This can be prevented by ensuring that the hubs are handled properly, because most such damage is caused by human mistreatment

An active hub is sometimes called a multiport repeater, and it will often

give you a few clues to help you in troubleshooting connectivity problems The flashing lights that indicate network communication and collisions on each port are a starting point By observing the status lights, you can ascertain

if one port is unlit, and therefore not transmitting any data Typically this can indicate either a problem with the jack or cable at that port or a problem originating with the computer attached to it

The intelligent or smart hub that is also called a managed hub is even

a bit more helpful This type of hub runs software that allows you to communicate with the hub from a terminal or across the network In this case, the software program will provide information about port status, and in some cases will run diagnostic applications to assist you in troubleshooting connectivity problems

Test day Tip

You can also use some of the tools discussed in previous chapters, such as the oscilloscope and the cable tester, to perform testing at the physical layer.

Trang 6

TrouBlEShooTING ThE dATA lINK lAyEr

The data link layer primary function is to take the datagram passed down

to it from the network layer and repackage it into a unit called a frame

This frame includes error checking information, which is processed by

the data link layer on the receiving computer when the frame reaches

its destination The data link layer is responsible for error-free delivery

of the data frames It’s also responsible for maintaining the reliability

of the physical link between two computers The physical link between

computers is handled by the physical layer just below the data link layer

The data link layer is the only layer of the OSI model that is divided into

sublayers: the logical link control (LLC) and the MAC We will look at

each of these individually

The LLC sublayer is charged with ensuring the reliability of the link or

the connection IEEE 802.2 is an LLC standard that operates using both

CSMA/CD and Token Ring media access standards Point-to-Point Protocol

(PPP) also operates at the LLC level

The MAC sublayer deals with the logical topology of the network,

which may or may not be the same as the physical topology or layout For

instance, IBM Token Ring networks use a physical star topology where

all computers connect to a central hub (called an MSAU or Multistation

Access Unit) However, the logical topology is a ring, because inside the

MSAU, the wiring is set up such that the data travels in a circle A 10BaseT

network connecting to an Ethernet hub, on the other hand, uses a physical

star configuration, but is logically a bus (which is why it is sometimes

called a star bus)

The IEEE has developed a number of standards to govern the transmissions

that take place at the data link and physical layers When preparing for the

Network+ exam, you should be aware of the following standards:

802.2 establishes standards for the implementation of the LLC

sublayer of the data link layer

802.3 sets specifications for an Ethernet network using CSMA/CD,

a linear or star bus topology, and baseband transmission

802.5 sets standards for a token passing network using a physical

star/logical ring topology such as Token Ring

802.7 establishes criteria for networks using broadband

transmission

Trang 7

802.8 sets specifications for using fiber optic as a network medium.

802.11 establishes standards for wireless networking

understanding data link Access Control Methods

MAC-level protocols govern the access control method, or how the data accesses the transmission media The popular methods are grouped in three categories as follows:

Contention methods

Token passing

Polling methods

Contention methods include CSMA/CD, used in Ethernet networks, and

Carrier Sense Multiple Access Collision Avoidance (CSMA/CA), used in AppleTalk networks In both cases, computers that want to transmit data on the network must compete for the use of the wire or other media A collision occurs if two stations attempt to send at the same time CSMA/CD and CSMA/CA differ how they address this collision problem With CSMA/CD, data collisions are detected and the data is sent again after a random amount

of time With CSMA/CA, an “intent to transmit” message is put out before the computer transmits the actual data

Token passing methods eliminate the possibility of collision using a

circulating signal called a token to determine which computer is allowed

to transmit information across the wire, where only one computer (the computer that has the token) is allowed to transmit at any given time So a computer on a token passing network is more polite than one on a network using contention methods Rather than blurting out its transmission whenever it has something to say, it waits patiently for its turn which occurs

Test day Tip

Be sure to remember the difference between Collision Detection and Collision Avoidance Here is an analogy that may help: with CSMA/CD, you want to cross a busy street So you start to walk across the street, and if you get hit by a car you wait for a little while and then try again With CSMA/CA, you want to cross that same busy street, so you send a remote controlled car across the street before you start walking If the little toy car makes

it across safely, you decide that it’s safe to cross yourself If the toy car gets hit, you wait a little while and then try to send the toy across again.

Trang 8

when the token gets to it, and sends data only when it has the token in its

possession

Polling methods are similar in some ways to token passing, except that

instead of the group of computers policing themselves by passing around a

token, there is a central unit that acts as a chairperson The presiding unit

asks members of the committee, which are the nodes on the network, in

turn whether they have something to say Because all computers follow these

rules of parliamentary procedure, data transmission occurs in an orderly

fashion governed by the central device

understanding MAC Addressing

Although the permanent address burned into the NIC is sometimes called

the physical address, its proper name is the Media Access Control address

The MAC sublayer of the data link layer also handles MAC addressing

functions MAC addresses on Ethernet cards are expressed as 12-digit

hexadecimal numbers, which represent 4-bit (6-byte) binary numbers The

first three bytes contain a manufacturer code, which is assigned by the IEEE

The last three bytes are assigned by the manufacturer and represent that

particular card Each computer must have a MAC address that is unique on

the network

Higher-level protocols will translate IP addresses into MAC addresses IP

addresses are logical addresses, whereas MAC addresses represent the physical

network location of a particular device Because lower-level protocols cannot

recognize or use IP addresses to transmit data a MAC address is required To

facilitate both logical and physical addressing needs on a network, a MAC to

IP address mapping protocol is required Address Resolution Protocol (ARP)

serves this function

When trying to understand the differences between physical and logical

addressing consider this: a city or county may assign a street name and house

number to a building; this value functions as the building’s logical address

Logical addresses can be readily changed For instance, a neighborhood group

may petition to have a street renamed, or the city council will change the

numbering scheme to facilitate emergency response or to accommodate new

construction A physical address is not as readily adjustable The physical

location where the building stands also has an address as well: its geographic

coordinates Longitude and latitude values for the building cannot be

changed and will remain constant regardless of changes to the street name

and number The physical address is similar to a NIC card’s MAC address;

it will typically remain the same

Trang 9

recognizing data link layer devices

The two types of devices that operate at the data link layer of the OSI model

are switches and bridges Bridges can separate a network into segments, but

they don’t subnet the network as routers do In other words, if you use a bridge to physically separate two areas of the network, it will still appear to

be all one network to higher-level protocols Bridges can cut down on network congestion because they can do some basic filtering of data traffic based on the MAC address of the destination computer When a transmission reaches the bridge, the bridge will not pass it across to the other side of the network

if the MAC address of the destination computer is known to be on the same side of the network as the sending computer The bridge builds tables indicating which addresses are on which side, and uses them to determine whether to let the transmission across

Sometimes even experienced network administrators become confused about network bridges This confusion comes in because there are different types of bridges Although all of them operate at the data link layer, some operate at the lower MAC sublayer and others at the higher LLC sublayer There are some important differences One practical question is whether you can use a bridge to connect network segments that use different media access methods (for instance, an Ethernet segment and a Token Ring segment) The answer is, unfortunately, “It depends.” Specifically, this depends on which type of bridge you’re referring to A bridge that operates at the LLC sublayer,

sometimes called a translation bridge, can connect segments using different

access methods However, a lower-level bridge (one that operates at the MAC sublayer) cannot perform this type of translation But both types of bridges can connect segments that use different physical media, like a segment cabled with thin coax and a segment running on UTP

CoNFIGurING ANd IMplEMENTING …

Changing a MAC Address

Some network card manufacturers have made NICs that

allow you to change the MAC address by flashing the

card with a special software program This is a precaution

in case you have duplicate MAC addresses on a network

because those manufacturers have begun to recycle

their addresses This is typically done through a software

utility that will automate the change process, rather

than forcing you to enter many different complicated

commands Being able to access and edit MAC addresses

is also useful from a security standpoint, as it is possible for a hacker to spoof MAC addresses on a network

Spoofing refers to the technique of masquerading as a

legitimate host, in this case a l egitimate MAC address,

to gain access to a network Many wireless networks are restricted based on the MAC address of legitimate NICs, and hackers will attempt to spoof a legitimate MAC address to gain access to a wireless network.

Trang 10

Another device that operates at the data link layer is the switch, or

switching hub, which has become very popular on Ethernet networks Like

the hubs that operate at the physical layer, these switches are multiport

devices that you can plug numerous devices into Like bridges, a switch will

maintain a table of MAC addresses, showing which computer is connected to

which port When data comes into the switch, instead of just sending it back

out to all the attached computers as a hub does, the switch examines the

destination address in the header, consults the table, and sends it only out

the port to which the corresponding computer is attached This cuts down

overall network traffic considerably, and helps to prevent collisions Some

types of switches are even more sophisticated than this and can perform

basic routing functions like dividing networks into virtual LANs (VLANs),

in addition to the type of switching described here

As you saw in the previous section, this is also the layer where WAPs

reside, and so it is the layer at which you’ll start troubleshooting wireless

connectivity issues This includes verifying the Service Set Identifier (SSID),

which is the network name for a given WAP, and ensuring that your wireless

hardware all supports the same 802.11 specification – 802.11a, 802.11b

and/or 802.11g

layer 2 Troubleshooting

Bridges and switches are useful devices for segmenting a network and

controlling the amount of traffic However, they introduce an extra layer of

complexity and thus the potential for several different types of problems

The primary reason for using a bridge or a switch to divide your network

is to increase network performance However, it is possible that bridging or

switching itself can have the opposite effect if it is not implemented correctly

You will find that bridging or switching a network, while cutting down on

overall traffic, will also slightly increase latency for those communications

that must cross the bridge or switch This term refers to delays in transmission

of the data in route to the destination computer

The reason for this is the way in which the bridge or switch decides

whether to forward traffic across the network; it must first analyze the

header information in the data frame to find out the destination computer’s

MAC address, and then it must look up that address in its routing table

This takes some time, although in most cases the performance hit will

not be significant and will be offset by the overall reduction in network

traffic By following a few simple guidelines, you can prevent any noticeable

performance degradation from being created

One popular networking guideline pertaining to the use of bridges and

switches is the 80/20 rule This states that 80 percent of network traffic

Ngày đăng: 04/07/2014, 13:21

TỪ KHÓA LIÊN QUAN