Jump to content

IT Fundamentals/2014/Internetworking

From Wikiversity

Internetworking is the practice of connecting a computer network with other networks through the use of routers that provide a common method of routing information packets between the networks.[1]This lesson covers routers, network connections, and sharing and storage.

Preparation

[edit | edit source]

Learners should already be familiar with Network Fundamentals and IT Fundamentals/Networking.

Objectives and Skills

[edit | edit source]

Objectives and skills for the internetworking portion of IT Fundamentals certification include:[2]

  • Given a scenario, set up and configure a basic SOHO router (wired / wireless)
    • Set WEP vs. WPA vs. WPA2
    • Change SSID from default
    • Apply a new wireless password
    • Change admin password for router
    • Connect to the new network
    • Update firmware if necessary
  • Compare and contrast cellular, wireless and wired data connections
    • High vs. low mobility
    • High vs. low availability
    • High vs. low throughput/bandwidth
    • High vs. low reliability
    • Connection delay
    • Number of concurrent connections
    • Levels of security
  • Compare and contrast different methods of sharing and storage
    • HTTP vs. HTTPS
      • Browser-based file downloads
    • FTP vs. FTPS vs. SFTP (Secure File Transfer Protocol)
    • Local vs. hosted storage
      • Cloud-based services
        • Cloud-based collaborative applications
        • Cloud-based storage
    • Peer-to-peer
      • Local adhoc network
        • Bluetooth sharing
      • Direct link (PC-to-PC)
      • Online peer-to-peer network

Readings

[edit | edit source]
  1. Wikipedia: Internetworking
  2. Wikipedia: Router (computing)
  3. Wikipedia: Wi-Fi
  4. Wikipedia: Internet service provider
  5. Wikipedia: File transfer
  6. Wikipedia: Peer-to-peer file sharing

Multimedia

[edit | edit source]
  1. YouTube: How the Internet Works in 5 Minutes
  2. YouTube: IT Fundamentals - Common Network Protocols
  3. YouTube: Configuring a SOHO Wireless Router
  4. YouTube: Understanding WEP, WPA, and WPA2
  5. YouTube: Wired vs Wireless Internet Speeds
  6. YouTube: What's the Difference Between HTTP and HTTPS?
  7. YouTube: P2P File Sharing

Activities

[edit | edit source]
  1. Set up and configure a basic wireless router using either a router emulator or your home router:
    • Use a SOHO router emulator to set up and configure a basic wireless router. (Note: The emulator will not save configuration changes.):
      • Change the default administrator password for the device.
      • Configure wireless security by setting a new SSID name and setting the security mode to WPA2 with a strong password.
      • Research current firmware releases for the device. Locate the router's firmware upgrade page and review instructions from the router's Help page on how to update the firmware.
    • Review settings for your home router:
      • Verify that the administrator password has been changed from the default.
      • Verify that the SSID security mode is set to WPA2 with a strong password.
      • Research current firmware releases for the device and determine whether a firmware update is required.
  2. Review Wikipedia: Wardriving. Use a free wireless scanner and scan your environment for wireless networks:
  3. Research plans available from different wired (cable, DSL) and wireless (cellular, wireless, satellite) Internet providers. Compare mobility, availability, bandwidth, reliability, delay, concurrent connections, security, and cost.
  4. Use a protocol analyzer to compare HTTP and HTTPS traffic:
    1. Review Wireshark and the lessons on how to:
      • Install Wireshark
      • Start a Wireshark Capture
      • Stop a Wireshark Capture
      • Capture Network Traffic
      • Filter Displayed Traffic
    2. Start a Wireshark capture and then use a browser to navigate to a website using HTTP, and another website using HTTPS.
    3. Stop the Wireshark capture.
    4. Filter for HTTP traffic and observe that the contents of the traffic are visible in the capture.
    5. Filter for HTTPS traffic and observe that the contents of the traffic are not visible in the capture.
  5. Compare FTP, FTPS, and SFTP:
    1. Review JScape: Understanding Key Differences between FTP, FTPS, and SFTP.
    2. Start a Wireshark capture and then use a browser or FTP client to navigate to an FTP site such as ftp://ftp.mozilla.org/pub/firefox/releases/ .
    3. Stop the Wireshark capture.
    4. Filter for FTP traffic and observe that the contents of the traffic are visible in the capture.
    5. If you regularly use FTPS or SFTP to connect to a server, capture a session and observe that the contents of that traffic are not visible in the capture.
  6. Review RIAA:About Piracy. Research legal issues and potential penalties related to illegal peer-to-peer file sharing.

Lesson Summary

[edit | edit source]
  • Internetworking is the practice of connecting a computer network with other networks through the use of routers that provide a common method of routing information packets between the networks.[3]
  • A router connects two or more data lines from different networks, as opposed to a network switch, which connects data lines from a single network.[4]
  • A router has interfaces for different physical types of network connections, such as copper cables, optical fiber, or wireless transmission.[5]
  • A router contains firmware for different networking communications protocol standards, and the firmware should be updated whenever security or performance issues have been corrected.[6]
  • A router typically supports dynamic IP address assignment as either a DHCP client or DHCP server.[7]
  • A router may include a firewall, network address translation (NAT), VPN handling, and other security functions.[8]
  • WEP, WPA, and WPA2 are wireless network security protocols used to encrypt wireless traffic. WEP and WPA are no longer considered secure.[9]
  • Internet service providers provide services for accessing, using, or participating in the Internet using wired or wireless connections.[10]
  • Wired Internet connection options include twisted-pair phone lines, coaxial cable, and optical fiber cable. Wired connections have greater throughput/bandwidth, reliability, and availability.[11]
  • Wireless Internet connection options include Wi-Fi, cellular, and satellite. Wireless connections have high mobility, but suffer from increased latency in data transfer and more security risks.[12]
  • File transfer is a generic term for the act of transmitting files over a computer network.[13]
  • File transfer protocols include HTTP, HTTPS, FTP, FTPS, and SFTP. HTTP and FTP are clear-text protocols, which allow anyone to capture and view the network traffic. HTTPS, FTPS, and SFTP use cryptographic protocols (SSL/TLS or SSH) to encrypt network traffic between the sender and receiver.[14]
  • Peer-to-peer file sharing typically uses applications specifically designed for this task, and may include Internet peers, local ad hoc networks, and Bluetooth connections.[15]
  • Peer-to-peer file sharing may have legal ramifications if copyrighted material is shared.[16]

Key Terms

[edit | edit source]
802.11a
A wireless networking standard operating in the 5 GHz band and supporting up to 54 Mbps data rates.[17]
802.11ac
A wireless networking standard operating in the 5 GHz band and supporting up to 1 Gbps data rates.[18]
802.11b
A wireless networking standard operating in the 2.4 GHz band and supporting up to 11 Mbps data rates.[19]
802.11g
A wireless networking standard operating in the 2.4 GHz band and supporting up to 54 Mbps data rates.[20]
802.11n
A wireless networking standard operating in the 2.4 GHz or 5 GHz band and supporting up to 600 Mbps data rates.[21]
ad hoc
A decentralized wireless network that does not rely on a pre existing infrastructure, such as routers or access points in managed wireless networks.[22]
AES (Advanced Encryption Standard)
A widely accepted data encryption standard using symmetric cryptography and supporting key lengths of 128, 192 and 256 bits which supersedes DES.[23]
availability
The proportion of time a system is in a functioning condition.[24]
bandwidth
The bit-rate of available or consumed information capacity expressed typically in metric multiples of bits per second.[25]
DMZ (demilitarized zone)
A physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet.[26]
DSL (Digital Subscriber Line)
A family of technologies that are used to provide internet access by transmitting digital data over telephone lines.[27]
FTP (File Transfer Protocol)
An unencrypted standard network protocol that uses TCP ports 20 and 21 to transfer computer files from one host to another host.[28]
FTPS (File Transfer Protocol over Secure Sockets Layer)
An extension of the File Transfer Protocol (FTP) that uses TCP port 990 and adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols.[29]
HTML (Hypertext Markup Language)
The standard markup language used to create web pages.[30]
HTTP (Hypertext Transfer Protocol)
An application protocol that uses TCP port 80 for distributed, collaborative, hypermedia information systems and the foundation of data communication for the World Wide Web.[31]
HTTPS (Hypertext Transfer Protocol over Secure Sockets Layer)
An extension of the Hypertext Transfer Protocol (HTTP) that uses TCP port 443 and adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols.[32]
ISP (Internet Service Provider)
An organization that provides services for accessing, using, or participating in the Internet.[33]
latency
The time interval or delay between a source sending a packet and the destination receiving it.[34]
mobility
The degree to which a computing device is able to be transported during normal usage.[35]
NAT (Network Address Translation)
A methodology of remapping one IP address space into another by modifying network address information in Internet Protocol (IP) datagram packet headers while they are in transit across a traffic routing device.[36]
peer-to-peer
A distributed application architecture that partitions tasks or work loads between equally privileged participants.[37]
port forwarding
An application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall.[38]
proxy server
A computer system or an application that acts as an intermediary for requests from clients seeking resources from other servers.[39]
QoS (Quality of Service)
The ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow.[40]
range extender
A device that takes an existing signal from a wireless router or wireless access point and rebroadcasts it to create a second network.[41]
redundancy
The duplication of critical components or functions of a system with the intention of increasing reliability of the system.[42]
resiliency
The ability to provide and maintain an acceptable level of service in the face of faults and challenges to normal operation.[43]
routing table
Lists the routes to particular network destinations, and in some cases, metrics (distance, performance, or cost) associated with those routes.[44]
SFTP (Secure File Transfer Protocol)
A network protocol that uses TCP port 22 to provide file access, file transfer, and file management functionalities designed as an extension of the Secure Shell protocol (SSH).[45]
SOHO (Small Office / Home Office)
The category of business or cottage industry that typically involves from 1 to 10 workers.[46]
SSH (Secure Shell)
A cryptographic network protocol that uses TCP port 22 for initiating secure text-based shell sessions on remote systems.[47]
SSID
A unique identifier for a wireless LAN.[48]
SSL (Secure Sockets Layer)
A cryptographic protocol designed to provide communications security over a computer network using asymmetric cryptography, superseded by Transport Layer Security (TLS).[49]
subnet
A logically visible subdivision of an IP network.[50]
Telnet
An application protocol that uses TCP port 23 to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.[51]
throughput
The rate of successful message delivery over a communication channel.[52]
TKIP (Temporal Key Integrity Protocol)
A stopgap security protocol used in the IEEE 802.11 wireless networking standard, and used to replace WEP without requiring the replacement of legacy hardware. TKIP is no longer considered secure.[53]
TLS (Transport Layer Security)
A cryptographic protocol designed to provide communications security over a computer network using asymmetric cryptography, and which superseded Secure Sockets Layer (SSL).[54]
URL (Uniform Resource Locator)
A reference to a resource that specifies the location of the resource on a computer network and a mechanism for retrieving it.[55]
VPN (Virtual Private Network)
Extends a private network across a public network, such as the Internet, allowing a computer or network-enabled device to send and receive data across shared or public networks as if it were directly connected to the private network.[56]
WAN (Wide Area Network)
A network that covers a broad geographic area using leased telecommunication lines.[57]
WI-Fi (Wireless Fidelity)
A local area wireless technology that allows an electronic device to participate in computer networking using 2.4 GHz and 5 GHz bands.[58]
WEP (Wired Equivalency Privacy)
The original security algorithm for IEEE 802.11 wireless networks, and superseded by WPA. WEP is no longer considered secure.[59]
WLAN (Wireless Local Area Network)
A wireless computer network that links two or more devices using a wireless distribution method within a limited area such as a home, school, computer laboratory, or office building.[60]
WPA (Wireless Protected Access)
A wireless computer network security protocol based on TKIP.[61]
WPA2 (Wireless Protected Access 2)
A wireless computer network security protocol based on AES.[62]
WPS (Wireless Protected Setup)
A network security standard that attempted to allow users to easily secure a wireless home network using a PIN rather than long passphrases. WPS is no longer considered secure and should be disabled if possible.[63]

Review Questions

[edit | edit source]
Enable JavaScript to hide answers.
Click on a question to see the answer.
  1. Internetworking is _____.
    Internetworking is the practice of connecting a computer network with other networks through the use of routers that provide a common method of routing information packets between the networks.
  2. A router connects _____, as opposed to a network switch, which connects _____.
    A router connects two or more data lines from different networks, as opposed to a network switch, which connects data lines from a single network.
  3. A router has interfaces for _____, such as _____, _____, or _____.
    A router has interfaces for different physical types of network connections, such as copper cables, optical fiber, or wireless transmission.
  4. A router contains firmware for _____, and the firmware should be _____.
    A router contains firmware for different networking communications protocol standards, and the firmware should be updated whenever security or performance issues have been corrected.
  5. A router typically supports dynamic IP address assignment as either _____ or _____.
    A router typically supports dynamic IP address assignment as either a DHCP client or DHCP server.
  6. A router may include _____, _____, _____, and other security functions.
    A router may include a firewall, network address translation (NAT), VPN handling, and other security functions.
  7. WEP, WPA, and WPA2 are _____. WEP and WPA are _____.
    WEP, WPA, and WPA2 are wireless network security protocols used to encrypt wireless traffic. WEP and WPA are no longer considered secure.
  8. Internet service providers provide services for _____.
    Internet service providers provide services for accessing, using, or participating in the Internet using wired or wireless connections.
  9. Wired Internet connection options include _____, _____, and _____. Wired connections have greater _____, _____, and _____.
    Wired Internet connection options include twisted-pair phone lines, coaxial cable, and optical fiber cable. Wired connections have greater throughput/bandwidth, reliability, and availability.
  10. Wireless Internet connection options include _____, _____, and _____. Wireless connections have high _____, but suffer from _____ and _____.
    Wireless Internet connection options include Wi-Fi, cellular, and satellite. Wireless connections have high mobility, but suffer from increased latency in data transfer and more security risks.
  11. File transfer is _____.
    File transfer is a generic term for the act of transmitting files over a computer network.
  12. File transfer protocols include _____. _____ are clear-text protocols, which allow anyone to capture and view the network traffic. _____ use cryptographic protocols (SSL/TLS or SSH) to encrypt network traffic between the sender and receiver.
    File transfer protocols include HTTP, HTTPS, FTP, FTPS, and SFTP. HTTP and FTP are clear-text protocols, which allow anyone to capture and view the network traffic. HTTPS, FTPS, and SFTP use cryptographic protocols (SSL/TLS or SSH) to encrypt network traffic between the sender and receiver.
  13. Peer-to-peer file sharing typically uses _____, and may include _____, _____, and _____ connections.
    Peer-to-peer file sharing typically uses applications specifically designed for this task, and may include Internet peers, local ad hoc networks, and Bluetooth connections.
  14. Peer-to-peer file sharing may have legal ramifications if _____.
    Peer-to-peer file sharing may have legal ramifications if copyrighted material is shared.

Assessments

[edit | edit source]

See Also

[edit | edit source]

References

[edit | edit source]
Type classification: this is a lesson resource.
Completion status: this resource is considered to be complete.
  1. Wikipedia: Internetworking
  2. CompTIA IT Fundamentals Certification Exam Objectives (FC0-U51)
  3. Wikipedia: Internetworking
  4. Wikipedia: Router (computing)
  5. Wikipedia: Router (computing)
  6. Wikipedia: Router (computing)
  7. Wikipedia: Router (computing)
  8. Wikipedia: Router (computing)
  9. Wikipedia: Wi-Fi
  10. Wikipedia: Internet service provider
  11. Wikipedia: Internet service provider
  12. Wikipedia: Internet service provider
  13. Wikipedia: File transfer
  14. Wikipedia: File transfer
  15. Wikipedia: Peer-to-peer file sharing
  16. Wikipedia: Peer-to-peer file sharing
  17. Wikipedia: IEEE 802.11a-1999
  18. Wikipedia: IEEE 802.11ac
  19. Wikipedia: IEEE 802.11b-1999
  20. Wikipedia: IEEE 802.11g-2003
  21. Wikipedia: IEEE 802.11n-2009
  22. Wikipedia: Wireless ad hoc network
  23. Wikipedia: Advanced Encryption Standard
  24. Wikipedia: Availability
  25. Wikipedia: Bandwidth (computing)
  26. Wikipedia: DMZ (computing)
  27. Wikipedia: Digital subscriber line
  28. Wikipedia: File Transfer Protocol
  29. Wikipedia: FTPS
  30. Wikipedia: HTML
  31. Wikipedia: Hypertext Transfer Protocol
  32. Wikipedia: HTTPS
  33. Wikipedia: Internet service provider
  34. Wikipedia: Latency (engineering)
  35. Wikipedia: Mobile computing
  36. Wikipedia: Network address translation
  37. Wikipedia: Peer-to-peer
  38. Wikipedia: Port forwarding
  39. Wikipedia: Proxy server
  40. Wikipedia: Quality of service
  41. Wikipedia: Wireless repeater
  42. Wikipedia: Redundancy (engineering)
  43. Wikipedia: Resilience (network)
  44. Wikipedia: Routing table
  45. Wikipedia: SSH File Transfer Protocol
  46. Wikipedia: Small office/home office
  47. Wikipedia: Secure Shell
  48. Wikipedia: Service set (802.11 network)
  49. Wikipedia: Transport Layer Security
  50. Wikipedia: Subnetwork
  51. Wikipedia: Telnet
  52. Wikipedia: Throughput
  53. Wikipedia: Temporal Key Integrity Protocol
  54. Wikipedia: Transport Layer Security
  55. Wikipedia: Uniform resource locator
  56. Wikipedia: Virtual private network
  57. Wikipedia: Wide area network
  58. Wikipedia: Wi-Fi
  59. Wikipedia: Wired Equivalent Privacy
  60. Wikipedia: Wireless LAN
  61. Wikipedia: Wi-Fi Protected Access
  62. Wikipedia: Wi-Fi Protected Access
  63. Wikipedia: Wi-Fi Protected Setup