In the fifth module of this course, we’ll explore the history of the Internet, how it evolved, and how it works today. We’ll understand the different ways to connect to the Internet through cables, wireless and cellar connections, and even fiber connections. By the end of this module, you’ll be able to define the components of WANs and outline the basics of wireless and cellular networking.
Learning Objectives
- Describe various Internet connectivity technologies.
- Define components of WANs.
- Outline the basics of wireless and cellular networking.
- Introduction to Connecting to the Internet
- POTS and Dial-up
- Broadband Connections
- WANs
- Wireless Networking
- Video: Introduction to Wireless Networking Technologies
- Reading: Wi-Fi 6
- Reading: Supplemental Reading for Alphabet Soup
- Reading: Supplemental Reading for IoT Data Transfer Protocols
- Video: Wireless Network Configurations
- Video: Wireless Channels
- Video: Wireless Security
- Reading: Protocols & Encryption
- Video: Cellular Networking
- Video: Mobile Device Networks
- Reading: Supplemental Reading for Mobile Device Networks
- Practice Quiz: Wireless Networking
- Graded Assessments
Introduction to Connecting to the Internet
Video: Introduction to Connecting to the Internet
Summary of Internet Connectivity Technologies:
Key Points:
- The internet is vast and diverse, with a myriad of devices connecting with various functions.
- Familiar devices like computers and routers share the network with tablets, ATMs, cars, and more.
- While categorizing by physical and data link layers simplifies things, internet connectivity is more complex.
- Various technologies, as diverse as the devices themselves, connect people and devices to the internet.
- This module focuses on understanding these different connectivity technologies.
Learning Outcomes:
- Ability to describe various internet connectivity technologies.
- Definition of the components of wireless and cellular networking.
- Understanding the basics of wireless and cellular networking.
Relevance to IT Support Specialists:
- As IT support specialists, understanding these technologies is crucial for ensuring successful internet connectivity.
- A large part of the job involves troubleshooting and solving connection issues across diverse devices and technologies.
Overall, this module highlights the importance of understanding the diverse landscape of internet connectivity for IT support professionals.
Tutorial: Understanding Internet Connectivity Technologies
Welcome to this tutorial on understanding internet connectivity technologies, a foundational skill for IT support specialists. Through this journey, we’ll explore the diverse landscape of technologies that connect devices and people to the vast network we call the internet.
1. The Big Picture:
- Diversity of Devices: The internet isn’t just about computers and servers. It’s a melting pot of devices with varied functions, from tablets and smartphones to ATMs, industrial equipment, and even cars.
- Beyond Cat 5 and Ethernet: While categorizing connections by physical and data link layers simplifies things, the reality is more intricate. Understanding specific technologies is crucial.
2. Wired Connections:
- DSL (Digital Subscriber Line): A popular technology for home and business internet access, utilizing telephone lines to deliver data at high speeds.
- Cable Internet: Utilizing cable TV infrastructure to deliver high-speed internet access, often bundled with TV and phone services.
- Fiber Optic: The gold standard for wired connectivity, transmitting data through thin glass fibers at incredible speeds and with minimal interference.
3. Wireless Connections:
- Wi-Fi: The ubiquitous wireless technology connecting laptops, smartphones, tablets, and more to the internet through access points. Different Wi-Fi standards like 802.11ac and 802.11ax offer varying speeds and capabilities.
- Bluetooth: Used for short-range wireless communication between devices like headphones, keyboards, and smartphones for data transfer or hands-free communication.
- Cellular: The technology behind mobile internet access on smartphones and tablets, utilizing cellular towers to provide coverage across broad areas. Different generations like 4G and 5G offer varying speeds and capabilities.
4. Deeper Dive:
- Network Components: Explore the building blocks of networks, including routers, switches, modems, and firewalls, and their roles in directing traffic and ensuring secure connections.
- Troubleshooting: Learn how to diagnose and troubleshoot common connectivity issues related to cables, Wi-Fi signals, and equipment configurations.
- Emerging Technologies: Stay updated on cutting-edge technologies like satellite internet, mesh networking, and low-power wide-area networks (LPWAN) that are shaping the future of internet connectivity.
5. Practice Makes Perfect:
- Hands-on experience is key! Set up various network configurations, test different connectivity technologies, and troubleshoot simulated connection issues to solidify your understanding.
- Utilize online resources and tutorials to further explore specific technologies and deepen your knowledge.
Remember:
- The internet is constantly evolving, and so are its connectivity technologies. Staying informed and adaptable is crucial for IT support specialists.
- Understanding the diverse devices and technologies powering internet access empowers you to provide effective support and ensure seamless connectivity for everyone.
By embarking on this exploration of internet connectivity technologies, you’ll equip yourself with valuable knowledge and skills, making you a confident and competent IT support specialist in the ever-connected world.
This is just a starting point, feel free to expand on specific topics, add visuals, and personalize the tutorial to fit your audience and learning objectives. Good luck on your journey!
The internet is a vast and diverse place. Not only is it huge, the number of
different devices connected to it, can be just as staggering. And if we were to actually
describe all these devices, they’d have an almost
endless number of functions. The devices that connect to
the internet fall into familiar silos. Desktop and laptop computers,
servers and data centers, routers and switches that direct network traffic, etc. But this list also includes things like
tablets and cell phones, ATM’s, industrial equipment, medical devices, and even some
cars are now connected to the internet. The list could go on and on. It’s nice and simple to discuss everything
in terms of a basic physical layer made up of Cat five, or Cat six cables, and a
data link layer made entirely of Ethernet. But that’s not exactly how things
work when they actually connect to the internet. The technologies used to get people and devices connected are as different as
the people and devices themselves. By the end of this module, you’ll be able to describe various
internet connectivity technologies. You’ll also be able to define
the components of what and outline the basics of wireless and
cellular networking. These are the skills important
as an IT support specialist, because a big part of your job will
be making sure people can get online.
POTS and Dial-up
Video: Dial-up and Modems
Summary: History of Early Networking and Dial-Up
This passage dives into the early days of computer networking, before familiar technologies like Ethernet, TCP, and IP. It focuses on:
Precursors to Modern Networking:
- Prior to the late 1970s, primitive networks connected devices locally.
- Duke University students devised a bulletin board system using the existing Public Switched Telephone Network (PSTN).
- This system, Usenet, is a precursor to dial-up networks and still exists today.
Dial-Up Connections:
- Dial-up utilized PSTN, establishing connections by dialing phone numbers.
- Data transfer occurred via modems, converting computer data into audible signals for phone lines.
- Baud rates, measured in bits per second, were initially very low (110 bps in the 1950s).
- Dial-up reached peak speeds of 56 kbps in the 1990s before being superseded by broadband technologies.
Significance of Dial-Up:
- For decades, dial-up was the primary method for long-distance computer communication.
- While rare today, dial-up remains an option in some rural areas.
- Understanding dial-up history is crucial for IT professionals.
Modern Convenience:
- The passage concludes with appreciation for the convenience of separating phone and internet usage.
Tutorial: Exploring the Birthplace of the Internet: Early Networking and Dial-Up
This tutorial transports you back in time, uncovering the fascinating story of how computers began to talk to each other before the sleek world of Ethernet and broadband. Brace yourself for a nostalgic journey into the era of primitive connections and ear-splitting dial-up tones!
Chapter 1: Before the Big Bang:
- A Fragmented Landscape: Imagine a world where computers existed in isolation, unable to share information and collaborate. In the early days, networks were local affairs, connecting nearby devices through wires and clunky protocols.
- Pioneering Solutions: Meet the trailblazers! Researchers and universities developed ingenious, yet rudimentary, networking systems using teletype machines and dedicated cables. These early networks laid the groundwork for future innovations.
Chapter 2: Enter the Phone Lines:
- Eureka! A Familiar Backbone: In the late 1970s, a light bulb moment struck two Duke University students. They realized the existing telephone network, the PSTN, could be harnessed for long-distance data transfer. Thus, Usenet, a bulletin board system precursor to dial-up, was born.
- Dialing Up Connections: No fancy routers or cables here! Usenet relied on dialing phone numbers like making a regular call. The connection, however, transmitted not voices but data, converted into audible tones by trusty modems.
Chapter 3: The Slow Climb of Speed:
- Bits and Bauds: Imagine data trickling at a snail’s pace. Early modems could only manage a measly 110 bits per second in the 1950s! With time, technology marched on, increasing speeds to a blazing 300 bps by the Usenet era.
- Dial-Up Takes Flight: By the 1990s, the internet boom propelled dial-up into homes and businesses. Speeds reached a peak of 56 kbps, offering a taste of online exploration, albeit with ear-splitting dial tones and agonizing download times.
Chapter 4: The Rise and Fall of a Giant:
- Broadband Revolution: The late 1990s witnessed the dawn of broadband technologies like DSL and cable internet. Offering lightning-fast speeds compared to dial-up, they quickly gained dominance, relegating dial-up to a relic of the past.
- A Legacy Endures: While its reign is over, dial-up left its mark. Understanding its principles equips IT professionals with an appreciation for the evolution of networking and prepares them for future technologies.
Chapter 5: Hands-On Exploration:
- Simulate Dial-Up: Recreate the dial-up experience using online emulators and experience the slow grind of downloading a single image.
- Compare the Speeds: Measure the difference in download times between dial-up and contemporary broadband connections.
- Research Early Networks: Investigate historical projects like ARPANET and explore their contributions to the internet’s development.
Remember:
- The history of early networking is a story of ingenuity and adaptation. Understanding this journey helps us appreciate the incredible speed and connectivity we enjoy today.
- By exploring hands-on activities and research, you gain a deeper understanding of the fundamental principles that paved the way for the modern internet.
This tutorial serves as a starting point. Feel free to add visuals, videos, and interactive elements to enhance your learning experience. As you embark on this historical adventure, remember, the internet we know today wouldn’t exist without the humble beginnings of early networking and the ear-splitting symphony of dial-up connections!
As computer use grew over the
course of the 20th century, it became obvious that
there was a big need to connect computers to each other so that they
could share data. For years before Ethernet, TCP, or IP, were ever invented, there were computer networks
made up of technologies way more primitive than the
model we’ve been discussing. These early networking
technologies mostly focused on connecting devices within close physical proximity
to each other. In the late 1970s, two graduate students at Duke University
were trying to come up with a better way to connect computers at further distances. They wanted to share what was
essentially bulletin board material then a light
bulb moment went off. They realized the
basic infrastructure for this already existed, the public telephone network. The Public Switched
Telephone Network, or PSTN, is also sometimes referred to as the Plain Old Telephone
Service or POTS. It was already a pretty
global and powerful system by the late 1970s, more than 100 years after the
invention of the telephone. These Duke grad students
weren’t the first ones to think about using a phone
line to transmit data. But they were the first to
do it in a way that became somewhat permanent precursor to the dial-up networks to follow. The system they
built is known as Usenet and a form of it
is still in use today. At the time, different locations like colleges and
universities used a very primitive form of a dial-up connection to exchange a series of
messages with each other. A dial-up connection uses POTS
for data transfer and gets its name because
the connection is established by actually
dialing a phone number. If you used dial-up
back in the day, this noise might sound
familiar to you. For some of us, it
was like nails on a chalkboard as we waited to get connected
to the Internet. Transferring data across
a dial-up connection is done through
devices called modems. Modem stands for
modulator demodulator and they take data
that computers can understand and
turn them into audible wavelengths that can
be transmitted over POTS. After all, the telephone system
was developed to transmit voice messages or sounds
from one place to another. This is conceptually similar to how line coding is
used to turn ones and zeros into modulating electrical charges
across Ethernet cables. Early modems had
very low baud rates. A baud rate is a measurement of how many bits could be passed across a phone
line in a second. By the late 1950s, computers could generally only send each other data across a phone line at about
110 bits per second. By the time Usenet
was being developed, this rate had increased to
around 300 bits per second. By the time dial-up access
to the Internet became a household commodity
in the early 1990s, this rate had increased to
14.4 kilo bits per seconds. Improvements
continued to be made, but widespread adoption of
broadband technologies, dial-up Internet connectivity
is pretty rare today, but it hasn’t
completely gone away. In some rural areas, it might be the only
option still available. You might never run into a dial-up Internet connection
during your IT career, but it’s still important to know that for several decades, this technology represented
the main way computers communicated with each
other over long distances. I’m just glad we don’t
have to choose between using the phone or using
the Internet anymore.
Practice Quiz: POTS and Dial-up
Another term for POTS, or the Plain Old Telephone System, is _______________.
Public Switched Telephone Network.
Nice work! POTS and PSTN refer to the same thing.
A baud rate is a measurement of the number of ______________________.
bits that can be sent across a telephone line every second.
That’s right! A baud rate is equivalent to bits per second.
Broadband Connections
Video: What is broadband?
Broadband: The Internet Revolution You Probably Take For Granted
Imagine a world where downloading a cat picture took 20 minutes! Before broadband, that was reality. Now, blazing-fast connections deliver the internet experience we know and love.
Before broadband:
- Dial-up was king, painfully slow even for basic browsing.
- Businesses relied on expensive dedicated lines for internet access.
- Streaming, sharing photos, and online courses? Forget it!
Broadband changed everything:
- Always-on connections provided a massive speed boost.
- Complex websites and data-hungry applications became possible.
- Businesses and homes alike embraced the internet revolution.
Today, broadband shapes our lives:
- Streaming media, online learning, and social sharing thrive.
- Businesses operate globally with seamless communication.
- The internet plays a central role in work, entertainment, and education.
Broadband isn’t just technology; it’s a fundamental shift in how we connect and interact with the world. So next time you laugh at a meme in seconds, remember – broadband made it possible!
Broadband: The Internet Revolution You Probably Take For Granted: A Guided Exploration
Welcome to the world of broadband, the invisible force powering your online adventures!
This tutorial takes you on a journey to understand broadband, its impact, and why it matters so much.
Part 1: The Dial-Up Days (A Slow Trip Down Memory Lane)
- Remember the ear-splitting screech of a dial-up modem connecting? We’ll revisit the frustratingly slow, pixelated internet of the past.
- Discover how businesses scrambled to keep up with limited bandwidth using dedicated lines.
- Imagine a world where streaming a movie was a pipe dream and downloading a song took minutes. We’ll appreciate the patience people had!
Part 2: The Broadband Boom (From Snail’s Pace to Sonic Speed)
- Witness the arrival of broadband technologies like DSL, cable, and fiber optic, ushering in an era of lightning-fast internet speeds.
- Explore how broadband transformed websites from static pages to interactive portals, paving the way for social media, streaming services, and online learning.
- Dive into the impact on businesses, from global communication to remote work, showcasing how broadband revolutionized operations.
Part 3: Broadband in the Now (Your Daily Dose of Internet Goodness)
- Appreciate the diverse applications of broadband in our daily lives, from entertainment to education to shopping.
- Understand the role of broadband in connecting communities, bridging geographical gaps, and promoting global collaboration.
- Discuss the challenges of digital disparities and explore initiatives to ensure everyone has access to this essential tool.
Part 4: The Future of Broadband (Faster, Further, More?)
- Look ahead to emerging technologies like 5G and beyond, promising even faster speeds and wider connectivity.
- Explore the potential implications of the “Internet of Things” (IoT) where every device is connected, and the role broadband plays in making it a reality.
- Discuss ethical considerations and potential challenges arising from an ever-connected world.
Interactive Activities:
- Compare internet speeds using interactive tools to visualize the difference between dial-up and broadband.
- Design your own future-proof broadband network, considering needs and capabilities.
- Research global broadband access disparity and brainstorm solutions for bridging the digital divide.
By the end of this tutorial, you’ll:
- Have a deeper understanding of broadband technology and its historical significance.
- Appreciate the immense impact it has had on our lives, businesses, and communities.
- Be able to explain the importance of equitable access to broadband for future development.
- Look forward to the exciting possibilities of a hyper-connected future powered by advanced broadband technologies.
This is just a roadmap, feel free to add your own unique flair and personalize the activities to create an engaging and insightful learning experience for everyone!
Let’s dive into the fascinating world of broadband and discover why it deserves more than just a passing thought!
The term broadband has a few definitions,
in terms of internet connectivity, it’s used to refer to any connectivity
technology that isn’t dial-up internet. Broadband internet is almost always much
faster than even the fastest dial-up connections, and
refers to connections that are always on. This means that there are long lasting
connections that don’t need to be established with each use, they’re
essentially links that are always present. Broadband shaped today’s world. While the internet itself is
a totally amazing invention, it wasn’t until the advent of broadband
technologies, that its true potential for business and home users was realized. Long before people had broadband
connections at home, businesses, spent a lot of resources on them. Usually out of necessity, if you had
an office with more than a few employees, the bandwidth available by
a single dialogue connection would quickly be over
saturated by just a few users. By the mid 1990s, it had become pretty
common for businesses that needed internet access for their employees to use
various T-carrier technologies. T-carrier technologies were originally
invented by AT&T in order to transmit multiple phone
calls over a single link. Eventually, they also became common
transmission systems to transfer data much faster than any
dial-up connection could handle. After businesses got into the broadband
game, home use became more prevalent. As different aspects of the internet like
the World wide Web became more complex, they also required ever
increasing data transfer rates. In the days of dial-up, even a single image on a web page could
take many seconds to download and display. High resolution photos that you
can now take on a cellphone, would have required a long time to
download, and a lot of your patience. A single picture taken on a smartphone
today can easily be several megabytes in size. Two megabytes would
translate to 16,777,216 bits at a baud rate of
14.4 kilobits per second. That many bits would take
nearly 20 minutes to download. No one would have had time to download all
the hilarious cat images on the Internet back then. What a travesty! Without broadband Internet
connection technologies, the Internet as we know it today,
wouldn’t exist. We wouldn’t be able to stream music or
movies, or easily share photos. You definitely couldn’t be taking
an online course like this. T-carrier technologies require dedicated
lines which makes them more expensive. For this reason you usually only
see them in use by businesses. But other broadband solutions also exist
for both businesses and consumers.
Video: T-Carrier Technologies
T-carriers: Phone Lines Turned Data Speed Demons
Remember dial-up internet? Before broadband, businesses relied on T-carriers, an AT&T invention that squeezed 24 phone calls into one cable. Each call channel became a 64 kbps data lane, creating a 1.544 Mbps “T1” connection.
T1s:
- Originally for connecting phone companies.
- Became popular business internet option in the 90s.
- Faster than dial-up, but expensive and limited.
Evolution:
- Multiple T1s combined for higher speeds (e.g., 28 T1s in an “AT3” for 44.7 Mbps).
Today:
- T-carriers mostly replaced by cheaper, faster:
- Cable broadband for businesses.
- Fiber for internal network connections.
T-carriers: a key piece of internet history, even if they’re fading into the background now.
This summary captures the essence of T-carriers: their origin, function, evolution, and decline. It uses concise language and highlights key points like speed and cost comparisons. It also avoids overly technical jargon for a broader audience.
T-carriers: Phone Lines Turned Data Speed Demons – A Guided Tour
Get ready to zoom back in time, before cat videos and endless scrolling! We’re revisiting a hidden hero of the internet: T-carriers, the technology that transformed clunky phone lines into blazing-fast data highways.
Part 1: From Chattering Calls to Digital Data:
- Meet AT&T, the mastermind behind T-carriers. Imagine them whispering, “What if we crammed 24 phone calls into one cable?” And voila, the T1 was born!
- Say goodbye to individual copper wires for each call. T1 bundled them like spaghetti, making calls dance together on a single strand.
- But wait, there’s more! Each phone channel transformed into a 64-kilobit-per-second data lane. Not the fastest today, but a rocket compared to dial-up’s snail pace!
Part 2: T-carriers Take Flight: Business Takes Off:
- The 90s internet boomed, and businesses craved speed. Enter T1, the office hero! Faster than dial-up, it let downloads fly and emails zip.
- But hold on, T1 wasn’t cheap. Imagine paying for 24 phone lines at once! So, it became a VIP option for companies needing serious internet muscle.
Part 3: The Need for Speed: T-carriers Evolve:
- Businesses craved even more speed. AT&T answered with the T3: 28 T1s joined forces, creating a data monster with a 44.7 Mbps appetite!
- Imagine downloading an entire song in seconds! That was the T3’s magic.
Part 4: The Rise of the New Wave: T-carriers Fade But Don’t Forget:
- Today, faster, cheaper options like cable and fiber dominate. But remember, T-carriers paved the way! They were the stepping stones to our hyper-connected world.
- You might still find them lurking in some corners, but mostly as silent veterans, watching the new generation take over.
Interactive Activities:
- Compare data speeds: Simulate the difference between dial-up, T1, and fiber optic using online tools.
- Build your own T-carrier network: Design a basic network using T1 lines and explore potential limitations.
- Research T-carriers’ impact: Investigate how they revolutionized business communication in the 90s.
By the end of this tutorial, you’ll:
- Appreciate the ingenuity of T-carriers, the unsung heroes of early internet speed.
- Understand their historical significance and impact on business communication.
- Recognize the constant evolution of technology and the need for adaptation.
So, the next time you stream a movie in seconds, take a moment to remember the T-carriers, the phone lines that dared to dream of data and paved the way for our high-speed world!
This tutorial uses a conversational tone, interactive activities, and historical context to make learning about T-carriers engaging and informative. It caters to a general audience while maintaining technical accuracy.
Feel free to adjust the depth, complexity, and activities to suit your specific audience and desired learning outcomes.
T-carrier technologies were
first invented by AT&T, in order to provision
a system that allowed lots of phone calls to travel
across a single cable. Every individual phone
call was made over individual pairs of copper wire before Transmission System 1, the first T-carrier specification
called T1 for short. With the T1 specification, AT&T invented a way to carry up to 24 simultaneous
phone calls across a single piece
of twisted pair copper. Years later, the same technology was repurposed for
data transfers. Each of the 24
phone channels was capable of transmitting data
at 64 kilobits per second, making a single T1 line
capable of transmitting data at 1.544
megabits per second. Over the years, the phrase
T1 has come to mean any twisted pair copper
connection capable of speeds of 1.544
megabits per second. Even if it doesn’t
strictly follow the original Transmission
System 1 specification. Originally, T1 technology
was only used to connect different telecom company
sites to each other and to connect these companies to other telecom companies. But with the rise
of the internet as a useful business
tool in the 1990s, more and more businesses
started to pay to have T1 lines installed at their offices to have faster Internet
connectivity. More improvements
to the T1 line, were made by developing
a way of multiple T1s, to act as a single link. AT3 line is 28 T1s
all multiplexed, achieving a total
throughput speed of 44.736 megabits per second. You’ll still find T-carrier
technologies in use today, but they’ve usually been surpassed by other
broadband technologies. For small business offices, cable broadband or
fiber connections are now way more common, since they’re much
cheaper to operate. For inner ISP communications, different fiber
technologies have all replaced older
copper based ones.
Video: Digital Subscriber Lines
DSL: Breathing New Life into Phone Lines for Faster Internet
Before fiber and cable, DSL reigned king. Utilizing existing phone lines and their unused data capacity, DSL transformed slow dial-up into a faster, always-on internet experience.
Key facts:
- Leveraged phone lines: No need for new infrastructure, making it readily available.
- Faster than dial-up: Provided a significant speed boost, enabling smoother browsing and downloads.
- Always-on connection: No more dial-up tones, just constant internet access.
- Coexistence with phone calls: Shared the same line without interference, allowing simultaneous calls and internet use.
Types of DSL:
- ADSL (Asymmetric): Most common, offering faster downloads (ideal for home users) and slower uploads.
- SDSL (Symmetric): Equal upload and download speeds, used by businesses needing consistent data transfer.
- Other variations: HDSL offers higher speeds, while others cater to specific distances or bandwidth needs.
Today’s landscape:
- While still present, DSL has been surpassed by technologies like fiber and cable in terms of speed and availability.
- However, DSL remains a good option in areas lacking alternative high-speed connections.
Remember:
- Contact your ISP for specific details about available DSL options and speeds in your area.
This summary highlights the key points about DSL: its origins, advantages, different types, and current place in the internet landscape. It simplifies technical terms and focuses on the user experience, making it understandable for a general audience.
DSL: From Chattering Cords to Streaming Speed Demons – A Guided Tour
Remember the agonizing screech of a dial-up modem? Yep, those were the days! But before fiber and cable swooped in, there was a hero lurking in the background: DSL, the technology that breathed new life into your trusty phone lines, transforming them into blazing-fast data highways.
Part 1: Phone Lines Get Smart – Enter DSL:
- Imagine phone lines like chatty friends, carrying only voice calls. Then comes DSL, whispering, “Hey, they can carry way more data!”
- By using a different frequency range, DSL piggybacks on phone lines without interrupting your calls. It’s like having two conversations on the same line, but in different languages!
- Say goodbye to dial-up’s snail pace! DSL unleashes downloads and streaming without those agonizing pauses and pixelated nightmares.
Part 2: DSL in Action – Always On, Always Fast:
- No more waiting for that dial-up screech! DSL is an always-on connection, ready to serve up the internet whenever you need it.
- Movies, music, browsing – go wild! DSL empowers you to do more online, faster and smoother.
Part 3: Family of DSL Technologies:
- Just like families, DSL comes in different flavors:
- ADSL (Asymmetric): The cool older sibling, perfect for home users. Downloads fly while uploads chug along (think downloading movies vs. sharing vacation photos).
- SDSL (Symmetric): The even-steven sibling, offering equal upload and download speeds, ideal for businesses that send and receive lots of data.
- Other Variations: DSL has a quirky aunt named HDSL for super-fast speeds, and distant cousins that reach further or handle specific needs.
Part 4: DSL Today: A Legacy Hero:
- While fiber and cable are the new rockstars, DSL remains a reliable option, especially in areas where the flashy newcomers haven’t arrived.
- Think of DSL as the trusty steed that got you started on your internet adventures. It may not be the fastest anymore, but it paved the way and deserves a big thank you!
Interactive Activities:
- Compare internet speeds: Simulate dial-up vs. DSL vs. fiber connection speeds using online tools.
- Design your own DSL network: Choose an ADSL or SDSL connection based on your needs and research its capabilities.
- Explore DSL’s impact: Research how DSL transformed businesses and home internet experiences in the early 2000s.
By the end of this tutorial, you’ll:
- Appreciate the ingenuity of DSL, the technology that gave phone lines a digital makeover.
- Understand the different types of DSL and their applications.
- Recognize the evolution of internet technologies and their historical significance.
So, the next time you stream a movie without a hitch, remember the unsung hero, DSL! It may not be the flashiest anymore, but it’s a reminder that even the most familiar things can hold hidden potential for speed and progress.
Feel free to adjust the depth, complexity, and activities to suit your specific audience and desired learning outcomes. Happy exploring the world of DSL!
The public telephone network was a great option for getting people connected to
the Internet since it already had
infrastructure everywhere. For a long time, dial-up
connections were the main way that people connected to the
Internet from home. As people wanted faster and
faster Internet access, telephone companies
began to wonder if they could use the
same infrastructure, but in a different way. The research showed that
twisted pair copper used by modern telephone lines was
capable of transmitting way more data than what was needed
for voice to voice calls. By operating at a
frequency range that didn’t interfere
with normal phone calls, a technology known as digital
subscriber line or DSL, was able to send much
more data across the wire than traditional
dial-up technologies, and to top it all off, this allowed for normal
voice phone calls and data transfer to occur at the
same time on the same line. Like how dial-up uses modems, DSL technologies also
use their own modems. But more accurately
they’re known as DSLAMs or digital subscriber
line access multiplexers. Just like dial-up modems, these devices establish data connections
across phone lines, but unlike dial-up connections, they’re usually long running. This means that
the connection is generally established
when the DSLAM is powered on and isn’t torn down until the DSLAM
is powered off. There are lots of
different DSL available, but they all vary in
a pretty minor way. For a long time, the two
most common types of DSL were ADSL and SDSL. ADSL stands for Asymmetric
Digital Subscriber Line. ADSL connections feature
different speeds for outbound and incoming data. Generally, this means faster download speeds
and slower upload speeds. Home users rarely need to upload as much data
as they download, since home users are
mostly just clients. For example, when you open a
web page in a web browser, the upload or outbound
data is pretty small. You’re just asking for a certain webpage from
the web server. The download or inbound
data tends to be much larger since it will
contain the entire webpage, including all images
and other media. For this reason,
asymmetric lines often provide a similar
user experience for a typical home user, but at a lower cost. SDSL as you might
be able to guess, stands for Symmetric
Digital Subscriber Line. SDSL technology is
basically the same as ADSL, except the upload and
download speeds are the same. At one point, SDSL
was mainly used by businesses that hosted servers that needed to send
data to clients. As the general bandwidth
available on the Internet has expanded and as the cost of operation have come
down over the years, SDSL is now more common for both businesses
and home users. Most SDSL technologies
have an upper cap of 1.544 megabits a second
or the same as a T1 line. Further developments
in SDSL technology have yielded things like HDSL or High bit-rate
Digital Subscriber Lines. These are DSL technologies
that provision speeds above 1.544 megabits per second. There are lots of
other minor variations in DSL technology out in the wild offering different bandwidth options
and operating distances. These variations can be
so numerous and minor. It’s not really practical
to try to cover them here. If you ever need to know more
about a specific DSL line, you should contact the ISP that provides it
for more details.
Video: Cable Broadband
Summary of Cable Internet vs. Wireless Technologies:
Historical Shifts:
- Telephones & Computers: Wired communication evolving towards wireless (e.g., cell phones).
- Television: Wireless broadcasts (towers) transitioning to wired cable networks.
Cable TV’s Rise:
- Initially for remote areas lacking TV tower reception.
- Boosted by Cable Communications Policy Act (1984) deregulation.
- Grew to match public telephone system size by early 1990s.
Birth of Cable Internet:
- Leveraging existing cable infrastructure for data transmission.
- Utilizing different frequencies to coexist with TV signals.
- Offering “cable broadband” as high-speed internet access.
Shared Bandwidth vs. Dedicated Connections:
- Cable internet shares bandwidth among users in a specific area.
- DSL and dial-up offer dedicated connections from home/business to a central office.
- Sharing can lead to slower speeds during peak usage times on cable networks.
Cable Internet Components:
- Cable modem: Connects consumer network to the cable system.
- Cable modem termination system (CMTS): Links multiple cable connections to the ISP’s core network.
Key Takeaways:
- Cable internet utilizes existing cable TV infrastructure with shared bandwidth.
- Compared to dedicated connections like DSL, cable speeds may fluctuate during peak usage.
- Cable modems and CMTS manage the connection between homes and the ISP’s network.
Cable Internet vs. Wireless Technologies: A Beginner’s Guide
Have you ever wondered how the internet reaches your home? Is it magically beamed through the air, or does it travel through hidden wires like electricity? The answer depends on your chosen technology: cable internet or wireless technologies. Both options offer internet access, but they differ in their infrastructure, performance, and user experience. This tutorial will explore these differences and help you decide which option is best for you.
Wired Wonder: Cable Internet
Imagine your internet flowing through the same kind of cable that brings you the latest TV shows. That’s essentially how cable internet works. It utilizes the existing coaxial cables installed for cable TV, transmitting data alongside video signals. Here’s how it breaks down:
- Shared bandwidth: Multiple users in your neighborhood share the same cable line, like splitting lanes on a highway. This can lead to slower speeds during peak usage times (think evenings and weekends), but overall, cable internet offers high and reliable speeds.
- Dedicated modem: A cable modem at your home connects to the cable line and translates the data into signals your devices can understand.
- Constant connection: Unlike most wireless options, cable internet provides a reliable and consistent connection, making it ideal for activities like video conferencing, online gaming, and streaming HD content.
Airwaves Ahoy: Wireless Technologies
While cables offer stability, wireless technologies provide the freedom to connect from anywhere. Here are the two main wireless options:
- Cellular Network: Your trusty phone and data plan come into play here. Cellular networks use radio waves to transmit data, offering good speeds but often with data caps and limited coverage in rural areas.
- Satellite Internet: For those beyond the reach of traditional networks, satellite internet beams data from orbiting satellites. It offers widespread coverage, but suffers from high latency (slower response times) and can be affected by weather conditions.
Choosing Your Champion: Which Technology Reigns Supreme?
The best technology for you depends on your priorities and needs:
- For speed and reliability: If you crave consistent high speeds for streaming, gaming, and downloading, cable internet reigns supreme.
- For mobility and flexibility: If you prioritize connecting from anywhere, cellular networks or satellite internet might be your best bet, despite limitations.
- For cost-consciousness: While cable internet generally offers the best value for speed, budget-minded users might find cellular plans or satellite internet packages more affordable.
Beyond the Basics: Advanced Considerations
This tutorial is just the tip of the iceberg. Here are some additional factors to ponder:
- Data caps: Wireless plans often have data caps, which can lead to overage charges if exceeded.
- Security: Public Wi-Fi networks raise security concerns, while cable and satellite internet offer private connections.
- Future-proofing: Consider potential technology advancements and infrastructure upgrades in your area.
Remember, the perfect internet connection is a personal choice. Weigh your needs against the strengths and weaknesses of each technology, and make an informed decision to connect to the world exactly how you want.
This tutorial provides a basic framework for understanding cable internet and wireless technologies. Feel free to explore further to discover more advanced features, compare specific service providers, and ultimately choose the best option for your digital lifestyle.
The history of both the telephone
and computer networking tells a story that started with all communications
being wired. But the recent trend
is moving towards more and more of this
traffic becoming wireless. The history of television
follows the opposite path. Originally, all
television broadcasts were wireless transmissions sent out by giant
television towers and received by smaller
antennas in people’s homes. This meant you had
to be within a range of one of these television
towers to watch TV, just like you have to
be within range of a cell phone tower to use
your cell phone today. Starting in the late 1940s
in the United States, the first cable television
technologies were developed. At the time, they
mainly wanted to provide television
access to remote towns and rural homes that
were out of range of capabilities of television
towers at the time. Cable television continued to expand slowly over the decades. But in 1984, the Cable Communications Policy
Act was passed. This deregulated the cable
television business in the United States and caused a massive boom in
growth and adoption. Other countries all over
the globe soon followed. By the early 1990s, cable television
infrastructure in the United States was about the size of the public
telephone system. Not too long after that, cable providers
started trying to figure out if they
could join in on the massive spike in Internet growth that was
happening at the same time. Much like how DSL was developed cable companies quickly realized
that the coaxial cables, generally used by cable
television delivery into a person’s home were capable of transmitting
much more data than what was required
for TV viewing. By using frequencies that don’t interfere with
television broadcast, cable-based internet
access technologies were able to deliver high speed Internet access
across these same cables. This is the technology
we refer to when we say cable broadband. One of the main differences in how cable internet access
works when compared to other broadband solutions
is that cable is generally what’s known as a
shared bandwidth technology. With technologies like
DSL or even dial up, the connection from your home or business goes directly
to what’s known as a central office or
CO. A long time ago, the COs were actually offices staffed with
telephone operators who used a switchboard
to manually connect the caller
with a callee. As technology improved, the
COs became smaller pieces of automated hardware that handled these functions for the
telephone companies, but the name stayed the same. Technologies that connect
directly to a CO can guarantee a certain amount of
bandwidth available over that connection since
it’s point to point. On the flip side of this, are cable Internet
technologies which employ a shared bandwidth model. With this model in place, many users share a certain
amount of bandwidth until the transmissions
reach the ISPs core network. This could be anywhere from a single city block to entire subdivisions
in the suburbs. It just depends on how that area was originally wired for cable. Today, most cable operators have tried to upgrade
their networks to the point that end users might not always notice
this shared bandwidth. But it’s also still
common to see cable internet connections slow down during periods
of heavy use, like when lots of people
in the same region are using their Internet
connection at the same time. Cable Internet
connections are usually managed by what’s known
as a cable modem. This is a device that sits at the edge of a
consumer’s network and connects it to the cable
modem termination system or CMTS. The CMTS is what
connects lots of different cable connections
to an ISP’s core network.
Video: Fiber Connections
Summary of Fiber Internet and FTTX Options:
Key Points:
- Fiber optic cables are increasingly used for internet connections due to their high speeds and long transmission distances compared to copper cables.
- FTTX: Fiber To The X (where X can be various points) represents different configurations for bringing fiber optic connections closer to end users.
- FTTN: Fiber To The Neighborhood – Fiber reaches a central cabinet, then copper/coax connects individual homes.
- FTTB/FTTB/FTTP: Fiber To The Building/Business/Premises – Fiber reaches the building, then copper connects individual units.
- FTTH: Fiber To The Home – Fiber directly reaches individual homes/apartments.
- ONT: Optical Network Terminator – Converts data between fiber and copper networks.
Benefits of Fiber:
- High speeds: Ideal for bandwidth-intensive activities like streaming, gaming, and video conferencing.
- Long distances: Transmission over miles with minimal signal degradation.
- Reliability: Less susceptible to interference and signal loss compared to copper.
Considerations:
- Cost: Installation and maintenance of fiber infrastructure are higher than copper.
- Availability: Not all areas have access to fiber optic networks yet.
Overall, FTTX technologies offer faster, more reliable internet access compared to traditional copper-based connections. The specific version (FTTN, FTTB, FTTH) deployed depends on cost, infrastructure, and target user density.
Fiber Internet and FTTX Options: A Beginner’s Guide
Tired of lagging downloads and choppy video calls? Enter fiber internet, the champion of speed and reliability in the internet world. But wait, there’s more! Fiber isn’t just one choice, it’s a family of options called FTTX, each delivering fiber closer to your doorstep. Let’s explore this fiber-tastic world!
Why the Fiber Frenzy?
Imagine data zipping through your internet connection like a bullet train, not a crawling snail. That’s the magic of fiber optic cables. Unlike copper wires, they use light pulses to transmit data, resulting in:
- Blazing speeds: Download movies in seconds, stream 4K content effortlessly, and conquer online gaming with minimal lag.
- Long-distance champion: Say goodbye to signal degradation! Data travels miles on fiber without needing boosters, making it ideal for rural areas.
- Reliable rockstar: No more dropouts or interference. Fiber is immune to electromagnetic noise and weather fluctuations, offering rock-solid connectivity.
FTTX: Fiber Reaching for Your Home
But fiber doesn’t just stop at the ISP’s headquarters. FTTX, or Fiber To The X, brings the fiber love closer to your home in various ways:
- FTTN (Fiber To The Neighborhood): Fiber reaches a central hub serving an entire neighborhood. From there, traditional copper or coax cables handle the final leg to your home. Think of it as a high-speed highway leading to your local street.
- FTTB/FTTB/FTTP (Fiber To The Building/Business/Premises): Fiber gets even closer, reaching your apartment building or office complex. Inside the building, copper takes over to connect individual units. Imagine the highway reaching your building but not quite your apartment door.
- FTTH (Fiber To The Home): The holy grail of FTTX! Fiber runs directly to your house or apartment, offering the ultimate speed and reliability experience. It’s like having a private bullet train delivering data straight to your living room.
Choosing Your Fiber Champion:
So, which FTTX option is the right fit for you? Here’s a quick guide:
- Speed demon: FTTH reigns supreme, but FTTB/FTTP is also a strong contender.
- Cost-conscious: FTTN might be the most affordable, but expect slightly slower speeds.
- Availability: Check with your local ISPs to see which options are available in your area.
The Fiber Finale:
Beyond speed, fiber unlocks a world of possibilities, from smart homes to virtual reality. While cost and availability might still be hurdles, FTTX represents the future of internet connectivity. So, keep an eye out for the fiber revolution coming to your neighborhood!
Bonus Tip: Remember, the point where fiber hands off to copper is called the Optical Network Terminator (ONT). Think of it as the translator between the fiber language and the copper lingo your devices understand.
This tutorial provides a basic understanding of fiber internet and FTTX options. Feel free to explore further to compare specific ISP offerings, weigh cost vs. speed, and ultimately choose the fiber path that takes your internet experience to the next level!
The core of the Internet has long used fiber for
its connections, both due to higher speeds
and because fiber allows for transmission to travel much further without
degradation of the signal. Remember that fiber
connections use light for data transmission instead
of electrical currents. The absolute maximum distance an electrical signal
can travel across a copper cable before it
degrades too much and requires a repeater
is thousands of feet. But certain implementations
of fiber connections can travel many miles
before signal degrades. Producing and laying fiber is a lot more expensive than
using copper cables. For a long time, it was a technology
you only saw in use by ISPs within their
core networks, or maybe for use
within data centers. But in recent years, it’s become popular to
use fiber to deliver data closer and closer
to the end-user. Exactly how close
to the end-user can vary a ton across
implementations, which is why the phrase
FTTX was developed. FTTX stands for fiber to the x, where the x can be
one of many things. We’ll cover a few of
these possibilities. The first term you
might hear is FTTN, which means fiber to
the neighborhood. This means that
fiber technologies are used to deliver data to a single physical cabinet that serves a certain amount
of the population. From this cabinet,
twisted pair copper or coax might be used for the
last length of distance. The next version you might
come across is FTTB. This stands for fiber
to the building, fiber to the business, or even fiber to the basement. Since this is generally where cables to buildings
physically enter. FTTB is a setup where fiber technologies are used for data delivery to an
individual building. After that, twisted pair
copper is typically used to actually connect
those inside of the building. A third version you
might hear is FTTH, which stands for
fiber to the home. This is used in instances
where fiber is actually run to each individual residence in a neighborhood or
apartment building. FTTH and FTTB may both also
be referred to as FTTP, fiber to the premises. Instead of a modem, the demarcation point for
fiber technologies is known as optical network
terminator or ONT. ONT converts data from protocols the fiber
network can understand to those that more traditional twisted pair copper
networks can understand.
Reading: Supplemental Reading for Broadband Protocols
Reading
Broadband Protocols
Broadband communications require a set of instructions, rules, and communication to various network layer protocols to support operation. Point to Point Protocol (PPP) for broadband communications is a set of instructions used to transmit data between two directly connected devices. This reading will cover the definitions, structures, and details of Point to Point Protocol (PPP) and Point to Point Protocol over Ethernet (PPPoE).
Point to Point Protocol (PPP)
Point to Point Protocol (PPP) is a byte-oriented protocol broadly used for high-traffic data transmissions. PPP functions at the data link layer, which transmits data between two devices on the same network. PPP is designed to link devices, so the endpoints do not need to be the same vendor to work.
Configuring PPP
When configuring PPP for the devices on your network, you have the following options:
- Multilink connection provides a method for spreading traffic across multiple distinct PPP connections.
- Compression increases throughput by reducing the amount of data in the frame.
- Authentication occurs when connected devices exchange authentication messages using one of two methods:
- Password Authentication Protocol (PAP) is a password authentication option that is hard to obtain plaintext from if passwords are compromised.
- Challenge Handshake Authentication Protocol (CHAP) is a three-way handshake authentication that periodically confirms the identity of the clients.
- Error detection includes Frame Check Sequence (FCS) and looped link detection.
- Frame Check Sequence (FCS) is a number included in the frame calculated over the Address, Control, Protocol, Information, and Padding fields used to determine if there has been data loss during transmission.
- Looped link detection in PPP detects looped links using magic numbers. A magic number is generated randomly at each end of the connection, so when a looped message is received, the device checks the magic number against its own. If the line is looped, the number will match the sender’s magic number, and the frame is discarded.
Sub-protocols for PPP
In addition, two sub-protocols for PPP occur on the network layer when the network decides what physical path the information will take. These protocols use the configuration options you set for the endpoints.
- Network Control Protocol (NCP) will be used to negotiate optional configuration parameters and facilities for the network layer. There is an NCP for each higher layer protocol used by the PPP.
- Link Control Protocol (LCP) initiates and terminates connections automatically for hosts. It automatically configures the interfaces at each end like magic numbers and selecting for optional authentication.
Data is sent using PPP in a frame. A frame is a collection of data sent to a receiving point.
PPP uses the following frame format:
- Flag is a single byte and lets the receiver know this is the beginning of the frame. Depending on the encapsulation, there may or may not be a start flag or an end flag.
- Address is a single byte, and it contains the broadcast address.
- Control is a single byte required for various purposes but also allows a connectionless data link.
- Protocol varies from one to three bytes which identify the network protocol of the datagram.
- Data is where the information you need to transmit is stored and has a limit of 1500 bytes per frame.
- Frame check sequence (FCS) is 2 or 4 bytes and is used to verify data is intact upon receipt at the endpoint.
When the data is packaged in a frame, it undergoes encapsulation.
Encapsulation
Encapsulation is the process by which each layer takes data from the previous layer and adds headers and trailers for the next layer to interpret.
These frames are sent to the other endpoint where the process is reversed, which is called De-encapsulation.
PPP can get expensive and hard to manage due to all the direct cables and links required. In this case, you may want to switch to a multi-access Ethernet solution. Point to Point Protocol over Ethernet is a protocol made to bridge the gap between directly connected endpoints and other devices.
Point to Point Protocol over Ethernet (PPPoE)
Point to Point protocol over Ethernet (PPPoE) is a way of encapsulating PPP frames inside an ethernet frame. PPPoE is a solution for tunneling packets over the DSL connection service provider’s IP network and from there to the rest of the Internet. Like PPP, PPPoE provides authentication, encryption, and compression, though it primarily uses Password Authentication Protocol (PAP) for authentication.
A common use case is PPPoE using DSL services where a PPPoE modem-router connects to the DSL service or when a PPPoE DSL modem is connected to a PPPoE-only router using an Ethernet cable.
PPP is strictly point-to-point, so frames can only go to the intended destination. PPPoE requires a new step because ethernet connections are multi-access enabled (every node connects to another). This requires an additional step called the discovery stage. The discovery stage establishes a session ID to identify the hardware address. This stage ensures data gets routed to the correct place.
PPPoE is an encapsulation of PPP inside an ethernet frame. PPPoE retains the same architecture, configuration options, and frame data as PPP but with one extra layer of ethernet encapsulation.
Key takeaways
Broadband internet requires several protocols to make sure different connected devices can communicate with each other.
- Point to Point Protocol (PPP) encapsulates data, so any PPP configured devices can communicate without issue.
- Point to Point over Ethernet (PPPoE) is an extra layer of encapsulation for standard PPP frames, to enable data to be sent over ethernet connections.
Practice Quiz: Broadband Internet
T1 is short for __________.
T1 is short for __________.
Correct! T1 is short for Transmission System 1.
How fast is a T1 line?
1.544 Mb/sec
You nailed it! A T1 communicates at speeds of 1.544 Mb/sec.
Select all statements that are true of cable internet connections.
They’re broadband connections.
Nice job! A cable connection is a broadband connection.
They’re shared bandwidth connections.
Great work! A cable connection is a shared bandwidth connection.
WANs
Video: Wide Area Network Technologies
Setting up a small company network:
- Non-writable IP address space chosen for internal network due to limited resources.
- Router configured with NAT for internet access.
- Local DNS and DHCP servers set up for easier configuration.
- VPN server established for remote access by mobile employees.
Company growth and WAN implementation:
- New office opened in another city, requiring wider network reach.
- WAN technology used to connect both offices transparently (like one LAN).
- ISP provides connectivity between offices through the internet.
- WAN protocols transport data between sites similar to internet core protocols.
Key points:
- WANs connect geographically dispersed LANs into a single network.
- ISPs provide data links for WAN communication.
- WAN protocols handle data transportation at the data link layer.
Let’s say that you’re in charge of the
network as the sole IT support specialist at a small company. At first, the business only has a few employees
with a few computers in a single office. You decide to use nonwritable
address space for the internal IPS because IP
addresses are scarce and expensive. You set up a router and
configure it to perform NAT. You can figure a local DNS server and a DHCP server to make
network configuration easier. And of course for all of this to really
work, you sign a contract with an ISP to deliver a link to the Internet to this
office, so your users can access the web. Now imagine the company grows. You’re using nonwritable address space for
your internal IPs, so you have plenty of space to grow there. Maybe some sales people need to connect to
resources on the land you’ve set up while they’re on the road. So you configure a VPN server and make sure the VPN server is
accessible via port forwarding. Now, you can have employees from all over
the world connect to the office LAN. Business is good and
the company keeps growing. The CEO decides that it’s time to open
a new office in another city across the country. Suddenly, instead of a handful of
salespeople requiring remote access to the resources on your network, you have
an entire second office that needs it. This is where Wide Area Networks or
WAN technologies come into play. Unlike a LAN or a Local Area Network,
WAN stands for Wide Area Network. A Wide Area Network acts
like a single network, but spans across multiple physical locations. WAN technologies usually require that
you contract a link across the Internet with your ISP. This ISP handle sending your
data from one site to the other. So it could be like all of your computers
are in the same physical location. A typical LAN setup has a few sections. Imagine one network of computers
on one side of the country and another network of computers on the other. Each of those networks ends at
a demarcation point which is where the ISPs Network takes over. The area between each
demarcation point and the ISP’s actual core network
is called a local loop. This local loop would be
something like a T carrier line or a high speed optical connection to
the provider’s local regional office. From there, it would connect out
to the ISP’s core network and the Internet at large. WANs work by using a number of different
protocols at the data link layer to transport your data from
one site to another. In fact, these same protocols
are what are sometimes at work at the core of the Internet itself
instead of our more familiar ethernet. Covering all the details of these
protocols is out of the scope of this course.
Reading: Supplemental Reading for WAN Protocols
Reading
Wan Protocols V2
In this reading, you will continue learning about the various components of Wide Area Networks (WANs). WAN configurations are important for IT Support professionals to understand when working with the geographically dispersed networks of large organizations. WANs can be connected through the Internet with connections provided by Internet Service Providers (ISPs) in each locale. Regional WANs can also be formed by connecting multiple Local Area Network (LAN) sites using equipment and cables leased from a regional ISP. Security for WANs across the public Internet can be configured through Virtual Private Networks (VPNs).
Physical versus software-based WANs
- WAN router: Hardware devices that act as intermediate systems to route data amongst the LAN member groups of a WAN (also called WAN endpoints) using a private connection. WAN routers may also be called border routers or edge routers. These routers facilitate an organization’s access to a carrier network. WAN routers have a digital modem interface for the WAN, which works at the OSI link layer, and an Ethernet interface for the LAN.
- Software-Defined WAN (SD-WAN): Software developed to address the unique needs of cloud-based WAN environments. SD-WANs can be used alone or in conjunction with a traditional WAN. SD-WANs simplify how WANs are implemented, managed, and maintained. An organization’s overall cost to operate a cloud-based SD-WAN is significantly less than the overall cost of equipping and maintaining a traditional WAN. One of the ways that SD-WANs help reduce operational costs is by replacing the need for expensive lines leased from an ISP by linking regional LANs together to build a WAN.
WAN optimization
There are multiple techniques available to optimize network traffic and data storage on a WAN:
- Compression: Reducing file sizes to improve network traffic efficiency. There are many compression algorithms available for text, image, video, etc. The sender and the receiver will need apps that offer the same compression/decompression algorithm to encode and decode the compressed files.
- Deduplication: Prevents files from being stored multiple times within a network to avoid wasting expensive hard drive space. One copy of the file is kept in a central location. All other “copies” are actually file pointers to the single copy of the file. This saves valuable hard drive space, makes performing data backups more efficient, and reduces the amount of time needed to recover from data loss disasters.
- Protocol Optimization: Improves the efficiency of networking protocols for applications that need higher bandwidth and low latency.
- Local Caching: Storing local copies of network and internet files on a user’s computer to reduce the need to resend the same information across the network every time the file is accessed. Some WAN optimization products can cache shared files at one physical LAN location when groups of employees at the location tend to request the same set of files frequently. Traffic Shaping: Optimizing network performance by controlling the flow of network traffic. Three techniques are commonly used in traffic shaping:
- bandwidth throttling – controlling network traffic volume during peak use times
- rate limiting – capping maximum data rates/speeds
- use of complex algorithms – classifying and prioritizing data to give preference to more important traffic (e.g., an organization might want to prioritize private LAN-to-LAN traffic within the organization’s WAN and give a lower priority to employees accessing the public Internet).
WAN Protocols
WAN Internet Protocols are used in conjunction with WAN routers to perform the task of distinguishing between a private LAN and the related public WAN. Several WAN protocols have been developed over the decades for this task, as well as other purposes, including:
- Packet switching: A method of data transmission. In packet switching, messages are broken into multiple packets. Each packet contains a header that includes information on how to reassemble the packets, as well as the intended destination of the packets. As a measure to prevent data corruption, the packets are triplicated. The triplicated packets are sent separately over optimal routes through the internet. Then, once the packets reach their destination, they are reassembled. The triplicate copies are compared with one another to detect and correct any data corruption that occurred during transmission (at least two of the three copies should match). If the data cannot be reassembled and/or data corruption is evident in all three copies, the destination will make a request to the origin to resend the packet.
- Frame relay: Also a method of data transmission. Frame relay is an older technology originally designed for use on Integrated Services Digital Network (ISDN) lines. However, the technology is now used in other network interfaces. Frame relays are used to transmit data between endpoints of a WAN through a packet switching method that works at the OSI data link and physical layers. A fast data communications network, called a Frame Relay Network, is used to transport data packets in frames. The reliability of Frame Relay Networks minimizes the need for error checking. The frames include routing address information for the destination.
- Permanent Virtual Circuits (PVCs) – Used for long-term data connections. Stays open even when data is not being transmitted.
- Switched Virtual Circuits (SVCs) – Used in temporary session connections for sporadic communications.
- Asynchronous Transfer Mode (ATM): ATM is an older technology that encodes data using asynchronous time-division multiplexing. The encoded data is packaged into small, fixed-sized cells. ATM can send the cells over a long distance, which makes it useful for WAN communications. ATMs uses routers as end-points between ATM networks and other networks. ATM technology has been replaced for the most part by Internet Protocol (IP) technologies.
- High Level Data Control (HLDC): An encapsulation or data link protocol that delivers data frames through a network. The frames include multiple fields that can hold information about start and end flags, controls, Frame Check Sequence (FCS), and protocol used. HLDC was developed to use multiple protocols to replace Synchronous Data Link Control (SLDC), which used only one protocol. HLDC includes error correction, flow control, and data transmission through polling. HLDC has three modes to define the relationship between two devices, or nodes, during communications:
- Normal Response Mode (NRM) – Primary node must give permission to the secondary node to transmit.
- Asynchronous Response Mode (ARM) – Primary node allows the secondary node to initiate communication.
- Asynchronous Balanced Mode (ABM) – Both nodes can act as either the primary or secondary nodes. They can each initiate communications without permission.
- Packet over Synchronous Optical Network (SONET) or Synchronous Digital Hierarchy (SDH): A communication protocol used for WAN transport. The SONET or SDH communication protocols define how point-to-point links communicate over fiber optics cables.
- Multiprotocol Label Switching (MPLS): A technique for optimizing network routing. MPLS replaces inefficient table lookups for long network addresses with short path labels. These labels direct data from node to node.
Video: Point-to-Point VPNs
WAN vs. Point-to-Point VPNs:
- WANs: Ideal for transporting large amounts of data across many sites, offering high speed but at a higher cost.
- Point-to-Point VPNs: More cost-effective alternative for companies with cloud-based services and fewer data transfer needs.
- Cloud services: Reduce dependency on internal infrastructure, making high-speed WAN connections less necessary.
- Point-to-Point VPNs: Create secure tunnels between sites, similar to individual VPNs but managed by network devices.
Key points:
- Consider business needs and data transfer requirements when choosing between WANs and Point-to-Point VPNs.
- Cloud solutions can reduce network infrastructure dependency and cost.
- Point-to-Point VPNs offer secure site-to-site communication without individual user connections.
A popular alternative to WAN
technologies are point to point VPNS. WAN technologies are great for when you
need to transport large amounts of data across lots of sites because WAN
technologies are built to be super fast business cable or
DSL line might be way cheaper. But it just can’t handle the load
required in some of these situations. But over the last few years,
companies have been moving more and more of their internal
services into the cloud. We’ll cover exactly what this means later. But for now it’s enough to know that
the cloud lets companies outsource all or part of their different pieces of
infrastructure to other companies to manage. Let’s take the concept of email. In the past, a company would have to run
their own email server if they wanted an email presence at all. Today, you could just have a cloud hosting
provider host your email server for you. You could even go a step further and
use an email as a service provider, then you wouldn’t have an email
server at all anymore. You just have to pay another company to
handle everything about your email service with these types of cloud
solutions in place. Lots of businesses no
longer require extreme, high speed connections
between their sites. This makes the expense of a WAN
technology totally unnecessary. Instead, companies can use point to
point VPNS to make sure that they’re different sites can still
communicate with each other. A point to point VPN also called
a site to site VPN establishes a VPN tunnel between two sites. This operates a lot like the way that
a traditional VPN setup lets individual users act as if they’re on
the network they’re connecting to. It’s just that the VPN tunneling logic
is handled by network devices at either side so that users don’t all have
to establish their own connections.
Practice Quiz: WANs
WAN stands for ______________.
Wide Area Network.
Wohoo! WAN stands for Wide Area Network.
In a WAN, the area between a demarcation point and the ISP’s core network is known as ___________.
a local loop
Correct! A local loop is the name for the area between a demarcation point and an ISP’s network.
A point-to-point VPN is also known as a ______________.
site-to-site VPN
You got it! A point-to-point VPN can also be referred to as a site-to-site VPN.
Wireless Networking
Video: Introduction to Wireless Networking Technologies
Wireless Networking Basics: Dive into Wi-Fi and Beyond
Tired of cables? Wireless networking lets your devices connect like magic. This lesson dives into the basics:
- How it works: Radio waves carry data between devices and access points.
- Standards: 802.11 defines Wi-Fi specifications (b, g, n, ac are common ones). Each version improves speed or capacity.
- Network types: Infrastructure uses access points, ad hoc connects devices directly.
- Channels: Like radio stations, networks operate on specific frequencies (2.4 GHz, 5 GHz).
- Frame structure: Think of it as a data packet with addresses, control info, and the actual data.
By the end, you’ll understand the core principles of wireless communication and be ready to explore Wi-Fi in more detail.
Key takeaways:
- Wireless networks use radio waves for data transfer.
- Different 802.11 standards offer varying speeds and capabilities.
- Access points connect devices to wired networks in infrastructure mode.
- Wireless networks operate on specific frequency bands.
- 802.11 frames contain information for routing and error checking.
Ready to ditch the cables and go wireless? This lesson is your starting point!
Wireless Networking Basics: Dive into Wi-Fi and Beyond
Welcome to the fascinating world of wireless networking! In this tutorial, we’ll ditch the cables and explore the magic behind connecting devices without a single wire. Get ready to understand how signals dance through the air, how devices talk to each other, and how Wi-Fi makes it all happen.
Let’s start with the basics:
- Wireless Communication: Imagine tiny radio waves carrying whispers of data between your phone and the internet. That’s wireless communication in a nutshell! No more tangled cables, just invisible waves carrying information between devices and access points, which act as bridges to the wired world.
- Meet the Standards: Just like languages need rules, wireless networks have protocols. The most common set is called 802.11, with different versions like b, g, n, and ac. Each version improves on speed, capacity, and efficiency. Think of them as different Wi-Fi “dialects” with varying capabilities.
- Network Types: There are two main ways devices connect wirelessly: infrastructure and ad hoc. In infrastructure mode, devices talk to each other through access points (think Wi-Fi hotspots). In ad hoc mode, devices connect directly to each other, creating a temporary network without needing an access point.
- Channel Surfing: Just like radio stations, wireless networks operate on specific frequency bands like 2.4 GHz and 5 GHz. These are like highways for data, with multiple channels within each band to avoid traffic jams. Choosing the right channel is crucial for good performance and avoiding interference.
- Frame by Frame: Picture data traveling in tiny containers called frames. These frames have specific fields for addresses, control information, and the actual data itself. It’s like a tiny envelope with everything needed to get the information to the right place.
Now, let’s get hands-on!
- Identify your Wi-Fi network: Look for the network name (SSID) on your devices. It’s often named after the location or owner.
- Connect to the internet: Enter the password for your chosen network and enjoy wireless freedom!
- Explore advanced features: Many devices offer settings for network selection, channel choice, and even prioritizing specific devices for better performance.
- Troubleshooting tips: Can’t connect? Check for signal strength, try restarting your devices, or consult your router’s manual for troubleshooting steps.
Bonus learning:
- Security matters! Understand WPA2 encryption to protect your wireless network from unauthorized access.
- Go beyond Wi-Fi: Explore other wireless technologies like Bluetooth and cellular networks to understand how connectivity extends beyond just Wi-Fi.
Remember, wireless networking is a vast and exciting world. This tutorial is just the beginning! Use it as a springboard to explore, experiment, and unlock the full potential of connecting devices without wires. Get ready to say goodbye to cable mess and hello to a world of seamless wireless communication!
Additional resources:
- The Wi-Fi Alliance: https://www.wi-fi.org/
- Network Protocol Guide: https://ntrs.nasa.gov/api/citations/19830006723/downloads/19830006723.pdf
- HowStuffWorks – Wireless Networking: https://www.howstuffworks.com/
In today’s world, fewer and
fewer devices are weighed down by physical cables in order to connect
to computer networks. With so many portable
computing devices in use, from laptops to tablets
to smartphones. We’ve also seen the rise
of wireless networking. Wireless networking is
exactly what it sounds like a way to network
without wires. By the end of this lesson, you’ll be able to describe the basics of how wireless
communication works. You’ll know how to
tell the difference between infrastructure
networks and ad hoc networks. You’ll be able to explain
how wireless channels, how wireless networks operate, and you’ll understand the basics of wireless security protocols. The most common specifications for how wireless
networking devices should communicate are defined by
the IEEE 802.11 standards. This set of specifications, also called the 802.11 family make-up the set of
technologies we call Wi-Fi. Wireless networking
devices communicate with each other
through radio waves. Different 802.11
standards generally use the same basic protocol, but might operate at
different frequency bands. A frequency band is
a certain section of the radio spectrum
that’s been agreed upon to be used for
certain communications. In North America, FM
radio transmissions operate between 88
and 108 megahertz. This specific frequency band is called the FM broadcast band. Wi-Fi networks operate on a few different frequency bands, most commonly the 2.4 gigahertz
and 5 gigahertz bands. There are lots of
802.11 specifications, including some that exists just experimentally or for testing. The most common
specifications you might run into are 802.11b, 802.11a, 802.11g,
802.11n and 802.11ac. We won’t go into detail
about each one here. For now, just know that we’ve listed these in the
order they were adopted. Each newer version of the 802.11 specifications has generally
seen some improvement, whether it’s higher
access speeds or the ability for more devices to use the network
simultaneously. In terms of our
networking model, you should think of 802.11
protocols as defining how we operate at both the physical and the
data link layers. An 802.11 frame has
a number of fields. The first is called the
frame control field. This field is 16 bits long
and contains a number of sub-fields that are
used to describe how the frame itself
should be processed. This includes things like what version of the
802.11 was used. The next field is called
a duration field. It specifies how long
the total frame is. The receiver knows how long it should expect to have to
listen to the transmission. After this are four
address fields. Let’s take a moment to
talk about why there are four instead of the normal two. We’ll discuss different types of wireless network
architectures in more detail later
in this lesson. But the most common setup includes devices
called access points. A wireless access
point is a device that bridges the wireless and
wired portions of a network. A single wireless
network might have lots of different access
points to cover a large area. Devices on a wireless
network will associate with a
certain access point. This is usually the one
they’re physically closest to. But it can also be determined by all
sorts of other things like general signal strength
and wireless interference. Associations isn’t
just important for the wireless device to talk
to a specific access point. It also allows for
incoming transmissions to the wireless device to be sent
by the right access point. There are four address fields, because there needs to
be room to indicate which wireless access point should be processing the frame. So we’d have our normal
source address field, which would represent
the MAC address of the sending device. But we’d also have the intended destination
on the network, along with a receiving address
and a transmitter address. The receiver address would be the MAC address of the access point that
should receive the frame. The transmitter address would be the MAC address of whatever has just transmitted the frame. In lots of situations, the destination and receiver
address might be the same. Usually the source and transmitter addresses
are also the same, but depending on exactly how a specific wireless network
has been architected, this won’t always be the case. Sometimes wireless access points will relay these frames
from one another. Since all addresses in 802.11
frame are MAC addresses, each of those four fields
is six bytes long. In-between the third and
fourth address fields, you’ll find the
sequence control field. The sequence control
field is 16 bits long and mainly contains
a sequence number used to keep track of ordering the frames after this is
the data payload section, which has all of the data of the protocols further
up the stack. Finally, we have a frame
check sequence field, which contains a checksum used for a cyclical redundancy check, just like how Ethernet does it.
Reading: Wi-Fi 6
Reading
Wi-Fi 6, formerly known as 802.11ax, is one of the largest leaps in Wi-Fi technology since its introduction. This reading will introduce you to the benefits and technology used in Wi-Fi 6.
Benefits of Wi-Fi 6
The Wi-Fi 6 network protocol is faster and more efficient for networks with a larger number of connected devices.
Key benefits of Wi-Fi 6 technology include:
- Higher data rates: Band splitting or increased client group sizes allow for uploading and downloading greater amounts of data.
- Increased band capacity: Band utilization increased from 80mHz to 160mHz, creating a faster connection from the router to connected devices.
- Better performance: The input/output streams are doubled from the 4 by 4 allowed by Wi-Fi 5, to 8 by 8 in Wi-Fi 6, allowing more clients to be grouped.
- Improved power efficiency: Devices only connect to the network when sending or receiving data, increasing battery life.
Capabilities of Wi-Fi 6
Wi-Fi 6 technology improves functionality and connectivity.
- Channel sharing for better efficiency and shortens the time it takes to send data once a user gives the send command.
- Target Wake Time (TWT) improves the network speed and increases battery life by allowing battery-powered devices to sleep when not in use.
- Multi-user MIMO (Multiple Input, Multiple Output) wireless technology allows more data to be transferred simultaneously. This ability increases capacity and efficiency in high bandwidth applications like voice calls or video streaming.
- 160 MHz channel utilization gives more space for transmitting data and increases bandwidth capability.
- 1024 Quadrature amplitude modulation combines two signals into a single channel, so more data is encoded.
- Orthogonal Frequency Division Multiple Access (OFDMA) allows for bandwidth splitting, which is assigned dynamically by the access point to separate devices.
- Transmit beamforming is a technique that sends signals that allow for more efficient higher data rates by targeting each connected device.
Wi-Fi 6E extends Wi-Fi 6 into 6 GHz
Wi-Fi 6E is an additional certification for Wi-Fi 6 that has all of the features of Wi-Fi 6 but adds a third 6 GHz band. Wi-Fi 6E has more channels to use to broadcast, including 14 more 80MHz channels and seven more 160MHz channels. The additional channels allow networks with Wi-Fi 6E for better performance even when streaming high-definition video or using virtual reality devices.
Key takeaways
- Wi-Fi technology will continue to change as the needs of companies and users change. Wi-Fi 6 improves the quality of networks with faster speeds and energy-saving technology.
- Wi-Fi 6 uses technologies like channel sharing, Target Wake Time, Multi-user MIMO, channel utilization, amplitude modulation, OFDMA, and transmit beamforming to increase the quality of a Wi-Fi network.
- Wi-Fi 6E is an additional certification of Wi-Fi 6 that has even faster speeds and stronger performance.
Resource for more information
For more information about Wi-Fi 6, read this article by the Wi-Fi Alliance: Wi-Fi CERTIFIED 6
Reading: Supplemental Reading for Alphabet Soup
Reading
Alphabet Soup: Wi-Fi Standards
As an IT Support specialist, you may be responsible for supporting wireless technologies. In this reading, you will learn about the 802.11 Wireless-Fidelity (Wi-Fi) standards, including the alphabet-coded updates: a, b, g, n, ac, ad, af, ah, ax, ay, and az. You will also learn about the differences between the 2.4 gigahertz (GHz) and 5 GHz Wi-Fi frequencies.
You may already be familiar with selecting from the 2.4 GHz and 5 GHz frequency options on your home Wi-Fi router. Perhaps you also noticed the 802.11 specifications on the packaging for your Wi-Fi router when you purchased it. Have you wondered what these numbers and letters mean?
Wi-Fi 2.4 GHz and 5 GHz frequencies
There are multiple wireless technologies available today that use various frequencies ranging from radio to microwave bands. These wireless technologies include Wi-Fi, Z-Wave, ZigBee, Thread, Bluetooth, and Near Field Communication (NFC). Radio and microwave frequency bands each have specific ranges that are divided into channels. Wi-Fi uses the 2.4 GHz and 5 GHz microwave radio frequency band ranges for sending and receiving data. Some Wi-Fi routers use multiple channels within each range to avoid signal interference and to load-balance network traffic. Wi-Fi is commonly used for wireless local area networks (WLANs).
The following is a comparison of the performance characteristics between the 2.4 GHz and 5 GHz frequency bands:
2.4 GHz
- Advantages:
- Has the longest signal range from 150 feet (45 meters) indoors to 300 feet (92 meters) outdoors.
- Can pass through walls and other solid objects.
- Disadvantages:
- The long signal range also increases the chances of Wi-Fi traffic being intercepted by cybercriminals.
- Includes a limited number of channels. Can range from 11 to 14 channels, depending on regulations in the country of use.
- Can experience network traffic congestion and interference with other Wi-Fi networks and wireless technologies, such as BlueTooth, that overlap the 2.4 GHz frequency bands.
- Microwave ovens also work in the 2.4 GHz frequency band and can cause Wi-Fi interference.
- Under specific conditions, the maximum achievable data rate is 600 Mbps.
5 GHz
- Advantages:
- Includes significantly more channels than 2.4 GHz.
- Experiences fewer interference problems and less wireless network traffic congestion than 2.4 GHz.
- Can achieve over 2 Gbps data transfer speeds under specific conditions.
- Disadvantages:
- The wireless range is limited to 50 feet (12 meters) indoors and 100 feet (30 meters) outdoors.
- Does not penetrate walls and other solid objects as well as 2.4 GHz.
IEEE 802.11 standards
In 1997, the Institute of Electrical and Electronics Engineers (IEEE) ratified the first 802.11 standard for wireless fidelity (later branded as Wi-Fi). The standard was first published for use by computer device manufacturers to use as a common protocol for wireless communications. The IEEE has amended the 802.11 specifications multiple times over the years with updates and additional enhancements to 802.11 Wi-Fi. The IEEE names each new amendment with one or two letters appended to 802.11 (e.g., 802.11n or 802.11ax). The IEEE plans to continue updating the 802.11 specifications until a new technology replaces Wi-Fi.
The majority of wireless networks use the IEEE 802.11 standards for Wi-Fi. Wi-Fi networks include client devices (e.g., laptops, tablets, smartphones, IoT devices, etc.) that are configured to connect to wireless access points. This configuration is referred to as “infrastructure mode”. Access points can serve both wireless and wired network traffic. For wired traffic, the access point works as a bridge between wireless devices and a wired network. The access point connects to an Ethernet switch through a wired Ethernet cable.
The various amended 802.11 specifications use the same fundamental data link protocol. However, some characteristics may vary at the OSI physical layer, including:
- signal ranges
- modulation techniques
- transmission bit rates
- frequency bands
- channels
Note that countries around the world may impose different regulations on channel usage, power limitations, and Wi-Fi ranges. A technology called dynamic frequency selection (DFS) is also required to prevent 5 GHz Wi-Fi signals from interfering with local radar and satellite communications.
A comparison of the frequencies, maximum data rates, and maximum signal ranges for each 802.11 update over the years is detailed below:
IEEE 802.11 major updates list:
- 802.11a (1999) – Wi-Fi 2
- Designed for 5 GHz frequency band only
- Offered a maximum data rate of 54 Mbps
- Offered a maximum signal range of 400 feet (120 m)
- Defined 23 non-overlapping channels at 20 MHz wide
- 802.11b (1999) – Wi-Fi 1
- Designed for 2.4 GHz frequency band only
- Offered a maximum data rate of 11 Mbps
- Offered a maximum signal range of 450 feet (140 m)
- Defined 14 overlapping channels (frequent cause of interference)
- 802.11g (2003) update to 802.11b – Wi-Fi 3
- Improved 2.4 GHz frequency band only
- Increased the maximum data rate to 54 Mbps
- 802.11n (2009) bandwidth increase – Wi-Fi 4
- Improved both 2.4 GHz and 5 GHz frequency bands
- Access points could offer “dual-band” support with each band implemented by a separate radio.
- Increased bandwidth and reliability with “multiple input multiple output” (MIMO) technology.
- Allowed “channel bonding” for 5 GHz (two adjacent channels could be combined).
- Increased the maximum data rate to 72 Mbps per stream and 150 Mbps per stream for bonded channels. With specific configurations, the maximum data rate could be as high as 600 Mbps.
- Increased maximum signal range of 825 feet (250 m)
- 802.11ac (2014) and Wave 2 (2015) bandwidth increases – Wi-Fi 5
- Improved the 5 GHz frequency band only, though access points could still offer dual band support for older 2.4 GHz specifications.
- Access points could offer triband support (one 2.4 GHz and two 5 GHz radios).
- Supported wider bonded channels at 80 and 160 MHz.
- Allowed up to eight streams with each 80 MHz channel.
- Increased maximum data rates to 1 Gbps and could be as high as 2.2 Gbps for specific configurations. Wave 2 increased the maximum data rate to 6.9 Gbps.
- Increased sent data transmissions to up to 4 clients at the same time. This was achieved by allowing access points to use multiple antennas through downlink multiuser MIMO (DL MU-MIMO) technology.
- 802.11ax (2019) bandwidth increases – Wi-Fi 6
- Improved data stream rates to 600 Mbps per 80 MHz channel, with combined data rates of over 1 Gbps for the 2.4 GHz frequency and 4.8 Gbps for the 5 GHz frequency.
- Increased sent data transmissions to up to 8 clients at the same time with downlink MU-MIMO.
- Added support for full-duplex MU-MIMO to receive uplink data from multiple client devices.
- Added support for “orthogonal frequency division multiple access” (OFDMA), which works with MU-MIMO to sustain high data rates during periods of high client device traffic.
- Requires all client devices to use WPA3 security protocols.
- Wi-Fi 6e (2020) bandwidth increases
- Added support for a new 6 GHz frequency band, which has a combined maximum data rate speed of 10 Gbps (shared by multiple devices).
- Added new channels to reduce interference.
- Improved frequency space for 80 and 160 MHz channels.
Resources for more information
For more information about Wi-Fi standards, please visit:
- Official IEEE 802.11 Working Group Project Timelines – An IEEE published table detailing each update to the 802.11 standards.
Reading: Supplemental Reading for IoT Data Transfer Protocols
Reading
IoT Data Transfer Protocols
In this reading, you will learn how Internet of Things (IoT) devices send and receive data across networks. As an IT Support specialist, you may need to support data collection from IoT devices. For example, you may work for a company that uses an array of IoT sensors in a manufacturing setting to help with the remote monitoring and proactive maintenance of industrial machines. You may need to manage the software applications and data transfer protocols that support automated and human interaction with the IoT devices and the data they collect.
Data protocol models used with IoT
There are two common data protocol models to illustrate how low-power IoT devices share data:
- Request/Response model: Often used in distributed systems where the communication flow between servers and clients consists of requests and responses for data. Examples include HTTP and CoAP (described in the “IoT data protocols at the application layer” section below)
- Publish/Subscribe model: A framework for message exchanges between publishers (hosts) and subscribers (clients) that are routed through a broker. Subscribers can sign up to a channel to receive notices through the broker when the publisher releases new messages. Examples: MQTT and AMQP (described in the “IoT data protocols at the application layer” section below).
IoT data protocols at the application layer
IoT devices can collect environmental data around their physical location (e.g., temperature), equipment data (e.g., maintenance status), and metered data (e.g., electricity usage). Data protocols are needed to transfer and format the data for use by applications that interface with either humans or automated systems. IoT devices can be configured to use various data transfer and formatting protocols at the OSI application/software layer of communication.
Most IoT devices can use at least one of the following data transfer protocols:
- HyperText Transfer Protocol / Secure (HTTP/HTTPS): HTTP and HTTPS are the most widely used information transfer protocols across the World Wide Web (WWW). The protocols define how information is formatted and transmitted. HTTP/HTTPS uses ASCII formatting, has a header size of 8 bytes, and is designed for transmitting documents. HTTP/HTTPS use either Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) for sending information across the internet. HTTP/HTTPS uses the request/response model. When a website address is entered into a browser, HTTP/HTTPS sends a request to the site’s web server, which then returns an HTTP/HTTPS formatted response to the browser. The protocols use ports 80 or 8080 and data security is provided on the HTTPS version of the protocol. HTTP is supported by Google Cloud IoT Core for device-to-cloud communication.
- Machine-to-Machine (M2M) Communication Protocols: A set of direct communication methods for low-power devices, machines, and systems. There are three primary architectural and protocol groups in M2M electronic communications:
- Representational State Transfer (REST): An architectural style for communication amongst web accessible systems.
- Service-oriented Architectures (SOA): An architecture for data exchanges in industrial automation systems.
- Message Oriented Protocols: A protocol for asynchronous data transfers for distributed systems.
- Message Queue Telemetry Transport (MQTT): An IoT data-centric interaction protocol for M2M that uses a simple publish-subscribe model. MQTT supports Quality of Service (QoS), uses TCP for sending information, and utilizes Secure Sockets Layer (SSL) and Transport Layer Security (TLS) for security. MQTT using binary format and 2-byte header sizes for efficient messaging. MQTT is supported by Google Cloud IoT Core for device to cloud communication.
- Constrained Application Protocol (CoAP): A web transfer protocol for IoT constrained nodes and networks designed for M2M applications. CoAP is used for IoT applications like building automation and smart energy management. CoAP is very similar to HTTP: both are based on the REST model and both place resources on a server that is accessible to clients via a URL.
- Advanced Message Queuing Protocol (AMQP): An open standard for messaging amongst applications in different organizations and/or platforms. Its purpose is to remove vendor lock-in for app communication. In addition to interoperability, AMQP also offers reliability and security.
- Extensible Messaging and Presence Protocol (XMPP): A decentralized, open standard for chat, messaging, video and voice calls, collaboration tools, and more. Built upon Jabber, XMPP offers a proven communication technology that is extensible, flexible, and diverse.
- Data Distribution Service (DDS): An API standard and middleware protocol from the Object Management Group. Middleware exists in the OSI applications layer, between software and the operating system. DDS uses the publish-subscribe communications model. DDS is also data-centric, provides low-latency data connectivity, and helps the devices in an IoT ecosystem share data more efficiently. DDS is reliable, scalable, and provides control of QoS parameters, including bandwidth and resource limits.
Video: Wireless Network Configurations
Summary of Wireless Network Configurations:
3 main types:
- Ad-hoc Networks:
- Simplest type, no central infrastructure.
- Devices communicate directly within range.
- Less common, but useful for:
- Sharing files between nearby devices.
- Industrial/warehouse communication.
- Disaster response communication.
- Wireless LANs (WLANs):
- Most common in businesses.
- Access points bridge wireless and wired networks.
- Devices communicate with access points for internet access.
- Mesh Networks:
- Hybrid of ad-hoc and WLANs.
- Devices communicate directly and with access points.
- More access points without wired connections.
- Increased performance and range.
Key takeaways:
- Each type has its own advantages and applications.
- WLANs are dominant in business settings.
- Mesh networks offer improved performance and reach.
Tutorial: Wireless Network Configurations
Introduction:
Wireless networks have become ubiquitous, providing internet access and connectivity to our devices without the constraints of cables. Understanding the different types of wireless network configurations is crucial for setting up and managing efficient networks. This tutorial will explore three main types of wireless networks: ad-hoc, wireless LANs (WLANs), and mesh networks.
1. Ad-hoc Networks:
- Concept: Imagine a group of friends playing games on their laptops in a park. They can establish an ad-hoc network where devices communicate directly with each other within range. No central infrastructure like routers or access points is involved.
- Advantages:
- Simple to set up.
- Useful for temporary file sharing, gaming, or communication in disaster situations.
- Disadvantages:
- Limited range and scalability.
- Security concerns as all devices are directly exposed.
- Applications:
- Sharing files between nearby devices.
- Industrial/warehouse communication.
- Disaster response communication.
2. Wireless LANs (WLANs):
- Concept: WLANs are the most common type of wireless network found in homes, businesses, and public spaces. They involve one or more access points (APs) acting as bridges between wireless and wired networks. Devices connect to the APs for internet access and communication.
- Components:
- Access Points (APs): Wireless devices that broadcast a signal and manage communication between wireless and wired networks.
- Wireless Devices: Laptops, smartphones, tablets, etc., that connect to the APs for internet access and network resources.
- Wired Network: Provides internet connection and connects to the APs.
- Gateway Router: Routes traffic between the wireless and wired networks, usually connected to the main AP.
- Advantages:
- Wider range and higher performance compared to ad-hoc networks.
- Centralized management and security features.
- Scalable to accommodate more devices.
- Disadvantages:
- Requires infrastructure (APs, routers) and setup.
- May have coverage limitations or interference issues.
- Applications:
- Home and office networks.
- Public Wi-Fi hotspots in cafes, airports, etc.
- Educational institutions and businesses.
3. Mesh Networks:
- Concept: Mesh networks blend the characteristics of ad-hoc and WLANs. Devices not only communicate with an AP but also directly with each other, forming a “mesh” of interconnected nodes. This provides additional redundancy and coverage.
- Components:
- Mesh Nodes: Wireless devices that act as both APs and clients, relaying signals and expanding the network coverage.
- Wired Backhaul (optional): Some mesh networks utilize a wired connection to certain nodes for improved backhaul communication.
- Advantages:
- Wider coverage and better signal strength compared to WLANs.
- Self-healing capabilities as devices automatically adjust to maintain connectivity.
- Scalable and flexible for various environments.
- Disadvantages:
- Higher cost due to multiple mesh nodes.
- More complex configuration compared to WLANs.
- Applications:
- Large homes and outdoor spaces.
- Businesses with extensive areas to cover.
- Smart home and IoT deployments.
Conclusion:
Choosing the right wireless network configuration depends on your specific needs and requirements. Ad-hoc networks offer simplicity for temporary setups, while WLANs provide a balanced solution for most residential and business scenarios. Mesh networks excel in extending coverage and offering self-healing capabilities for larger areas or challenging environments. Understanding the advantages and limitations of each type will help you make informed decisions when designing and managing your wireless network.
Bonus:
- Additional resources and tools for configuring and managing different types of wireless networks.
- Troubleshooting tips for common wireless network issues.
- Security considerations for securing your wireless network.
There are a few main ways that a wireless network
can be configured. There are ad-hoc networks where nodes all speak
directly to each other. There are wireless
LANS or WLANS, where one or more
access points act as a bridge between a wireless
and a wired network, and there are mesh networks which are a hybrid of the two. Ad-hoc networks are the
simplest of the three. In an ad-hoc network, there isn’t really any supporting
network infrastructure. Every device involved
with the network communicates with every
other device within range, and all nodes help
pass along messages. Even though they’re
the most simple, ad-hoc networks aren’t the most common type
of wireless network, but they do have some
practical applications. Some smartphones can establish
ad-hoc networks with other smartphones in the area so that people can
exchange photos, video, or contact information. You’ll also sometimes see
ad-hoc networks used in industrial or warehouse
settings where individual pieces of equipment might need to communicate
with each other, but not with anything else. Finally, ad-hoc networks can be powerful tools during
disaster situations. If a natural disaster
like an earthquake or hurricane knocks out all of the existing
infrastructure in an area, disaster relief
professionals can use an ad-hoc network to communicate with
each other while they perform search
and rescue efforts. The most common type of wireless network
you’ll run into in the business world is a
wireless LAN, or WLAN. A wireless LAN consists of
one or more access points which act as bridges between the wireless and wired networks. The wired network
operates as a normal LAN, like the types we’ve
already discussed. The wired LAN contains the
outbound Internet link. In order to access resources
outside of the WLAN, wireless devices would
communicate with access points. They then forward
traffic along to the gateway router where
everything proceeds like normal. Finally, we have what’s
known as mesh networks. Mesh networks are
like ad-hoc networks, since lots of the devices
communicate with each other wirelessly,
forming a mesh. If you were to draw lines for all the links between
all the nodes, most mesh networks
you’ll run into are made up of only
wireless access points, and will still be connected
to a wired network. This network lets you
deploy more access points to the mesh without having to run a cable to each of them. With this setup, you can really increase the performance and range
of a wireless network.
Video: Wireless Channels
Summary: Wireless Network Channels Explained
Problem: Wireless networks lack wired switches, causing devices to potentially “talk over” each other, slowing down the network (collision domain).
Solution: Channels divide the frequency band into smaller sections, allowing devices to use specific frequencies and minimize interference.
Key points:
- Channel width can vary based on standard (e.g., 22 MHz for 802.11b).
- Channels overlap depending on their spacing and location within the band.
- Only some channels in the 2.4 GHz band (e.g., 1, 6, 11) are completely isolated (no overlap).
- Modern equipment often autosenses and switches channels to avoid congestion.
- Understanding channel overlap helps troubleshoot wireless connectivity issues.
IT support takeaway: Optimize wireless network deployments by minimizing channel overlap with neighboring networks.
Remember: Specific channel numbers aren’t crucial, but understanding collision domains and channel overlap is key.
Tutorial: Wireless Network Channels Explained
Introduction:
Imagine a bustling highway filled with cars – that’s your wireless network. Just like cars need lanes to avoid chaos, wireless devices utilize “channels” to communicate without overlapping signals. Understanding these channels is crucial for optimal network performance and troubleshooting connectivity issues.
1. Collision Domains and the Channel Solution:
- Collision domain: Remember those frustrating moments when two people try to talk at once? In wired networks, collisions occur when data packets from different devices overlap on the same cable, slowing everything down. This is known as a collision domain.
- Wireless freedom, wired challenges: Wireless networks lack physical cables, leading to potential collisions like cars merging without lanes. Enter channels – dedicated segments within the overall frequency band, acting like highway lanes for data packets.
2. Frequency Bands and Channel Width:
- Frequency bands: Think of them as the highway itself. Common wireless bands include 2.4 GHz and 5 GHz, each offering a specific range of frequencies.
- Channel width: Just like lanes vary in width, channels come in different sizes (measured in MHz). For example, 802.11b networks have 22 MHz wide channels, while newer standards like 802.11ac can use wider channels for faster speeds.
3. Channel Overlap and the Importance of Choosing Wisely:
- Overlapping lanes: Imagine adjacent lanes merging – channels can overlap, causing interference when devices transmitting on different channels operate too close.
- Choosing the right lane: Not all channels are created equal. In the 2.4 GHz band, channels 1, 6, and 11 are spaced far enough apart to avoid overlap, making them optimal choices for minimizing interference.
4. Modern Tech: Dynamic Channel Selection and Congestion Management:
- Smart lanes: Thankfully, modern access points are equipped with “traffic cops” – algorithms that analyze channel congestion and automatically switch to less crowded lanes.
- Manual override: While auto-selection usually works well, IT professionals can manually configure channels for specific situations.
5. Troubleshooting with Channel Knowledge:
- Slowdowns and dropped connections: Understanding channel overlap and congestion helps diagnose wireless network issues. For example, a sudden performance drop could indicate interference from a neighboring network using the same channel.
- Optimizing for performance: By strategically choosing channels and minimizing overlap, you can significantly improve network stability and speed.
Bonus:
- Explore advanced channel concepts like channel bonding and mesh networks for further performance enhancements.
- Learn about tools and resources for analyzing channel congestion and optimizing wireless networks.
Conclusion:
Wireless network channels may seem like technical jargon, but understanding their role is key to building and maintaining efficient, trouble-free networks. By applying the knowledge in this tutorial, you can navigate the wireless highway with confidence, ensuring smooth data flow and optimal network performance.
Remember, this is a basic framework. Feel free to delve deeper into specific aspects of wireless channels based on your needs and interests. Don’t hesitate to ask if you have any questions or want to explore further!
The concept of channels is one
of the most important things to understand about wireless networking. Channels are individual, smaller sections of the overall frequency
band used by a wireless network. Channels are super important because they help address a very old networking
concern, collision domains. You might remember that a collision domain
is anyone network segment where one computer can interrupt another. Communications that overlap each
other can’t be properly understood by the receiving end. So when two or more transmissions occur at
the same time, also called a collision, all devices in question have
to stop their transmissions. They wait a random amount of time and
try again when things quiet down. This really slows things down. The problem caused by collision
domains has been mostly reduced on wired networks through
devices called switches. Switches, remember which computers
live on which physical interfaces? So traffic is only sent to the node
it’s intended for.W ireless networking doesn’t have cables. So there aren’t physical interfaces for
a wireless device to connect to. That means we can have something
that works like a wireless switch. Wireless devices are doomed
to talk over each other, channels help fix this
problem to a certain extent. When we were talking about the concept
of frequency bands, we mentioned that FM radio in North America operates between
88 megahertz and 188 megahertz. But when we discussed the frequency
bands we used by wifi, we just mentioned 2.4 gigahertz and
five gigahertz. This is because that’s really just
shorthand for where these frequency bands actually begin for wireless networks
that operate on the 2.4 gigahertz band. What we really mean is that they operate
on roughly the band from 2.4 gigahertz to 2.5 gigahertz between these two
frequencies are a number of channels, each with a width of a certain megahertz. Since different countries and regions
have different regulatory committees for what radio frequencies might be used for
what. Exactly how many channels
are available for use depends on where in the world you are. For example,
dealing with an 802.11 B network, channel 1 operates at 24 12 megahertz. But since the channel with is 22
megahertz, the signal really lives on the frequencies between 2.401
megahertz and 2.423 megahertz. This is because radio waves are imprecise
things so you need some buffer around what exact frequencies a transmission
might actually arrive on. Some channels overlap, but
some are far enough apart so they won’t interfere
with each other at all. Let’s look again at an 802.11
B network running on the 2.4 gigahertz band because it’s
really the simplest and the concepts translate to all
other 802.11 specifications. With a channel width of 22 megahertz, Channel 1 with its midpoint at 2.412
megahertz is always completely isolated from channel 6with its
midpoint at 2.437 megahertz. For an 802.11 B network this
means that channels 1 and 6 and 11 are the only ones
that never overlap at all. That’s not all that matters though. Today, most wireless networking
equipment is built to auto sense what channels are most congested. Some access points will only perform
this analysis when they start up. Others will dynamically change
their channel as needed. Between those two scenarios and
manually specified channels you can still run into situations where
you experience heavy channel congestion. This is especially true in dense urban
areas with lots of wireless networks in close proximity. So why is this important
in the world of IT support? Well, understanding how
these channels overlap for all of the 802.11 specifications is
a way you can help troubleshoot bad wireless connectivity problems or
slowdowns in the network. You want to avoid collision
domains wherever you can. I should call out that it’s not important
to memorize all of the individual numbers we’ve talked about. The point is to understand how collision
domains are a necessary problem with all wireless networks and how you
can use your knowledge in this space to optimize wireless network deployments. You want to make sure that both
your own access points and those of neighboring businesses overlap
channels as little as possible.
Video: Wireless Security
Summary: Wireless Network Security
Problem: Wireless signals are broadcast through the air, making them vulnerable to eavesdropping.
Solution: Encryption protocols like WEP, WPA, and WPA2 secure wireless data by scrambling it with keys.
Key points:
- WEP: First attempt at encryption, but weak (40-bit keys, easily cracked).
- WPA: Significant improvement over WEP with 128-bit keys and more robust algorithm.
- WPA2: Current standard, highly secure with 256-bit keys.
- MAC filtering: Additional layer of security by allowing connections only from authorized devices (based on MAC addresses).
Takeaway:
- Use strong encryption (WPA2) for optimal wireless security.
- MAC filtering adds another layer of protection, but doesn’t encrypt data.
Remember, strong passwords and regular security updates are also crucial for securing your wireless network.
Tutorial: Wireless Network Security
Introduction:
In today’s connected world, Wi-Fi has become synonymous with convenience and accessibility. However, this ease of use comes at a cost – security concerns. Unlike wired networks confined within cables, wireless signals travel through the air, making them vulnerable to interception. To address this vulnerability, various security protocols have been developed. This tutorial will delve into the key aspects of securing your wireless network.
1. Understanding the Threats:
Before addressing solutions, it’s crucial to understand the potential threats lurking in the airwaves:
- Eavesdropping: Malicious actors can intercept data transmissions, potentially stealing sensitive information like passwords, financial data, or personal documents.
- Man-in-the-middle attacks: Attackers can intercept and manipulate communication between devices, potentially injecting malware or stealing data.
- Denial-of-service attacks: By flooding the network with traffic, attackers can disrupt connectivity and prevent legitimate users from accessing the network.
2. Encryption: The Core of Wireless Security:
Encryption scrambles data into an unreadable format, making it inaccessible to anyone without the decryption key. Different encryption protocols offer varying levels of security:
- WEP (Wired Equivalent Privacy): Outdated and considered insecure due to its weak 40-bit keys and vulnerabilities in its algorithm.
- WPA (Wi-Fi Protected Access): A significant improvement over WEP, utilizing stronger 128-bit keys and more robust protocols.
- WPA2: The current gold standard for wireless security. Offers stronger 256-bit encryption and advanced features like AES and CCMP protocols.
3. Securing Your Network with WPA2:
WPA2 is the recommended encryption protocol for optimal wireless security. Here’s how to ensure your network is secured with WPA2:
- Configure your router/access point: Access your router’s settings and activate WPA2 encryption. Choose AES as the encryption algorithm and a strong passphrase (ideally at least 12 characters with a mix of uppercase, lowercase, numbers, and symbols).
- Disable SSID broadcast: Hiding your network name (SSID) from public view makes it harder for attackers to detect and target.
- Regularly update firmware: Manufacturers release firmware updates to patch vulnerabilities. Keep your router/access point firmware up-to-date for optimal security.
4. Additional Security Measures:
While WPA2 encryption is essential, consider these additional measures for stronger protection:
- Change the default administrator password: Routers come with preset admin passwords. Change this to a unique and strong password to prevent unauthorized access.
- Enable guest network with limited access: If you need to offer temporary access to guests, create a separate guest network with limited privileges and WPA2 encryption.
- Disable remote management: Unless absolutely necessary, disable remote management features on your router to minimize potential attack vectors.
- Use a firewall: A firewall acts as a barrier, controlling incoming and outgoing traffic. Enable your router’s firewall and consider using additional software firewalls on your devices.
5. Vigilance is Key:
Wireless security is not a one-time setup. Remain vigilant and stay updated on emerging threats and security best practices. Regularly re-evaluate your security settings, monitor your network for suspicious activity, and consider consulting a security professional for advanced measures if needed.
Conclusion:
By understanding the threats and implementing the recommended security measures, you can significantly enhance the security of your wireless network. Remember, a secure network protects your privacy, online activities, and valuable data from prying eyes. Don’t let convenience compromise your security – take control and secure your wireless network today!
Bonus:
- Explore advanced security concepts like VPNs and intrusion detection systems for further protection.
- Learn about tools and resources for monitoring your network and identifying potential security risks.
When you’re sending
data over a wired link, your communication has a certain
amount of inherent privacy. The only devices that really know what
data is being transmitted are the two nodes on either end of the link. Someone or some device that happens to be in close
proximity can’t just read the data. With wireless networking this
isn’t really the case since there aren’t cables just radio transmissions
being broadcast through the air. Anyone within range could hypothetically
intercept any transmissions whether they were intended for
them or not. To solve this problem, WEP was invented. WEP stands for
Wired Equivalent Privacy and it’s an encryption technology that
provides a very low level of privacy. Actually it’s really right there in
the name Wired Equivalent Privacy. Using WEP protects your data a little,
but it should really only be seen as being as safe as sending
unencrypted data over a wired connection. The WEP standard is a really
weak encryption algorithm. It doesn’t take very long for a bad actor to be able to break through
this encryption and read your data. You’ll learn more about key lengths and
encryption in a future course but for now it’s important to know that the number
of bits in an encryption key corresponds to how secure it is. The more bits in a key the longer it takes
for someone to crack the encryption. WEP only uses 40 bits for its encryption
keys and with the speed of modern computers this can usually be
cracked in just a few minutes. WEP was quickly replaced in most places
with WPA or Wifi Protected Access. WPA by default uses a 128-bit key, making it a whole lot more
difficult to crack than WEP. Today the most commonly used
encryption algorithm for wireless networks is WPA2,
an update to the original WPA. WPA2 uses a 256 bit key,
make it even harder to crack. Another common way to help secure wireless
networks is through MAC filtering. With MAC filtering, you configure
your access points to only allow for connections from a specific set of MAC
addresses belonging to devices you trust. This doesn’t do anything more to help
encrypt wireless traffic being sent through the air, but it does provide an
additional barrier preventing unauthorized devices from connecting to
the wireless network itself.
Reading: Protocols & Encryption
Reading
WPA3 Protocols & Encryption
Protocols and encryption are vital components in cybersecurity. Network security continues to evolve along with technological innovations and ever-increasing computing power. You have learned about WPA2 and how it improved the security of the Wi-Fi Protected Access (WPA) protocol. In this reading, you will explore WPA3, the third iteration of WPA wireless security. You will also learn about various internet connectivity technologies, as well as the basics of wireless and cellular networking.
WPA3 is built upon the WPA2 protocol and is intended to replace WPA2. The WPA3 protocol introduces new features and methods to repair the security weaknesses of WPA2. The benefits of this advancement in Wi-Fi security include:
- Simplified wireless security
- Stronger authentication
- Powerful encryption
- Stable business continuity
- Enhanced security methods
- Replacement for legacy protocols
- Protected Management Frames (PMF) requirement for enterprise networks
WPA3 offers two versions, a personal and an enterprise version.
WPA3-Personal
WPA3-Personal is intended for individual users and personal/home Wi-Fi networks. This protocol addresses common cybersecurity weaknesses that affect consumers’ wireless devices. It also simplifies Wi-Fi security for users. The improvements to WPA3-Personal include:
- Natural password selection: Gives users the ability to set passwords that are easier for the user to remember.
- Increased ease of use: Users do not need to change the way they connect to Wi-Fi to benefit from WPA3’s improved security.
- Forward secrecy: If a password is stolen, WPA3 can continue to protect data that is transmitted.
- Simultaneous Authentication of Equals (SAE): WPA3-Personal improves upon the WPA2-Personal Pre-Shared Key (PSK) handshake protocol. SAE uses PSK to generate a Pairwise Master Key (PMK). The PMK uses password-based authentication and is shared between a Wi-Fi access point and a wireless device. The pair use a complex, multi-stage process for proving to one another that they each possess the PMK. This complex handshake makes it extremely difficult for cybercriminals to intercept packets in order to extract an identifiable authentication key. If the SAE transaction is successful, the wireless device will pass the authentication stage and gain access to the secured Wi-Fi network.
The SAE authentication also reduces the probability of successful dictionary and brute force attacks, in which cybercriminals try to crack short, weak, and commonly used passwords. Additionally, SAE corrects a weakness exploited by cybercriminals who could perform key reinstallation attacks (KRACKs) when in close proximity to a Wi-Fi user. This type of attack could decrypt data and expose passwords, credit card information, photos, chats, emails, and more.
WPA3-Enterprise
WPA3-Enterprise is intended for business networks with multiple users. This protocol addresses the WPA2-Enterprise weaknesses that cybercriminals have been able to exploit. In addition to the WPA3-Personal SAE improvements, the WPA3-Enterprise security improvements and options include:
- Galois/Counter Mode Protocol (GCMP-256): The Advanced Encryption Standard (AES) with GCMP-256-bit encryption replaces the WPA2 128-bit AES-Counter Mode Protocol (CCMP) Cipher Block Chaining Message Authentication Code (CBC-MAC). GCMP provides data integrity and confidentiality. The GCMP-256-bit encryption strength takes significantly more computing power for cybercriminals to crack than 128-bit encryption. The average person would not have access to that level of computing power. GCMP-256-bit encryption provides a stronger security protocol and makes it harder for cybercriminals to perform Meddler-in-the-Middle attacks.
- Opportunistic Wireless Encryption (OWE): OWE improves upon the WPA2 wireless encryption standard of 802.1x Open Authentication and Extensible Authentication Protocol (EAP). In WPA2, EAP required additional support to help it encrypt and authenticate login credentials. In the WPA3 protocol, OWE replaces EAP with a solution that encrypts and authenticates all wireless traffic. It also replaces Wi-Fi passwords by assigning a unique key to each device that has permission to access the network. This technology repairs a weakness Wi-Fi users experience in open networks, which are often found in restaurants, coffee shops, hotels, airports, malls, and more.
- Wi-Fi Device Provisioning Protocol (DPP): DPP improves upon the WPA2 Wi-Fi Protected Setup (WPS) encryption technology between wireless devices and routers. WPA3’s DPP uses QR codes or NFC tags to grant passwordless Wi-Fi access to wireless devices.
- 384-bit Hashed Message Authentication Mode (HMAC) with Secure Hash Algorithm (SHA): HMAC creates hash code from a secret key. This hash code is sent with each message passed between a Wi-Fi access point and a user’s device. The hash code from the origin of the message is compared to the hash code from the receiver of the message to determine if the hash codes match. A discrepancy between the two hashes would indicate that the message was compromised or corrupted during transmission.
- Elliptic Curve Diffie-Hellman Exchange (ECDHE) and Elliptic Curve Digital Signature Algorithm (ECDSA): In WPA3, key management and authentication use the ECDHE protocol and ECDSA encryption for faster performance. The protocol is supported by most browsers. This key management technology replaces the WPA2 4-way handshake.
Key takeaways
As the tech industry develops more powerful computers, cybercriminals will use them to crack older encryption standards. The need to create more complex encryption algorithms will always be present in order to stay ahead of the evolving tools used by cybercriminals.
For WPA3-Personal, some of the new features include:
- Natural password selection
- Increased ease of use
- Forward secrecy
- Simultaneous Authentication of Equals (SAE)
For WPA3-Enterprise, some of the new features include:
- Galois/Counter Mode Protocol (GCMP-256)
- Opportunistic Wireless Encryption (OWE)
- Wi-Fi Device Provisioning Protocol (DPP)
- 384-bit Hashed Message Authentication Mode (HMAC) with Secure Hash Algorithm (SHA)
- Elliptic Curve Diffie-Hellman Exchange (ECDHE) and Elliptic Curve Digital Signature Algorithm (ECDSA)
Video: Cellular Networking
Cellular Networking Summary:
Key Points:
- Widespread network for wireless communication, often the primary internet access method in some areas.
- Similar to Wi-Fi in using radio waves and having dedicated frequency bands, but with longer range (kilometers/miles).
- Structured around cells with assigned frequencies, similar to Wi-Fi access points but covering larger areas.
- Used by various devices beyond phones, including tablets, laptops, and even high-end cars.
In essence, cellular networking provides wide-area wireless connectivity like Wi-Fi on steroids, enabling mobile communication for diverse devices.
Additional Notes:
- Different cellular network generations (e.g., 4G, 5G) offer varying speeds and capabilities.
- Similar considerations for optimal coverage and interference exist as with Wi-Fi, but on a larger scale.
Another super popular form of wireless networking is
cellular networking, also called mobile networking. Cellular networks are now
common all over the world. In some places, using
a cellular network for Internet access is the most
common way of connecting. At a high level, cellular
networks have a lot in common with the 802.11 networks we’ve
already talked about. Just like there are many different 802.11 specifications, there are lots of different
cellular specifications. Just like Wi-Fi,
cellular networking operates over radio waves and there are specific
frequency bands specifically reserved for
cellular transmissions. One of the biggest
differences is that these frequencies
can travel over longer distances more easily, usually over many
kilometers or miles. Cellular networks are built
around the concept of cells. Each cell is assigned a specific
frequency band for use. Neighboring cells are set up to use bands
that don’t overlap. Just like how we discussed
the optimal setup for a WLAN with
multiple access points. In fact, the cell towers
that broadcasts and receives cellular
transmissions can be thought of like
access points, just with a much larger range. Lots of devices today use cellular networks
for communication, and not just phones, also tablets and some laptops also have
cellular antennas. It’s become more
and more common for high-end automobiles to have built-in cellular access too.
Video: Mobile Device Networks
Mobile Device Network Connectivity Summary:
Key Points:
- Mobile devices use various wireless networks: cellular, Wi-Fi, Bluetooth, and potentially others.
- IT support specialists help troubleshoot connectivity issues.
- Common issues:
- Disabled radios: Check and toggle Wi-Fi, Bluetooth, cellular, and airplane mode.
- Metered data: Devices prioritize Wi-Fi over cellular to save data usage.
- Unreliable connections: Distance, interference, device position can affect signal strength.
- Peripheral pairing: Troubleshoot pairing for Bluetooth devices like headphones or keyboards.
Remember:
- Check radio status (including airplane mode) first.
- Understand metered data and Wi-Fi prioritization.
- Consider physical factors like distance and interference.
- Reset pairing for Bluetooth peripherals if needed.
Mobile devices use wireless networks
to communicate with the internet and with other devices. Depending on the device it might
use cellular networks, wifi, Bluetooth and or one of several internet
of things or IOT network protocols. As an IT support specialist, you’ll often
have to help troubleshoot networking or connectivity issues for end users. You’ll need to figure out what network
the device should be connecting to and then make sure the device
is configured to do that. For example turning individual components
and systems on and off is a common feature in mobile devices which can
sometimes be confusing for the end users. Battery life is precious and people switch off these network radios
to save battery life if someone brings the device to you because it
won’t connect to a wireless network. The first thing you should check is
whether the wireless radio has been disabled. Yep sometimes the solution
is really that simple. You can toggle the wifi Bluetooth and
cellular networks on or off in the devices settings. Lots of mobile devices will also have an
airplane mode that disables all wireless networking at once. It is also pretty common for a mobile device to have multiple
network connections at the same time. Both wifi and cellular data for example,
mobile devices will try to connect to the internet using the most reliable and
least expensive connection available. That’s right, I said least expensive. Many mobile operating systems understand
the concept of metered connections. Does your cell phone plan have a limit on
how much data you can use in a month or charge you based on how much data you use? Then you have immediate connection
through that cell phone plan. Mobile devices will use other non metered
connections like wi-fi if they’re available so that you don’t use
up your limited data connection. Here’s another example of how you might
help as an IT support specialist. Let’s say you have a remote employee that
works from a coffee shop sometimes, but the wi-fi network in the coffee shop
restricts access to some websites. The employee might choose to
disconnect from the wifi network and use the sale network even though
it might be more expensive. So that they can access the websites
they need, by toggling the wi-fi and cellular data connections. You can force the device to use the
network connection that you want to use, if you’re troubleshooting an unreliable
wireless network connection. Keep in mind that wireless networking
works by sending a radio signal between two antennas. What?
You don’t see an antenna? Well surprise your device has one,
it might be printed on a circuit board or it might have a wire or
ribbon that runs through your device. The radio signal will get weaker the
farther it has to travel, especially if it passes through or reflects off of
things between the two antennas. Mobile devices can go with you to places
where there’s too much distance or interference for
the wireless signal to be reliable. Even the way the mobile device is held or worn can impact
the strength of the signal. So wi-fi and cellular data networks are used to connect
your mobile devices to the Internet. But there’s one other type of wireless
network to talk about, mobile devices connect to their peripherals
using short range wireless networks. The most common short range wireless
network is called Bluetooth. You might have used Bluetooth headphones,
keyboards or mice before. When you connect a wireless
peripheral to a mobile device, we call that pairing the devices. The two devices exchange information,
sometimes including a pin or password so
that they can remember each other. From then on the devices will
automatically connect to each other when they’re both powered on and in range. Pairing devices like this
can sometimes fail and you might need to make your device forget
the peripheral so it can be paired again. Remember Bluetooth can be turned off
very easily when you’re troubleshooting a Bluetooth peripheral,
always make sure that Bluetooth is on.
Reading: Supplemental Reading for Mobile Device Networks
Reading
Wireless Network Protocols for IoT
In this reading, you will learn how Internet of Things (IoT) devices connect to wireless networks. As an IT Support specialist, you may need to support wireless IoT devices in a networked environment. For example, you may have a client who needs to install a smart, wireless security system for their home or office. The client might need assistance with connecting the security system to a private network for onsite monitoring and/or to the internet for remote monitoring. Understanding the properties of wireless IoT networks will help you select appropriate network protocols for various IoT applications.
IoT wireless network protocols at the physical layer
IoT devices can use both wired and wireless methods to connect to the Internet. For wireless connections, there are multiple network protocols that manufacturers configure IoT devices to use. Some of these network protocols support global internet connectivity, while others are intended for short-distance Personal Area Networks (PANs). Network protocols connect at the OSI physical layer.
Most IoT devices can use at least one of the following network protocols:
- Wireless-Fidelity (Wi-Fi): Wi-Fi is the more familiar brand name for the IEEE 802.11 standard for wireless networks. Wi-Fi is the most common wireless protocol across the world, with billions of devices capable of using Wi-Fi, including many IoT devices. Wi-Fi is a great option when needing to integrate IoT devices into an existing IP network that is connected to the internet. Wi-Fi 6 can support up to 500 Mbps data transfer speeds, for fast performance with large amounts of data. IoT networks often include a hub or a control system that uses Wi-Fi to facilitate wireless networking. As you have learned previously, Wi-Fi networks communicate on radio frequencies 2.4 GHz and 5 GHz. The 2.4 GHz frequency extends to 150 feet (45 meters) indoors and 300 feet (92 meters) outdoors. However, the 2.4 GHz frequency can experience congestion due to a limited number of channels. Plus, 2.4 GHz is more likely to experience interference from other nearby devices that use the same frequency, like microwaves. The 5 GHz frequency provides a stronger signal than 2.4 GHz and has more channels to handle more traffic. The 5 GHz drawback is that its range is limited to 50 feet (12 meters) indoors and 100 feet (30.6 meters) outdoors.
- IEEE 802.15.4: An inexpensive, low-power wireless access technology intended for IoT devices that operate on battery power. IEEE 802.15.4 uses the 2.4 GHz or lower radio band frequencies. IEEE 802.15.4 is normally used for low-rate wireless personal area networks (LR-WPANs) and uses a 128-bit encryption. Examples of IoT technologies that use IEEE 802.15.4 network connections include:
- ZigBee: An LR-WPAN intended for smart home use. However, ZigBee has also been adopted globally for commercial IoT products. ZigBee includes a universal language that facilitates the interoperability of smart objects through a self-healing mesh network. ZigBee LR-WPAN networks can be accessed through Wi-Fi or Bluetooth.
- Thread: A low-latency wireless mesh networking protocol based on IPv6 addressing and existing open standards and technologies. These characteristics make thread networks compatible with a broad spectrum of IoT ecosystems. Thread devices do not use proprietary gateways or translators, making them inexpensive and easier to implement and maintain than other wireless technologies. Thread is used by the Google Nest Hub Max.
- Z-Wave: An interoperable, wireless mesh protocol (described below) that is based on low powered radio frequency (RF) communications. The Z-Wave protocol uses an RF signal on the 908.2MHz frequency band and extends 330 feet. Z-Wave allows users to control and monitor IoT smart devices. Z-Wave is inexpensive, reliable, and simple to use. The Z-wave protocol supports a closed network for security purposes. Over 3300 types and models of home and business IoT devices are certified to use Z-Wave technology, with more than 100 million devices in use worldwide.
- Wireless mesh network (WMN): Mesh networks are used by many popular wireless IoT network protocols, like Zigbee and Z-Wave, for device communication. Wireless mesh networks use less power than other wireless connectivity options. Wireless mesh is a decentralized network of connected wireless access points (WAP), also called nodes. Each WAP node forwards data to the next node in the network until the data reaches its destination. This network design is “self-healing,” meaning the network can recover on its own when a node fails. The other nodes will reroute data to exclude the failed node. Wireless mesh is a good option for high reliability and low power consumption, which is better for battery powered IoT devices. Wireless mesh networks can be configured to be full or partial mesh:
- Full mesh network: Every node can communicate with all of the other nodes in the network.
- Partial mesh network: Nodes can only communicate with nearby nodes.
- Bluetooth: Bluetooth is a widely used wireless network that operates at a 2.45 GHz frequency band and facilitates up to 3 Mbps connections among computing and IoT devices. Bluetooth has a range of up to 100 feet (30.6 meters) and can accommodate multiple paired connections. It is a good choice for creating a short distance wireless connection between Bluetooth enabled devices. Bluetooth is often used by computing devices to manage, configure, control, and/or collect small amounts of data from one or more close range IoT devices. For example, Bluetooth may be used to control smart home lighting or thermostat IoT devices from a smartphone.
- Near-Field Communication (NFC): NFC is a short-range, low data, wireless communication protocol that operates on the 13.56 MHz radio frequency. NFC technology requires a physical chip (or tag) to be embedded in the IoT device. NFC chips can be found in credit and debit cards, ID badges, passports, wallet apps on smartphones (like Google Pay), and more. A contactless NFC scanner, like a Point-of-Sale (PoS) device, is used to read the chip. This scanner communication connection often requires the IoT device to be within 2 inches (6 cm) of the scanner, but some NFC chips have an 8 inch (20 cm) range. This short-distance range helps to limit wireless network security threats. However, criminals can carry a portable NFC scanner into a crowded area to pick up NFC chip data from items like credit cards stored inside purses and wallets. To protect against this type of data theft, the cards should be placed inside special NFC/RFID sleeves that make the chips unreadable until they are removed from the sleeves. NFC technology may also be used in the pairing process for Bluetooth connections.
- Long Range Wide Area Network (LoRaWan): LoRaWan is an open source networking protocol designed to connect battery powered, wireless IoT devices to the Internet for widely dispersed networks.
Go to next item
Practice Quiz: Wireless Networking
How many address fields does an 802.11 header have?
4
Awesome! There are four different address fields in an 802.11 header.
A wireless channel is ____________.
a portion of a frequency band.
Good work! A channel represents a portion of a frequency band.
Choose all of the frequencies that wireless networks typically operate on.
2.4Ghz
Right on! Many wireless networks operate on the 2.4Ghz frequency band.
5Ghz
Correct! Many wireless networks operate on the 5Ghz frequency band.
Graded Assessments
Reading: Module 5 Glossary
New terms and their definitions: Course 2 Module 5
Ad-Hoc network: A network configuration without supporting network infrastructure. Every device involved with the ad-hoc network communicates with every other device within range, and all nodes help pass along messages
Asymmetric Digital Subscriber Line (ADSL): A device that establishes data connections across phone lines and different speeds for uploading and downloading data
Baud rate: A measurement of how many bits could be passed across a phone line in a second
Bluetooth: The most common short range wireless network
Broadband: Any connectivity technology that isn’t dial-up Internet
Cable modem: A device that sits at the edge of a consumer’s network and
connects it to the cable modem termination system
Cable modem termination system: Connects lots of different cable connections
to an ISP’s core network
Channels: Individual, smaller sections of the overall frequency band used by a wireless network
Collision domain: A network segment where only one device can communicate at a time
Data payload section: Has all of the data of the protocols further up the stack of a frame
Dial-up: Uses POTS for data transfer, and gets its name because the connection is established by actually dialing a phone number
DSL: Digital subscriber line was able to send much more data across the wire than traditional dial-up technologies by operating at a frequency range that didn’t interfere with normal phone calls
DSLAM: Digital Subscriber Line Access Multiplexers are devices that connect multiple DSL connections to a high-speed digital communications channel
Duration field: Specifies how long the total frame is
Frame check sequence: It is a 4-byte or 32-bit number that represents a checksum value for the entire frame
Frame control field: 16 bits long, it contains a number of sub-fields that are used to
describe how the frame itself should be processed
Frequency band: A certain section of the radio spectrum that’s been agreed upon to be used for certain communications
FTTB: Fiber to the building, fiber to the business or even fiber to the basement, since this is generally where cables to buildings physically enter. FTTB is a setup where fiber technologies are used for data delivery to an individual building
FTTH: Fiber to the home. This is used in instances where fiber is actually run to each individual residents in a neighborhood or apartment building
FTTN: Fiber to the neighborhood. This means that fiber technologies are used to deliver data to a single physical cabinet that serves a certain amount of the population
FTTP: Fiber to the premises. FTTH and FTTB may both also be referred to as FTTP
FTTX: Stands for fiber to the X, where the X can be one of many things
HDSL: High Bit-rate Digital Subscriber Lines. These are DSL technologies that provision speeds above 1.544 megabits per second
MAC filtering: Access points are configured to only allow for connections from a specific set of MAC addresses belonging to devices you trust
Mesh networks: Like ad-hoc networks, lots of devices communicate with each other device, forming a mesh if you were to draw lines for all the links between all the nodes
Metered connection: An internet connection where all data transfer usage is tracked. Cell phone plans that have a limit on data usage per month or that charge based on usage are examples of metered connections
Non-metered connection: A connection where your data usage is not tracked or limited, instead you are charged a flat fee for unlimited and unrestricted usage. A Wi-Fi connection is an example of a non-metered connection
Optical Network Terminator: Converts data from protocols the fiber network can
understand to those that are more traditional twisted pair copper networks can understand
Pairing: When a wireless peripheral connects to a mobile device, and the two devices exchange information, sometimes including a PIN or password, so that they can remember each other
Point-To-Point VPN: Establishes a VPN tunnel between two sites but VPN tunneling logic is handled by network devices at either side, so that users don’t all have to establish their own connections
Receiving address: The MAC address of the access point that should receive the frame
Symmetric Digital Subscriber Line (SDSL): A device that establishes data connections across phone lines and has upload and download speeds that are the same
Sequence control field: A field that is 16 bits long and mainly contains a sequence number used to keep track of ordering the frames
Short-range wireless network: It is what mobile devices uses to connect to their peripherals
T-Carrier technologies: Technologies Invented to transmit multiple phone calls over a single link. Eventually, they also became common transmission systems to transfer data much faster than any dial-up connection could handle
Transmitter address: The MAC address of whatever has just transmitted the frame
Wi-Fi Protected Access (WPA): A security program that uses a 128-bit key to protect wireless computer networks, which makes it more difficult to crack than WEP
Wide area network: Acts like a single network but spans across multiple physical locations. WAN technologies usually require that you contract a link across the Internet with your ISP
Wired Equivalence Privacy (WEP): An encryption technology that provides a very low level of privacy. WEP should really only be seen as being as safe as sending unencrypted data over a wired connection
Wireless access point: A device that bridges the wireless and wired portions of a network
Wireless LANS (WLANS): One or more access points act as a bridge between a wireless and a wired network
Wireless networking: Networks you connect to through radios and antennas
Terms and their definitions from previous modules
A
A record: The most common resource record, used to point a certain domain name at a certain IPv4 IP address
ACK flag: One of the TCP control flags. ACK is short for acknowledge. A value of one in this field means that the acknowledgment number field should be examined
Acknowledgement number: The number of the next expected segment in a TCP sequence
Address class system: A system which defines how the global IP address space is split up
Address Resolution Protocol (ARP): A protocol used to discover the hardware address of a node with a certain IP address
Anycast: A technique that’s used to route traffic to different destinations depending on factors like location, congestion, or link health
Application layer payload: The entire contents of whatever data applications want to send to each other
Application layer: The layer that allows network applications to communicate in a way they understand
ARP table: A list of IP addresses and the MAC addresses associated with them
ASN: Autonomous System Number is a number assigned to an individual autonomous system
Automatic allocation: A range of IP addresses is set aside for assignment purposes
B
Bit: The smallest representation of data that a computer can understand
Border Gateway Protocol (BGP): A protocol by which routers share data with each other
Broadcast address: A special destination used by an Ethernet broadcast composed by all Fs
Broadcast: A type of Ethernet transmission, sent to every single device on a LAN
C
Cable categories: Groups of cables that are made with the same material. Most network cables used today can be split into two categories, copper and fiber
Cables: Insulated wires that connect different devices to each other allowing data to be transmitted over them
Caching and recursive name servers: They are generally provided by an ISP or your local network, and their purpose is to store domain name lookups for a certain amount of time
Carrier-Sense Multiple Access with Collision Detection (CSMA/CD): CSMA/CD is used to determine when the communications channels are clear and when the device is free to transmit data
Client: A device that receives data from a server
CLOSE_WAIT: A connection state that indicates that the connection has been closed at the TCP layer, but that the application that opened the socket hasn’t released its hold on the socket yet
CLOSE: A connection state that indicates that the connection has been fully terminated, and that no further communication is possible
CNAME: A resource record used to map one domain to another
Collision domain: A network segment where only one device can communicate at a time
Computer networking: The full scope of how computers communicate with each other
Connection-oriented protocol: A data-transmission protocol that establishes a connection at the transport layer, and uses this to ensure that all data has been properly transmitted
Connectionless protocol: A data-transmission protocol that allows data to be exchanged without an established connection at the transport layer. The most common of these is known as UDP, or User Datagram Protocol
Copper cable categories: These categories have different physical characteristics like the number of twists in the pair of copper wires. These are defined as names like category (or cat) 5, 5e, or 6, and how quickly data can be sent across them and how resistant they are to outside interference are all related to the way the twisted pairs inside are arranged
Crosstalk: Crosstalk is when an electrical pulse on one wire is accidentally detected on another wire
Cyclical Redundancy Check (CRC): A mathematical transformation that uses polynomial division to create a number that represents a larger set of data. It is an important concept for data integrity and is used all over computing, not just network transmissions
D
Data offset field: A four-bit number that communicates how long the TCP header for this segment is
Data packet: An all-encompassing term that represents any single set of binary data being sent across a network link
Datalink layer: The layer in which the first protocols are introduced. This layer is responsible for defining a common way of interpreting signals, so network devices can communicate
Demarcate: To set the boundaries of something
Demarcation point: Where one network or system ends and another one begins
Demultiplexing: Taking traffic that’s all aimed at the same node and delivering it to the proper receiving service
Destination MAC address: The hardware address of the intended recipient that immediately follows the start frame delimiter
Destination network: The column in a routing table that contains a row for each network that the router knows about
Destination port: The port of the service the TCP packet is intended for
DHCP discovery: The process by which a client configured to use DHCP attempts to get network configuration information
DHCP: A technology that assigns an IP address automatically to a new device. It is an application layer protocol that automates the configuration process of hosts on a network
DNS zones: A portion of space in the Domain Name System (DNS) that is controlled by an authoritative name server
Domain Name System (DNS): A global and highly distributed network service that resolves strings of letters, such as a website name, into an IP address
Domain name: A website name; the part of the URL following www.
Domain: Used to demarcate where control moves from a top-level domain name server to an authoritative name server
Dotted decimal notation: A format of using dots to separate numbers in a string, such as in an IP address
Duplex communication: A form of communication where information can flow in both directions across a cable
Dynamic allocation: A range of IP addresses is set aside for client devices and one of these IPs is issued to these devices when they request one
Dynamic IP address: An IP address assigned automatically to a new device through a technology known as Dynamic Host Configuration Protocol
E
ESTABLISHED: Status indicating that the TCP connection is in working order, and both sides are free to send each other data
Ethernet frame: A highly structured collection of information presented in a specific order
Ethernet: The protocol most widely used to send data across individual links
EtherType field: It follows the Source MAC Address in a dataframe. It’s 16 bits long and used to describe the protocol of the contents of the frame
Exterior gateway: Protocols that are used for the exchange of information between independent autonomous systems
F
Fiber cable: Fiber optic cables contain individual optical fibers which are tiny tubes made of glass about the width of a human hair. Unlike copper, which uses electrical voltages, fiber cables use pulses of light to represent the ones and zeros of the underlying data
FIN_WAIT: A TCP socket state indicating that a FIN has been sent, but the corresponding ACK from the other end hasn’t been received yet
FIN: One of the TCP control flags. FIN is short for finish. When this flag is set to one, it means the transmitting computer doesn’t have any more data to send and the connection can be closed
Firewall: It is a device that blocks or allows traffic based on established rules
Five layer model: A model used to explain how network devices communicate. This model has five layers that stack on top of each other: Physical, Data Link, Network, Transport, and Application
Fixed allocation: Requires a manually specified list of MAC address and the corresponding IPs
Flag field: It is used to indicate if a datagram is allowed to be fragmented, or to indicate that the datagram has already been fragmented
Fragmentation offset field: It contains values used by the receiving end to take all the parts of a fragmented packet and put them back together in the correct order
Fragmentation: The process of taking a single IP datagram and splitting it up into several smaller datagrams
Frame check sequence: It is a 4-byte or 32-bit number that represents a checksum value for the entire frame
FTP: An older method used for transferring files from one computer to another, but you still see it in use today
Full duplex: The capacity of devices on either side of a networking link to communicate with each other at the exact same time
Fully qualified domain name: When you combine all the parts of a domain together
H
Half-duplex: It means that, while communication is possible in each direction, only one device can be communicating at a time
Handshake: A way for two devices to ensure that they’re speaking the same protocol and will be able to understand each other
Header checksum field: A checksum of the contents of the entire IP datagram header
Header length field: A four bit field that declares how long the entire header is. It is almost always 20 bytes in length when dealing with IPv4
Hexadecimal: A way to represent numbers using a numerical base of 16
Hub: It is a physical layer device that broadcasts data to everything computer connected to it
I
IANA: The Internet Assigned Numbers Authority, is a non-profit organization that helps manage things like IP address allocation
Identification field: It is a 16-bit number that’s used to group messages together
Instantiation: The actual implementation of something defined elsewhere
Interface: For a router, the port where a router connects to a network. A router gives and receives data through its interfaces. These are also used as part of the routing table
Interior gateway: Interior gateway protocols are used by routers to share information within a single autonomous system
Internet Protocol (IP): The most common protocol used in the network layer
Internet Service Provider (ISP): A company that provides a consumer an internet connection
Internetwork: A collection of networks connected together through routers – the most famous of these being the Internet
IP datagram: A highly structured series of fields that are strictly defined
IP masquerading: The NAT obscures the sender’s IP address from the receiver
IP options field: An optional field and is used to set special characteristics for datagrams primarily used for testing purposes
L
Line coding: Modulation used for computer networks
Listen: It means that a TCP socket is ready and listening for incoming connections
Local Area Network (LAN): A single network in which multiple devices are connected
M
MAC(Media Access Control) address: A globally unique identifier attached to an individual network interface. It’s a 48-bit number normally represented by six groupings of two hexadecimal numbers
Modulation: A way of varying the voltage of a constant electrical charge moving across a standard copper network cable
Multicast frame: If the least significant bit in the first octet of a destination address is set to one, it means you’re dealing with a multicast frame. A multicast frame is similarly set to all devices on the local network signal, and it will be accepted or discarded by each device depending on criteria aside from their own hardware MAC address
Multiplexing: It means that nodes on the network have the ability to direct traffic toward many different receiving services
MX record: It stands for mail exchange and this resource record is used in order to deliver email to the correct server
N
Name resolution: This process of using DNS to turn a domain name into an IP address
Network Address Translation (NAT): A mitigation tool that lets organizations use one public IP address and many private IP addresses within the network
Network layer: It’s the layer that allows different networks to communicate with each other through devices known as routers. It is responsible for getting data delivered across a collection of networks
Network port: The physical connector to be able to connect a device to the network. This may be attached directly to a device on a computer network, or could also be located on a wall or on a patch panel
Network switch: It is a level 2 or data link device that can connect to many devices so they can communicate. It can inspect the contents of the Ethernet protocol data being sent around the network, determine which system the data is intended for and then only send that data to that one system
Next hop: The IP address of the next router that should receive data intended for the destination networking question or this could just state the network is directly connected and that there aren’t any additional hops needed. Defined as part of the routing table
Node: Any device connected to a network. On most networks, each node will typically act as a server or a client
Non-routable address space: They are ranges of IPs set aside for use by anyone that cannot be routed to
NS record: It indicates other name servers that may also be responsible for a particular zone
NTP servers: Used to keep all computers on a network synchronized in time
O
Octet: Any number that can be represented by 8 bits
Options field: It is sometimes used for more complicated flow control protocols
Organizationally Unique Identifier (OUI): The first three octets of a MAC address
OSI model: A model used to define how network devices communicate. This model has seven layers that stack on top of each other: Physical, Data Link, Network, Transport, Session, Presentation, and Application
P
Padding field: A series of zeros used to ensure the header is the correct total size
Patch panel: A device containing many physical network ports
Payload: The actual data being transported, which is everything that isn’t a header
Physical layer: It represents the physical devices that interconnect computers
Pointer resource record: It resolves an IP to a name
Port forwarding: A technique where specific destination ports can be configured to always be delivered to specific nodes
Port preservation: A technique where the source port chosen by a client, is the same port used by the router
Port: It is a 16-bit number that’s used to direct traffic to specific services running on a networked computer
Preamble: The first part of an Ethernet frame, it is 8 bytes or 64 bits long and can itself be split into two sections
Presentation layer: It is responsible for making sure that the unencapsulated application layer data is actually able to be understood by the application in question
Protocol field: A protocol field is an 8-bit field that contains data about what transport layer protocol is being used
Protocol: A defined set of standards that computers must follow in order to communicate properly is called a protocol
Proxy service: A server that acts on behalf of a client in order to access another service
PSH flag: One of the TCP control flags. PSH is short for push. This flag means that the transmitting device wants the receiving device to push currently- buffered data to the application on the receiving end as soon as possible
Q
Quad A (AAAA) record: It is very similar to an A record except that it returns in IPv6 address instead of an IPv4 address
R
Recursive name servers: Servers that perform full DNS resolution requests
Reverse lookup zone files: They let DNS resolvers ask for an IP, and get the FQDN associated with it returned
Reverse proxy: A service that might appear to be a single server to external clients, but actually represents many servers living behind it
Round robin: It is a concept that involves iterating over a list of items one by one in an orderly fashion
Router: A device that knows how to forward data between independent networks
Routing protocols: Special protocols the routers use to speak to each other in order to share what information they might have
RST flag: One of the TCP control flags. RST is short for reset. This flag means that one of the sides in a TCP connection hasn’t been able to properly recover from a series of missing or malformed segments
S
Sequence number: A 32-bit number that’s used to keep track of where in a sequence of TCP segments this one is expected to be
Server or Service: A program running on a computer waiting to be asked for data
Server: A device that provides data to another device that is requesting that data, also known as a client
Service type field: A eight bit field that can be used to specify details about quality of service or QoS technologies
Session layer: The network layer responsible for facilitating the communication between actual applications and the transport layer
Simplex communication: A form of data communication that only goes in one direction across a cable
Socket: The instantiation of an endpoint in a potential TCP connection
Source MAC address: The hardware address of the device that sent the ethernet frame or data packet. In the data packet it follows the destination MAC address
Source port: A high numbered port chosen from a special section of ports known as ephemeral ports
SRV record: A service record used to define the location of various specific services
Start Frame Delimiter (SFD): The last byte in the preamble, that signals to a receiving device that the preamble is over and that the actual frame contents will now follow
Start of authority: A declaration of the zone and the name of the name server that is authoritative for it
Static IP address: An IP address that must be manually configured on a node
Subnet mask: 32-bit numbers that are normally written as four octets of decimal numbers
Subnetting: The process of taking a large network and splitting it up into many individual smaller sub networks or subnets
SYN flag: One of the TCP flags. SYN stands for synchronize. This flag is used when first establishing a TCP connection and make sure the receiving end knows to examine the sequence number field
SYN_RECEIVED: A TCP socket state that means that a socket previously in a listener state, has received a synchronization request and sent a SYN_ACK back
SYN_SENT: A TCP socket state that means that a synchronization request has been sent, but the connection hasn’t been established yet
T
TCP checksum: A mechanism that makes sure that no data is lost or corrupted during a transfer
TCP segment: A payload section of an IP datagram made up of a TCP header and a data section
TCP window: The range of sequence numbers that might be sent before an acknowledgement is required
Time-To-Live field (TTL): An 8-bit field that indicates how many router hops a datagram can traverse before it’s thrown away
Time-To-Live field (TTL): An 8-bit field that indicates how many router hops a datagram can traverse before it’s thrown away
Top Level Domain (TLD): The top level of the DNS or the last part of a domain name. For example, the “com” in www.weather.com
Total hops: The total number of devices data passes through to get from its source to its destination. Routers try to choose the shortest path, so fewest hops possible. The routing table is used to keep track of this
Total length field: A 16-bit field that indicates the total length of the IP datagram it’s attached to
Transmission Control Protocol (TCP): The data transfer protocol most commonly used in the fourth layer. This protocol requires an established connection between the client and server
Transport layer: The network layer that sorts out which client and server programs are supposed to get the data
Twisted pair cable: The most common type of cabling used for connecting computing devices. It features pairs of copper wires that are twisted together
Two-factor authentication: A technique where more than just a username and password are required to authenticate. Usually, a short-lived numerical token is generated by the user through a specialized piece of hardware or software
TXT record: It stands for text and was originally intended to be used only for associating some descriptive text with a domain name for human consumption
Types of DNS servers: There are five primary types of DNS servers; caching name servers, recursive name servers, root name servers, TLD name servers, and authoritative name servers
U
Unicast transmission: A unicast transmission is always meant for just one receiving address
URG flag: One of the TCP control flags. URG is short for urgent. A value of one here indicates that the segment is considered urgent and that the urgent pointer field has more data about this
Urgent pointer field: A field used in conjunction with one of the TCP control flags to point out particular segments that might be more important than others
User Datagram Protocol (UDP): A transfer protocol that does not rely on connections. This protocol does not support the concept of an acknowledgement. With UDP, you just set a destination port and send the data packet
V
Virtual LAN (VLAN): It is a technique that lets you have multiple logical LANs operating on the same physical equipment
Virtual Private Network (VPN): A technology that allows for the extension of a private or local network, to a host that might not work on that same local network
VLAN header: A piece of data that indicates what the frame itself is. In a data packet it is followed by the EtherType
Zone Files: Simple configuration files that declare all resource records for a particular zone
Quiz: Limitations of the Internet
A modulator/demodulator is better known as a _____.
modem
Correct! Modem stands for modulator/demodulator.
A T3 consists of _____ T1 lines.
28
Wohoo! A T3 is just 28 multiplexed T1 lines.
FTTP stands for _______.
Fiber to the Premises
Awesome! FTTP is a technology that uses fiber to bring an internet connection to a building or home.
The first field in an 802.11 header is known as a ________.
Frame Control Field
Great job! The Frame Control Field specifies things like what version of 802.11 is in use.
WPA stands for _______.
WiFi Protected Access
You got it! WPA is an update to WEP that’s much more secure.
Modems communicate data by using which method?
Audible wavelengths
Well done! Phone lines were developed to transmit sound. Modems transfer data through audible wavelengths.
Digital Subscriber Line (DSL) is the only Internet connection option available for a small office in the middle of nowhere. Which type will provide speeds above 1.544 megabits per second?
High Bit-rate Digital Subscriber Line (HDSL)
Fiber optic cable from a service provider can be delivered directly to the end user. Which implementation delivers data to a cabinet for distribution?
FTTN
Awesome! Fiber To The Neighborhood (FTTN) defines fiber technology used to deliver data to a single physical cabinet that serves a population.
An 802.11 frame contains a number of fields. Which field describes the version of 802.11 that is being used?
Frame control
You nailed it! The frame control field contains a number of subfields to describe the frame and processing. This includes the version of 802.11 being used.
Which configuration is considered to be a common way to increase security in a wireless network?
Media Access Control (MAC) filtering
Great work! MAC filtering only allows certain devices to connect to a network.
How many simultaneous phone conversations can a T1 line carry?
24
Woohoo! A T1 is a dedicated communication line that can carry both data and voice.
Which of the following is NOT a Wide Area Network (WAN) connection type?
Digital Subscriber Line (DSL)
Well done! DSL is a broadband technology that is used for Internet connectivity.
What are two characteristics of a 5Ghz band wireless network? Check all that apply.
Short range.
Woohoo! A wireless network that operates with a 5Ghz frequency has a much shorter range than that of a 2.4Ghz network.
Fast speeds
Well done! A wireless network that operates with a 5Ghz frequency offers greater speeds than that of a 2.4Ghz network.
When it comes to wireless channels, which channels never overlap? Check all that apply.
1, 11
Nice job! Some channels are close together and may cause an overlap. Channels 1,6, and 11 are far enough apart to never overlap.
Cat5 and Cat6 cabling refer to which reference model layer?
Physical
Woohoo! Physical media, like cables, provide connectivity and are associated with the physical layer.
What two benefits are a result of configuring a wireless mesh network? Check all that apply.
Range
Awesome! Range increases when access points are configured in a mesh where all points are connected to each other.
Performance
Nice job! Performance increases when access points are configured in a mesh where all points are connected to each other.