Professional Documents
Culture Documents
Ictnwk404 LG v1
Ictnwk404 LG v1
Learner Guide
© Copyright, 2015 by North Coast TAFEnow
Copyright of this material is reserved to the Crown in the right of the State of New South Wales.
Reproduction or transmittal in whole, or in part, other than in accordance with the provisions of the Copyright Act, is
prohibited without written authority of North Coast TAFEnow.
Disclaimer: In compiling the information contained within, and accessed through, this document ("Information")
DET has used its best endeavours to ensure that the Information is correct and current at the time of publication but
takes no responsibility for any error, omission or defect therein. To the extent permitted by law, DET and its
employees, agents and consultants exclude all liability for any loss or damage (including indirect, special or
consequential loss or damage) arising from the use of, or reliance on, the Information whether or not caused by any
negligent act or omission. If any law prohibits the exclusion of such liability, DET limits its liability to the extent
permitted by law, to the re-supply of the Information.
Third party sites/links disclaimer: This document may contain website contains links to third party sites. DET is not
responsible for the condition or the content of those sites as they are not under DET's control. The link(s) are
provided solely for your convenience and do not indicate, expressly or impliedly, any endorsement of the site(s) or
the products or services provided there. You access those sites and use their products and services solely at your
own risk.
Contents
Getting Started .................................................................................................................................. i
Icon Legends....................................................................................................................................................................... ii
Open systems interconnection (OSI) and Transmission control protocol/Internet protocol (TCP/IP)
................................................................................................................................................................................................10
Topic 3 - Implement an IP addressing scheme & IP services to meet network requirements ... 27
It applies to individuals working in a network support position. They would use the
appropriate tools, equipment, software and protocols to install, operate, and troubleshoot, a
small enterprise branch network.
Follow this link to find the essential outcomes needed to demonstrate competency in this
Unit: https://training.gov.au/Training/Details/ICTNWK404
i|P a g e
ICTNWK404_LG_V1
TAFEnow
Icon Legends
Learning Activities
Learning activities are the tasks and exercises that assist you in gaining a
clear understanding of the content in this workbook. It is important for you
to undertake these activities, as they will enhance your learning.
Case Studies
Discussions/Live chat
The required reading is referred to throughout this Learner Guide. You will
need the required text for readings and activities.
The suggested reading is quoted in the Learner Guide, however you do not
need a copy of this text to complete the learning. The suggested reading
provides supplementary information that may assist you in completing the
unit.
Reference
A reference will refer you to a piece of information that will assist you with
understanding the information in the Learner Guide or required text.
References may be in the required text, another textbook on the internet.
Self-check
Work Flow
ii | P a g e
ICTNWK404_LG_V1
TAFEnow
iii | P a g e
ICTNWK404_LG_V1
TAFEnow
Topic 1 - Describe the operation of
data networks
This topic will provide you with an understanding of how a computer network operates by
examining various network elements and protocols.
We will examine the OSI and TCP/IP models to gain an understanding of various protocols and
how data flows in a network. We will then examine techniques to identify and correct
common network problems using a layered model approach.
> adapters
4|P a g e
ICTNWK404_LG_V1
TAFEnow
> cables and connectors
> servers
Adaptors
A network adaptor, sometimes referred to as a Network Interface card (NIC) is what connects
your computer to a network.
Traditionally, network adaptors were installed as expansion cards inside your computer but as
the need for network and internet access became more ubiquitous, motherboard
manufacturers have been including network adaptors as “onboard” components.
Network adaptors may be wired or wireless with the most common wired network adaptor
being an Ethernet adaptor. These adaptors connect to the network using a Cat6 cable (usually
a blue or yellow cable that you have probably seen in a lab of computers). Most wired
adaptors these days are able to transmit data at around 1Gigabits per second.
Wireless adaptors are often built into laptop computers but can also be bought as USB
dongles. It’s also possible to install a wireless card into a desktop computer as an expansion
card.
There are a number of different wireless standards but 802.11n which is quite common will
transmit data up to 300Mbps. Wireless networks are generally always slower than their wired
counterparts.
See the images below for some examples of common network adaptors.
5|P a g e
ICTNWK404_LG_V1
TAFEnow
Cables and connectors
Ethernet cables
Ethernet cables (the most common networking cable) consist of four “twisted pairs” of wires
and are sometimes called UTP (Unshielded Twisted Pair) or STP (Shielded Twisted Pair) cables.
Ethernet cables are sometimes referred to by their Category, for example Category 6 cable or
simply Cat6. Cat6 is a standardized cable for Gigabit Ethernet capable of speeds up to 1Gbps
but is limited to a maximum length of 100m.
Fibre optic cables have always provided a high rate of data throughput (over 100 petabits per
second in laboratory environments) and are a common way of linking various network
components such as routers and switches. Fibre optic communications are not susceptible to
electromagnetic interference and are ideal for connections which cover long distances.
Fibre optic cable illuminated by a laser A single strand of a fibre optic cable
Source: Wikipedia Commons
6|P a g e
ICTNWK404_LG_V1
TAFEnow
Switches
A network switch allows you to connect two or more computers together to form a network.
Switches come in a variety of sizes and are often referred to by the number of “ports” they
have which in turn determines how many computers can be connected to it.
Remote Monitoring – Allows you to monitor all traffic through a particular port to identify
network traffic issues.
Duplex settings – This setting determines the method of communication for a particular port.
It may be simplex, which means data can only be sent in one direction between two hosts.
Half-duplex, allows traffic to travel in both directions but only in one direction at a time. Full-
duplex allows data to travel in both directions simultaneously. As well as setting the direction
of travel, duplex settings also allow you to configure the speed at which a port will
communicate.
MAC Filtering – Allows you to create rules for network access based on a computers MAC
address which is unique to every single network card.
VLAN Settings – VLANS or Virtual LANs allow you to create multiple network segments using a
single network switch. These networks may or may not be allowed to communicate with each
other depending on how the switch is configured. For example you may decide to split a 24-
port switch so that ports 1 to 12 are for one VLAN and ports 13 to 24 are for another network
or VLAN 2.
A real world example of VLAN could be a company that has a research and development team
network which is used for testing new software patches and preparing server upgrades before
they are rolled out to the rest of the company. Rather than buying switches and installing new
cabling just for the R&D network, the company may choose to create a separate VLAN using
existing hardware so that all R&D servers and computers will be on their own network.
Switches can be connected to other switches by copper UTP cables or more commonly fiber-
optic cables to further expand your network.
7|P a g e
ICTNWK404_LG_V1
TAFEnow
Figure 4 – Switches
Routers
A router connects two or more networks so that computers on one network are able to
communicate with computers in other networks. They also ensure that data destined for one
network is not sent to the wrong network. Since the Internet is one huge network made up of
thousands of smaller networks, the use of routers is essential.
Figure 5 – Routers
Servers
Network servers are computers designed to process requests and deliver services to “client”
computers on the network. These servers will often run special operating systems such as
Windows Server or UNIX which enable it to perform various roles such as file and print
sharing, web and FTP services or even act as a proxy server.
8|P a g e
ICTNWK404_LG_V1
TAFEnow
LEARNING ACTIVITIES ACTIVITY 1
Network infrastructure
"Get Real" are a small real estate business who have just moved into a new office building and are
taking this opportunity to redesign their network infrastructure. The business requires the
following features:
> all computers must be able to access a server which shares files and print services
List all hardware, computers and cables you would require to make this network possible and
describe how you would connect it all together.
Hint: Building your network from the incoming internet connection, what is the first device you need to
make this work? Which device will allow you to connect the client computers together to form a
network?
READINGS RECOMMENDED 1
http://www.scorelift.com/resources/computer-networks-basic-hardware-requirements.html
Should this link be unavailable please notify TAFENow and instead search the internet for “network
hardware components.
9|P a g e
ICTNWK404_LG_V1
TAFEnow
Open systems interconnection (OSI) and
Transmission control protocol/Internet protocol
(TCP/IP)
Open systems interconnection (OSI) model
The goal of the OSI Model was to standardise data networking protocols and allow computers
to communication across the globe. The OSI model I a conceptual framework of networking
protocols divided into 7 layers. Information is passed from one layer to the next down
through the stack and then back up again at the receiving end.
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
Layer 7 – application
This layer supports applications and end user processes such as web browsers, ftp and telnet
clients
Layer 6 – presentation
The presentation layer interprets data and translates it into a form that the applications (in the
application layer) can accept. Examples of Layer 6 presentation include encryption, ASCII, GIF
and JPG.
Layer 5 – session
This layer establishes, maintains and closes connections between applications. Examples
include NetBIOS, Remote Procedure Calls and DNS.
10 | P a g e
ICTNWK404_LG_V1
TAFEnow
Layer 4 – transport
This layer manages end-to-end control of data such as ensuring all packets have arrived at
their destination and are still intact. The TCP protocol operates on this layer.
Layer 3 – network
This layer provides switching and routing technologies to create “virtual circuits” between
nodes.
Layer 1 – Physical
This layer deals with the hardware aspects of sending and receiving data on a carrier,
including cables, cards, physical voltages and connectors.
Horizontal Layer Communication happens when layers on both computers talk to each other
directly. For example data generated at the Application Layer on your computer is designed
to be handled by the Application layer on a remote computer (e.g. A web server) using a
specific protocol, such as HTTP. Another example would be the voltages sent across an
Ethernet cable which are managed at the Physical Layer of both devices.
Vertical Layer Interaction happens on a single computer when one layer provides a service to
the next layer above it.
The TCP/IP Network Model was developed around the same time as OSI and many networks
were compatible with both standards however by the early 1990’s TCP/IP had become the
common choice. These days the TCP/IP model of communication dominates the networking
world.
Like the OSI Model, TCP/IP makes use of different protocols and standards at various layers in
the stack.
11 | P a g e
ICTNWK404_LG_V1
TAFEnow
Figure 7 – The five layers of the TCP/IP model
5 Application
4 Transport
3 Network (Internet)
2 Data Link
1 Physical
Note: earlier versions of the TCP/IP model combined the bottom two layers into a single
“Network Access Layer”.
Like OSI, the upper layers of TCP/IP focus on the applications that need to send and receive
data while the lower layers focus on how the data is delivered.
Layer 5 – Application
Here you will find protocols such as HTTP (used by web browsers), and POP3 and SMTP (used
by email clients).
Layer 4 – Transport
The Transport layer is responsible for providing error recovery and flow control. The two most
important protocols at this layer are TCP and UDP. TCP allows for reliable transmission of data
where UDB is less reliable but better suited to streaming services such as Voice over IP.
The most important protocol found at this layer is the Internet Protocol (IP) which allows for
addressing and routing. IP ensures each host on the network has a valid address and that data
is routed accordingly to reach its correct destination.
The Data Link layer defines protocols such as Ethernet or Point-to-Point Protocol (PPP) which
are responsible for delivering data across the physical network.
Layer 1 – Physical
Similar to OSI, the Physical layer in TCP/IP defines the standards for transmitting data over
some physical medium as well as any cables and connectors associated with this.
12 | P a g e
ICTNWK404_LG_V1
TAFEnow
LEARNING ACTIVITIES ACTIVITY 2
Use the ISO or TCP/IP model to describe how a request for a specific web page from your computer
to a webserver is handled at each layer in the stack.
Hint: Start at the Application layer on you your computer and work down through each layer of your
chosen model.
READINGS RECOMMENDED 2
The following articles give further detail on the OSI and TCP/IP Models.
http://electronicdesign.com/what-s-difference-between/what-s-difference-between-osi-seven-
layer-network-model-and-tcpip
http://www.ccnahub.com/ip-fundamentals/understanding-tcp-ip-and-osi-models
Should this link be unavailable please notify TAFENow and instead search the internet for “OSI and
TCP/IP Models”.
Physical
Check that all devices have power, cables are connected securely and are not damaged.
13 | P a g e
ICTNWK404_LG_V1
TAFEnow
Data-Link: This is where bits are converted to packets and vice versa. Devices at this layer
include network cards and some switches.
Network
This layer handles network addressing and routing. It translates IP addresses into MAC
addresses, or computer names to MAC addresses. Common devices at this layer include
routers and managed switches. Some switches are even referred to as Layer 3 Switches
indicating that they are capable of performing some higher functions compared to a “Layer 2”
Switch.
Transport
Protocols used on the transport layer include TCP, NetBIOS, RARP, ARP, and NetBEUI.
Session: The Session layer is used to create and manage sessions across a network. An
example of this would be Remote Desktop. If a user reported they were unable to connect to
your application server using Remote Desktop, then you might want to start your efforts at
this layer. NetBIOS and RPC are some of the protocols used on this layer.
Presentation
This layer handles encryption, data compression and a few other things. An example of this
layer is your wireless router at home using WEP, WPA or another type of encryption.
Application
This layer is used as a means of communication between the operating system, the
application, and the end user. So basically how programs talk to your operating system.
An example of this could be a program that doesn’t function like it normally would, maybe
you get error messages when you run your program, or maybe it won’t let you save your work.
This would be an application layer issue and that is where you should start your
troubleshooting efforts.
Some of the protocols used at this layer are SMB, FTP, AFP, TELNET, SMTP, and DNS.
14 | P a g e
ICTNWK404_LG_V1
TAFEnow
LEARNING ACTIVITIES ACTIVITY 3
Commands
Identify what each of the following commands do and when they might be used:
> HOSTNAME
> PING
> ARP
> NETSTAT /B
> TRACERT
> PATHPING
> NSLOOKUP
Hint: Click the start button and type CMD.EXE then press enter to open a command prompt where you
can enter these commands.
After rearranging their office a user calls and complains that they cannot access any of the shares
on the server “wolverine”. They are also unable to access the internet. You ask them to type ‘ping
192.168.1.1’ (the IP address of the router) into a command prompt and they get the following
result:
15 | P a g e
ICTNWK404_LG_V1
TAFEnow
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),
a What layer of the OSI model do you think the problem could be on?
b What is the most likely problem and how would you go about troubleshooting it?
READINGS RECOMMENDED 3
The following article gives further detail on various networking commands used in Windows.
http://technet.microsoft.com/en-us/magazine/ee924647.aspx
Should this link be unavailable please notify TAFENow and instead search the internet for “Windows
network troubleshooting commands”.
16 | P a g e
ICTNWK404_LG_V1
TAFEnow
Topic 2 - Implement a small switched
network
Before starting this topic watch the following YouTube video as it gives a good overall
description of how data travels across networks.
As you watch the movie think about the different layers of the OSI model and how data is sent
down through the layers and then back up again at the receiving end.
Network Segmentation
17 | P a g e
ICTNWK404_LG_V1
TAFEnow
Each segment can be protected from the other segments using a predefined set of rules (e.g.
computers in one segment may only be able to access a single server on another segment).
Often, network segmentation will incorporate the creation of a Demilitarized Zone (DMZ)
which provides additional security to the network by ensuring any externally accessible
servers (e.g. web server) are on their own segment. That way if the web server or DNS server is
compromised the attacker does not necessarily have access to the corporate intranet.
18 | P a g e
ICTNWK404_LG_V1
TAFEnow
LAN segmentation can be done using routers, bridges or switches. In the case of network
segmentation using switches, each segment is often called a Virtual LAN or VLAN. Improved
hardware performance, higher port density, lower per-port cost, and greater flexibility has
seen switches become a replacement technology for bridges and as complements to routing
technology.
Switching Technologies
Modern networks will use switches to connect computers together to form a network.
Computers are usually connected to the switch via Cat6 Twisted pair cables which are able to
support speeds of up to 10 gigabits per second. This is a good a good choice to ensure future
proofing of your networks
Managed switches are capable of creating VLANS or virtual network segments which may or
may not be able to communicate with each other depending on how the switches are
configured.
19 | P a g e
ICTNWK404_LG_V1
TAFEnow
Managed switches are capable of creating VLANS or virtual network segments which may or
may not be able to communicate with each other depending on how the switches are
configured.
Layer 3 switches are self-learning. They will determine the Ethernet addresses in use on each
segment and build a table as they pass packets. When the switch receives a frame, it saves the
MAC address and port of the originator in the table which is known as a “routing table”. The
routing table is used to determine where to forward incoming data.
Web server
Following on from the scenario on Activity 1, “Get Real” would like to incorporate a web server into
their network. To ensure the security of all data on their intranet they would like the web server to
be located in a DMZ on a separate network segment. Draw a diagram of the network and label
accordingly.
20 | P a g e
ICTNWK404_LG_V1
TAFEnow
READINGS RECOMMENDED 4
The following articles give further detail on network segmentation and switching technologies:
> http://www.asd.gov.au/publications/csocprotect/network_segmentation_segregation.htm
> http://netcert.tripod.com/ccna/internetworking/lanseg.html
> http://support2.microsoft.com/kb/164015
> http://machinedesign.com/archive/basics-network-switching-technology
Should this link be unavailable please notify TAFENow and instead search the internet for “network
segmentation”.
NOTE: Configuration via the serial cable is required as we are unable to connect to the switch
by IP address (it doesn’t have one yet!).
If you are using a newer computer, chances are you will be using a USB to Serial adapter. If you
are unfamiliar with the setup and configuration of these adapters visit THIS website for a
detailed guide on how to install them. Take particular note of the COM Port number
configuration setting as this will be needed later in the activity.
If you do not know the Management Password for your switch you will need to perform a
factory reset before starting this activity.
1 With the power connected simultaneously press both the Reset and Clear buttons on the
front of the switch.
2 Continue to press the Clear button while releasing the Reset button.
21 | P a g e
ICTNWK404_LG_V1
TAFEnow
3 When the Self-Test LED begins to flash, release the Clear button.
Serial ports and connectors are sometimes referred to as RS-232 as this is the standard
used for communicating between serial devices.
22 | P a g e
ICTNWK404_LG_V1
TAFEnow
23 | P a g e
ICTNWK404_LG_V1
TAFEnow
Setting a manager password
Assigning an IP Address
2 Choose Edit
IP Config: Press the Space bar to change this to Manual. IP Address: The IP address you want
to assign. Subnet Mask: Your subnet mask
24 | P a g e
ICTNWK404_LG_V1
TAFEnow
4 Press Enter then choose Save
7 You can now safely power off the switch and disconnect the serial cable.
Configuration
Because most people do not have access to a managed switch, for this activity you will be required
to document the steps involved in configuring your home ADSL modem. Be sure to include a
screenshot of each step.
> Verify your configuration by pinging 192.168.2.1 from a computer connected to the modem
Hint: You may need to locate and download the user manual for your particular piece of hardware.
25 | P a g e
ICTNWK404_LG_V1
TAFEnow
26 | P a g e
ICTNWK404_LG_V1
TAFEnow
Topic 3 - Implement an IP addressing
scheme & IP services to meet network
requirements
REFERENCE REFERENCE 1
Watch the following video for in depth information on IP addressing and subnetting
> http://www.youtube.com/watch?v=EkNq4TrHP_U
27 | P a g e
ICTNWK404_LG_V1
TAFEnow
Alternatively, should the video be unavailable, try the following website.
> http://www.cse.uconn.edu/~vcb5043/MISC/IP%20Intranet.html
A network address serves as a unique identifier for a computer on a network. When set up
correctly, computers can determine the addresses of other computers on the network and use
these addresses to send messages to each other.
The most common form of network addressing is using the IP protocol. IP addresses consist of
four bytes (32 bits) that uniquely identify all computers on the public Internet. e.g. 192.168.1.1.
More recently we have seen the introduction of IP v6 which uses a 128 bit address written in
hexadecimal notation which looks something like this 2001:db8:ffff:1:201:02ff:fe03:0405. IP v6
was developed to provide more IP addresses as the internet grew and more devices were
being connected.
IP addresses may be static (defined by the user) or dynamic (allocated automatically from a
pool of IP addresses). Dynamic IP addresses are allocated by a DHCP server, in your home
network this is probably your ADSL modem router. Larger networks will have a dedicated
server for managing IP addresses across the network.
IP addresses are always used in conjunction with a subnet mask. A subnet mask is used to
divide an IP address into its Network and Host addresses. For example if an IP address of
192.168.0.1 has a subnet mask of 255.255.255.0 then the network part of the address is
192.168.0 and the host part is simply the .1 at the end.
IP addresses may be public or private. Public addresses are assigned by InterNIC and are
guaranteed to be globally unique on the Internet, they are used by computers which require
direct access to the internet such as web servers and email servers.
Private IP addresses are used by hosts within an organization that do not require direct access
to the internet (such as workstations that just need to browse the net).
Private IP addresses are typically used on local networks including home, school and business
LANs.
An IP address is considered private if the IP number falls within one of the IP address ranges
reserved for private uses. The following private IP address ranges exist:
28 | P a g e
ICTNWK404_LG_V1
TAFEnow
10.0.0.0 to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
*APIPA stands for Automatic Private IP Addressing and is automatically assigned to a host if it
is unable to contact a DHCP server.
Devices with private IP addresses cannot connect directly to the Internet. Likewise, computers
outside the local network cannot connect directly to a device with a private IP. Instead, access
to such devices must be brokered by a router or similar device that supports Network Address
Translation (NAT). NAT hides the private IP numbers but can selectively transfer messages to
these devices, affording a layer of security to the local network. A home ADSL router/modem
is able to do this.
Addressing
Hint: Discuss WHY we have IP addresses, what they are used for and why they must be unique within out
subnet.
Private IP addressing
Describe the purpose of using private IP addressing. What are the advantages of using private IP
addressing?
Hint: Discuss when private IP addressing is used and what limitations it has.
29 | P a g e
ICTNWK404_LG_V1
TAFEnow
READINGS RECOMMENDED 5
> http://whatismyipaddress.com/ip-address
> http://whatismyipaddress.com/ip-v6
> http://www.iplocation.net/tools/netmask.php
> http://support.apple.com/kb/ht4669
> http://technet.microsoft.com/en-us/library/cc958825.aspx
Should these links be unavailable please notify TAFENow and instead search the internet for “IP
addressing”.
1 Open your browser and enter the modem’s IP address (192.168.1.1) in the address bar and
press ENTER
Click “OK”
30 | P a g e
ICTNWK404_LG_V1
TAFEnow
3 From the menu on the left choose Advanced setup then LAN
IP: 192.168.1.1
SN: 255.255.255.0
IP: 192.168.1.1
SN: 255.255.255.0
31 | P a g e
ICTNWK404_LG_V1
TAFEnow
6 Enable DHCP Server and specify a start and end IP address range within your chosen
private IP address range. This example will use 192.168.1.100 to 192.168.1.200
7 Click Save/Apply
> Document the steps involved in configuring DHCP for your home ADSL modem. Be sure to
include screen shots of each step.
> Verify that DHCP is working by providing screenshots of the following commands.
Hint: You may need to locate and download the user manual for your particular piece of hardware.
32 | P a g e
ICTNWK404_LG_V1
TAFEnow
Configuring Network Address Translation (NAT)
for a small network
Below are instructions for configuring a TP-Link 150M Wireless N ADSL + Modem Router
1 Open your browser and enter the modem’s IP address (192.168.1.1) in the address bar and
press Enter
3 Click “OK”
33 | P a g e
ICTNWK404_LG_V1
TAFEnow
4 From the menu on the left choose Quick setup
6 Click “Next”
34 | P a g e
ICTNWK404_LG_V1
TAFEnow
7 Enter your username and password as required by your ISP
9 Click Next
12 Change the authentication method to WPA-2 Personal and enter a network key (wireless
password)
13 Click “Next”
35 | P a g e
ICTNWK404_LG_V1
TAFEnow
14 Verify your settings are correct and click “Confirm”
15 Your modem is now configured and internet access should be possible from client
computers
Document the steps involved in configuring NAT for your home ADSL modem. Be sure to include
screen shots of each step.
Verify your configuration by pinging www.google.com and provide a screen shot of the result.
Hint: You may need to locate and download the user manual for your particular piece of hardware.
36 | P a g e
ICTNWK404_LG_V1
TAFEnow
Configuring Static and Dynamic IP Addresses
To configure your IP address setting in Windows 7 follow the steps below:
37 | P a g e
ICTNWK404_LG_V1
TAFEnow
5 In the Properties window which appears double-click on Internet Protocol Version 4
(TCP/IPv4)
6 Here you can specify to Obtain IP address automatically (for DHCP) or Use the following IP
address to manually configure the IP address.
NOTE: The Default Gateway is the IP address of the router which takes you out of this subnet
(i.e. the IP address of your modem)
38 | P a g e
ICTNWK404_LG_V1
TAFEnow
LEARNING ACTIVITIES ACTIVITY 11
Configuring simulation
Most servers are configured with a static IP address. Simulate configuring a server with a static IP
address by changing the IP address of your computer to 192.168.2.111.
39 | P a g e
ICTNWK404_LG_V1
TAFEnow
Topic 4 - Implement a small routed
network
Describe basic routing concepts
Routing involves the delivery of datagrams between hosts located on different networks.
These routing mechanisms are either static or dynamic in nature. Static means manual
configuration is necessary. Dynamic mechanisms involve routing protocols that facilitate the
exchange of information, allowing routers to learn and adapt to changes in a network's
topology.
Without routing the internet as we know it would not be possible. Routing allows for
networks to be linked in a mesh (or net) structure with more than one possible path between
nodes. Routing protocols determine the best path for data to take and provide alternatives if
links go down.
40 | P a g e
ICTNWK404_LG_V1
TAFEnow
There are a number of different routing protocols which are used to build routing tables and
determine which is the best path for data to take. Examples of these are:
The Border Gateway Protocol (BGP) routes traffic between autonomous systems. An
autonomous system is a network or group of networks under common administration and
with common routing policies. BGP exchanges routing information for the Internet and is the
protocol used between ISPs.
OSPF is a routing protocol developed for IP networks by the IGP working group of the Internet
Engineering Task Force (IETF). It was derived from several research efforts, including a version
of OSI's IS-IS routing protocol.
> It is an open protocol. Its specification is in the public domain. (RFC 1247).
> It is based on the Shortest Path First (SPF) algorithm, sometimes known as the Dijkstra
algorithm
Enhanced Interior Gateway Routing Protocol (EIGRP) is Cisco's proprietary routing protocol,
based on IGRP.
Redundancy
41 | P a g e
ICTNWK404_LG_V1
TAFEnow
READINGS RECOMMENDED 6
The following articles give further detail on routing concepts and protocols:
> http://www.informit.com/articles/article.aspx?p=26129&seqNum=3
> https://supportforums.cisco.com/document/127851/routing-protocol-selection-guide-igrp-
eigrp-ospf-bg
Should these links be unavailable please notify TAFENow and instead search the internet for “routing
protocols”
42 | P a g e
ICTNWK404_LG_V1
TAFEnow
Topic 5 – Implement and verify WAN
links
Describe different methods for connecting to a
WAN
WANs are used to connect LANs and other types of networks together, so that users and
computers in one location can communicate with users and computers in other locations.
Many WANs are built for one particular organization and are private. Others, built by Internet
service providers, provide connections from an organization's LAN to the Internet. WANs are
often built using leased lines. Leased lines can be very expensive. Instead of using leased lines,
WANs can also be built using less costly circuit switching or packet switching methods.
43 | P a g e
ICTNWK404_LG_V1
TAFEnow
Leased Lines
A leased line provides a Point-to-point connection between two LANs. It is secure but can
become expensive. Typically, leased lines are used by businesses to connect geographically
distant offices. Unlike normal dial-up connections, a leased line is always active. The fee for the
connection is a fixed monthly rate. The primary factors affecting the monthly fee are distance
between end points and the speed of the circuit. Because the connection doesn't carry
anybody else's communications, the carrier can assure a given level of quality. Protocols used
by Leased lines include Point-to-point Protocol (PPP) and High-Level Data Link Control
(HDLC).
Circuit switching
These are relatively cheaper connections and rely on making a physical circuit path between
two points. Dial up connections are examples of this. They use the landline telephone
infrastructure for data transmission. The speed offered is usually 30 Kbps to 150 Kbps. The
protocols used are PPP or Integrated Services Digital Network (ISDN).
Packet switching
Two major packet switching modes exist; connectionless packet switching, also known as
datagram switching, and connection-oriented packet switching, also known as virtual circuit
switching. In the first case each packet includes complete addressing or routing information.
The packets are routed individually, sometimes resulting in different paths and out-of-order
delivery. In the second case a connection is defined and preallocated in each involved node
before any packet is transferred. The packets include a connection identifier rather than
address information, and are delivered in order. X.25 and Frame Relay are examples of
Connection Oriented Packet Switching. The internet (IPv4/IPv6) is an example of a
Connectionless Packet Switched network.
Cell Relay
Similar to packet switching, but uses fixed length cells instead of variable length packets. Data
is divided into fixed-length cells and then transported across virtual circuits. The use of fixed
length cells means that there is considerable overhead with this method of connection.
Asynchronous Transfer Mode (ATM) is an example of a Cell Relay protocol.
44 | P a g e
ICTNWK404_LG_V1
TAFEnow
Connecting to a WAN
Serial
One of the main methods of connecting the router to your service provider's network is via a
serial port. Depending on your service provider connection, you may be provided with a
Channel Service Unit/Data Service Unit (CSU/DSU). The CSU/DSU serves the same purpose a
modem (modulator/demodulator) in that it prepares your digital data to be sent over a
telephone company network that may not be carrying a digital signal.
Figure 13 – CSU/DSU
Integrated CSU/DSU
Over the years, to reduce cost or complexity, it has become common for people to integrate
the CSU/DSU components into their routers. Rather than having another bulky device sitting
in your communications room, you can have the functionality of the CSU/DSU integrated into
the circuitry of your router.
The drawback is that if you decide to change the type of connection you have, you may need
to change your router. Consequently, Cisco came up with the WAN Interface Card (WIC) port,
which allows you to change the type of service provider connection you use at a minimum
cost, allowing you to reuse your existing router.
ISDN Ports
With the prevalence of ISDN connections it is possible to buy routers which have built-in ISDN
connections. You are limited to using these routers with an ISDN connection however they are
often cheaper.
45 | P a g e
ICTNWK404_LG_V1
TAFEnow
LEARNING ACTIVITIES ACTIVITY 13
CSU/DSU
Describe when you would need to use a Channel Service Unit/Data Service Unit (CSU/DSU) and
what its function is.
READINGS RECOMMENDED 7
> http://technet.microsoft.com/en-us/library/bb962087.aspx
Should this link be unavailable please notify TAFENow and instead search the internet for “WAN
technologies”
46 | P a g e
ICTNWK404_LG_V1
TAFEnow
Topic 6 - Troubleshoot a small
enterprise branch network
47 | P a g e
ICTNWK404_LG_V1
TAFEnow
Auto-negotiation
Configuration issues
Configuration issues are probably the most common type of network problem you will
encounter and can range from something as simple as an invalid IP address to an incorrectly
configured VLAN on a switch.
Media Issues
Media issues relate to physical problems with the network infrastructure. Cables that are
broken, cut or damaged or interference on WiFi frequencies are both examples of media
issues.
These are self-explanatory however it does happen that switches develop intermittent faults
which can be hard to diagnose. Overheating and faulty ports are common things to watch out
for. Ensuring the firmware is up to date is also a good idea.
Internet access
You are unable to access the internet and notice this icon in the system tray:
What are possible causes for this and how would you go about troubleshooting this issue?
48 | P a g e
ICTNWK404_LG_V1
TAFEnow
LEARNING ACTIVITIES ACTIVITY 15
Address conflict
You turn on your computer and receive the following message “There is an IP address conflict with
another system on the network”. How would you go about troubleshooting this issue?
IP address configuration
You try to ping the router but all it says is “Request timed out”.
TRACERT command
Explain in detail what the TRACERT command does and what it is used for. How is it different to
PATHPING?
49 | P a g e
ICTNWK404_LG_V1
TAFEnow
READINGS RECOMMENDED 8
> http://support.microsoft.com/kb/314868
> http://www.howtogeek.com/134132/how-to-use-traceroute-to-identify-network-problems/
> http://kb.mediatemple.net/questions/736/Using+the+traceroute+command
Should these links be unavailable please notify TAFENow and instead search the internet for
“troubleshooting with tracert”
READINGS RECOMMENDED 9
> https://myhelp.westnet.com.au/node/1218
Should this link be unavailable please notify TAFENow and instead search the internet for “ADSL line
filter.
50 | P a g e
ICTNWK404_LG_V1
TAFEnow