Computer Networks/Devices
Appearance
This lesson introduces networking devices.
Objectives and Skills
[edit | edit source]Objectives and skills for the networking devices portion of Network+ certification include:[1]
- Explain the functions and applications of various network devices
- Router
- Switch
- Multilayer switch
- Firewall
- HIDS
- IDS/IPS
- Access point (wireless/wired)
- Content filter
- Load balancer
- Hub
- Analog modem
- Packet shaper
- VPN concentrator
- Given a set of requirements, implement a basic network
- List of requirements
- Device types/requirements
- Environment limitations
- Equipment limitations
- Compatibility requirements
- Wired/wireless considerations
- Security considerations
Readings
[edit | edit source]- Wikipedia: Networking hardware
- Wikipedia: Ethernet hub
- Wikipedia: Network switch
- Wikipedia: Router (computing)
- Wikipedia: Firewall (computing)
Multimedia
[edit | edit source]- YouTube: Common Network Devices - CompTIA Network+ N10-006 - 1.1
- YouTube: Intrusion Detection and Prevention Systems - CompTIA Network+ N10-006 - 1.1
- YouTube: Content Filters - CompTIA Network+ N10-006 - 1.1
- YouTube: Load Balancers - CompTIA Network+ N10-006 - 1.1
- YouTube: Packet Shapers - CompTIA Network+ N10-006 - 1.1
- YouTube: VPN Concentrators - CompTIA Network+ N10-006 - 1.1
- YouTube: Implementing a Basic Network - CompTIA Network+ N10-006 - 1.12
Activities
[edit | edit source]- In Lesson 2 you created your own personal reference chart comparing the Internet protocol suite four-layer model to the OSI seven-layer model. Review Lesson 2 and then add this lesson's network devices to your reference chart. Hubs, switches, routers, and firewalls each functionally occupy a different layer in the OSI model.
- Review Microsoft: How do Hubs, Switches, Routers, and Access Points Differ?. Most home users have a single device that serves as a combined router, switch, and access point. Many businesses purchase separate devices specifically designed for each purpose. Examine your home and school or work environments and identify the network connectivity devices in use.
- Use a protocol analyzer to capture network traffic.
- Review Wikipedia: Wireshark.
- Install Wireshark.
- Review Wireshark: User's Guide.
- Use Wireshark to capture network traffic.
- Capture traffic from another computer.
- Review Study CCNA: Collision & Broadcast Domain.
- With two computers on the same network, run Wireshark on one computer and capture network traffic.
- On the other computer, access the Internet.
- Stop Wireshark and view the captured traffic. Do you see any traffic from the other computer? In a typical switched environment, you will see broadcast traffic from the other computer, but you will not see any directed unicast traffic to the Internet.
- Advanced: Capture all traffic on the network.
- Review Wikipedia: Promiscuous mode and Wikipedia: Port mirroring.
- Configure Wireshark to capture traffic in promiscuous mode.
- If your switch supports it, configure one of the ports with port mirroring to see traffic from the other ports.
- Capture and view all traffic on the network. From a network capture perspective, port mirroring on a switch is similar in effect to how hubs work.