Authentication to wireless networks is implemented using the following methods:
Open authentication requires that clients provide a MAC address in order to
connect to the wireless network.
You can use open authentication to allow
Subnetting is the process of dividing a large network into smaller networks. When you subnet a
network, each network segment (called a subnet) has a different network address (also called
a subnet address). In practice, the terms network and subnet are us
The current IP addressing standard, version 4, will eventually run out of unique addresses, so a new
system is being developed. It is named IP version 6 or IPv6. The IPv6 address is a 128-bit binary
number. A sample IPv6 IP address looks like: 35BC:FA77:4
The Domain Name System (DNS) is a hierarchical, distributed database that maps logical host names
to IP addresses. The DNS hierarchy is made up of the following components:
. (dot) domain (also called the root domain)
Top Level Domains (TLDs) such as .c
To set up a wireless network, you need to configure the wireless access points and any wireless
network cards. Most APs are configured to work right out of the box. However, you might need to
perform some configuration to customize settings or enable secu
Remote access allows a host to connect remotely to a private server or a network to access resources
on that server or network. Remote access connections are typically used to connect remotely to
servers at your office, but can also describe the type of c
IP addresses allow Hosts to participate on IP based Subnet/Network. An IP address:
Is a 32-bit binary number represented as four octets (four 8-bit numbers). Each octet is
separated by a period.
IP addresses can be represented in one of two ways:
The following table lists several protocols in the TCP/IP protocol suite:
File Transfer Protocol (FTP) provides a generic
method of transferring files. It can include
The following table describes specifics of the Ethernet architecture:
The physical topology is the mapping of the nodes of a network and the
physical connections between them, such as the layout of wiring, cables, the
Ethernet standards are defined by the work of the IEEE 802.3 committee. The following table
compares the characteristics of various Ethernet implementations:
With the original Ethernet standards, all devices shared the same cable. This caused two problems:
Collisions would occur when two devices transmitted at the same time, requiring devices to be
able to detect and recover from collisions.
Each device coul
WANs can use one of several cable standards. When you contract for WAN services, you will need to
understand your bandwidth needs to choose the appropriate cabling option. The table below
describes common WAN carriers.
Internet connectivity provides methods (sets of standards) that allow computers to connect to the
Internet through an ISP (Internet Service Provider). The two primary methods of Internet connection
are through dialup or LAN.
The PSTN us
The following table lists several options for assigning IP addresses.
A DHCP server is a special server configured to pass out IP address and
other IP configuration information to network clients.
When a client boots, it contacts the DHCP ser
WAN connections are provided through several different connector types. The following table
illustrates the connector types and their ports:
WAN interface cards (WIC) with a single serial port
use a DB-60 connector. The connector ha
When you implement a radio frequency wireless network, you use radio waves rather than wires to
connect your hosts. Radio waves are considered unbounded media because, unlike wires, they have
nothing to encase them. The most commonly used frequency for wi
A router is a device that sends packets from one network to another network. Routers receive
packets, read their headers to find addressing information, and send them on to their correct
destination on the network or Internet. Routers can forward packets
A generic wide area network uses the following components:
The WAN cloud is the collection of equipment that makes up the WAN
network. The WAN cloud is owned and maintained by large
telecommunications companies. It is repre
Routers use a routing protocol to exchange information about known routes with other routers. The
following table describes general characteristics of a routing protocol.
Each organization that has been assigned a network addre
Wireless networks are vulnerable to the following specific security attacks:
A rogue access point is any unauthorized access point added to a network.
An attacker or an employee with access to the wired network instal
Comprehensive Network Design Executive Summary
Christopher D. Coulter
Aug 15, 2016
Mr. Denis Brooker
Project Requirements: This proposal is drafted to provide recommendations to the Chief
Technology Officer (CTO) of Company X in
A frame is a unit of data that is ready to be sent on the network medium. Ethernet frames contain the
The preamble is a set of alternating ones and zeros terminated by two ones (i.e., 11) that
marks it as a frame.
(1 byte, binary)
Internet Connection Sharing (ICS) is a service available on Windows systems that enables multiple
computers on a single small network to access the Internet by sharing one computer's connection.
With ICS, most configuration tasks are completed automatical
Network Address Translation (NAT) allows you to connect a private network to the Internet without
obtaining registered addresses for every host. Private addresses are translated to the public address
of the NAT router.
Hosts on the private network share
The following table describes common WAN services that are used to connect two networks through a
The PSTN is the network used for placing local and long-distance phone
The PSTN is a circuit switched network; a dedicated c
The following table lists the characteristics of specific routing protocols.
RIP is a distance vector routing protocol used for routing within an
autonomous system (AS) (i.e.an IGP).
RIP uses the hop count as the metric.
Listed below are the most common WAN transmission media:
Existing wires use only one twisted pair.
Analog signals are used through the local loop.
A modem is required to convert digit
During the IP-based communications between two network hosts, the following processes occur:
1. The data to be transferred is encapsulated on the sending host by moving from the top layer of
the TCP/IP or OSI model to the bottom.
2. The data is transmitte
The following table includes different WAN types and their description:
A point-to-point connection is a single, pre-established path from the customer's
network through a carrier network (such as a telco) to a customer's
The following table summarizes basic characteristics of the upper OSI model layers:
The Application layer integrates network functionality into the host operating system and
enables network services. The Application layer does not includ