0% found this document useful (0 votes)
7 views47 pages

Module 1

The document provides an overview of network topologies, OSI model concepts, SOHO networks, and troubleshooting methodologies. It outlines key learning objectives, explains different network types and their characteristics, and details the OSI model layers and their functions. Additionally, it emphasizes the importance of a structured approach to troubleshooting network issues.

Uploaded by

rever69ok
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views47 pages

Module 1

The document provides an overview of network topologies, OSI model concepts, SOHO networks, and troubleshooting methodologies. It outlines key learning objectives, explains different network types and their characteristics, and details the OSI model layers and their functions. Additionally, it emphasizes the importance of a structured approach to troubleshooting network issues.

Uploaded by

rever69ok
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 47

Module 1

Explaining Network Topologies

​ opyright © 2024 The Computing Technology Industry Association, Inc.


C 1
All rights reserved.
Learning Objectives
• Explain network types and characteristics.
• Compare and contrast OSI model layers.
• Configure SOHO networks.
• Explain CompTIA’s troubleshooting methodology.

​ opyright © 2024 The Computing Technology Industry Association,


C 2
Inc. All rights reserved.
Lesson 1.1
Networking Overview

​ opyright © 2024 The Computing Technology Industry Association, Inc.


C 3
All rights reserved.
Think About It
How would you define your social network?

​ opyright © 2024 The Computing Technology Industry Association,


C 4
Inc. All rights reserved.
How are Personal and IT Networks Similar?

Social Network IT Network


A collection of computers and
A collection of friends, family,
other devices connected by
coworkers, and acquaintances
transmission medium

Provides emotional support,


Provides an opportunity for
advice, and opportunities in
shared resources
personal matters

Helps in communication, Helps with communication


information sharing, and and information sharing in a
social connections digital environment

​ opyright © 2024 The Computing Technology Industry Association,


C 5
Inc. All rights reserved.
Networks

Peer-to-Peer Client-Server
​ opyright © 2024 The Computing Technology Industry Association,
C 6
Inc. All rights reserved.
Local Area Networks
A local area network (LAN) is confined to a single
geographical location.

SOHO Enterprise LAN Datacenter

​ opyright © 2024 The Computing Technology Industry Association,


C 7
Inc. All rights reserved.
Activity: Quick Search

Point-to-Point
Star Topology
Topology

Mesh Topology

​Copyright © 2024 The Computing Technology Industry Association, Inc. All rights reserved. 8
Network Topologies: Point-to-Point

​Copyright © 2024 The Computing Technology Industry Association, Inc. All rights reserved.
9
Network Topologies: Star

​Copyright © 2024 The Computing Technology Industry Association, Inc. All rights reserved.
10
Network Topologies: Mesh

​Copyright © 2024 The Computing Technology Industry Association, Inc. All rights reserved.
11
Lesson Summary
• Network: Connected devices sharing data (computers, protocols,
transmission medium)
• Client-Server Network: Central server provides resources and services
to client devices
• Local Area Network (LAN): Connects devices within a limited area
(home, office)
• Network Topology: Layout of connections between network devices
(star, mesh, point-to-point)

​ opyright © 2024 The Computing Technology Industry Association, Inc.


C 12
All rights reserved.
Lesson 1.2
OSI Model Concepts

​ opyright © 2024 The Computing Technology Industry Association, Inc.


C 13
All rights reserved.
The OSI Model Packet Flow

7 Application 1 Physical
Sender Receiver
6 Presentation 2 Data Link

5 Session 3 Network

4 Transport 4 Transport

3 Network 5 Session

2 Data Link 6 Presentation

1 Physical 7 Application
14
​ opyright © 2024 The Computing Technology Industry Association,
C
Inc. All rights reserved.
The OSI Model Mnemonic

Please Do Not Throw Sausage Pizza Away

P D N T S P A

Physical Data Link Network Transport Session Presentation Application


Responsibility of the Network
7 Application

6 Presentation

5 Session

4 Transport

3 Network
Responsibility
2 Data Link
of the
Network 1 Physical

​ opyright © 2024 The Computing Technology Industry Association, Inc.


C 16
All rights reserved.
Layer 1 – Physical
7 Application Functions and Examples
6 • Transmit bits from sending source over network
Presentation communications to physical layer of receiving device
• Data transmitted using cables or wireless media
5 Session • Examples: Coax and fiber cables, hubs and repeaters,
modem, transceiver
4 Transport

3 Network

2 Data Link
Bit Stream
Sender Receiver
1 Physical

​ opyright © 2024 The Computing Technology Industry Association,


C 17
Inc. All rights reserved.
Layer 2 – Data Link

7 Application Functions and Examples


6 • Transfers data between nodes on the same logical
Presentation segment using hardware addresses
• Encapsulation: organizes stream of bits arriving
5 Session
from the Physical layer into frames
• Examples: NIC, bridge, switch, wireless access point
4 Transport

3 Network
G1 Host AA
2 Data Link
G2 Host AB
1 Physical
G3 Host AC
​ opyright © 2024 The Computing Technology Industry Association,
C 18
Inc. All rights reserved.
Layer 3 – Network
Functions and Examples
7 Application
• Moving data around a network of networks
6
using network and host IDs
Presentation
• Packets given a destination IP address and
5 Session forwarded to the destination network
• Examples: Router, IP, ACL, Basic Firewall
4 Transport

3 Network Network 9

2 Data Link Router A Router B:


1.254 2.254
1 Physical Network 1 Network 1
(Hosts 1.1, 1.2, 1.3) (Hosts 2.1, 2.2, 2.3)
​ opyright © 2024 The Computing Technology Industry Association,
C 19
Inc. All rights reserved.
Responsibility of Host
7 Application

Responsibility 6 Presentation

of the Host 5 Session

4 Transport

3 Network

2 Data Link

1 Physical

​ opyright © 2024 The Computing Technology Industry Association,


C 20
Inc. All rights reserved.
Layer 4 - Transport

7 Application Functions and Examples

6 Presentation • Tracks communication between applications on


source and destination hosts
5 Session • Segments data and manages each data piece
• Reassembles segments into application data
4 Transport • Examples: Multilayer switches, advanced
firewalls, intrusion detection systems (IDSs)
3 Network

2 Data Link

1 Physical

​ opyright © 2024 The Computing Technology Industry Association,


C 21
Inc. All rights reserved.
Layer 4 – Transport

​ opyright © 2024 The Computing Technology Industry Association,


C 22
Inc. All rights reserved.
Layer 5 - Session

7 Application
Functions and Examples
6
Presentation • Establishes and manages the
5 Session connections between applications
• Examples: ASP, ADSP, NetBIOS, PAP
4 Transport

3 Network
Authentication
Request
2 Data Link
Session Established
1 Physical Respond

​ opyright © 2024 The Computing Technology Industry Association,


C 23
Inc. All rights reserved.
Layer 6 - Presentation
Functions and Examples
7 Application
• Delivers data across network
6 connections
Presentation • Examples: MIME,
5 Session Encryption/Decryption Services

4 Transport
Application Layer Data Application Layer Data
3 Network
Presentation Layer
Presentation Layer
2 Data Link Decrypted, Decoded, and
Encrypted, Encoded, Compressed
Decompressed

1 Physical Session Layer Data Session Layer Data

​ opyright © 2024 The Computing Technology Industry Association,


C 24
Inc. All rights reserved.
Layer 7 - Application
Functions and Examples
7 Application
• Interacts directly with end-user’s
6
Presentation software applications for network
5 Session
service
• Examples: SMTP, DNS, FTP
4 Transport

3 Network

2 Data Link
Human Machine
1 Physical Readable Readable
25

​ opyright © 2024 The Computing Technology Industry Association,


C
Inc. All rights reserved.
Activity: Unscramble the OSI Model

Network Session
Data Link
n
catio
Appli Transp
ort

Physical Presentation

Physical Data Link Network Transport Session Presentation Application

​ opyright © 2024 The Computing Technology Industry Association,


C 26
Inc. All rights reserved.
Lesson 1.3
SOHO Networks

​ opyright © 2024 The Computing Technology Industry Association, Inc.


C 27
All rights reserved.
Think About It
What is a SOHO router?
And what is it used for?

​Copyright © 2024 The Computing Technology Industry Association, Inc. All rights reserved.
28
SOHO Router – Physical Layer

​Copyright © 2024 The Computing Technology Industry Association, Inc. All rights reserved. 29
SOHO Router – Data Link Layer
• Ethernet switch
• Wireless access point
• Each host interface
identified by a MAC
address

​Copyright © 2024 The Computing Technology Industry Association, Inc. All rights reserved. 30
SOHO Router – Network Layer
• Forwards between local
private network and
public internet
• Runs a DHCP server to
provide each host with
an IP address
• Router’s WAN interface
given a public IP address

​Copyright © 2024 The Computing Technology Industry Association, Inc. All rights reserved. 31
SOHO Router – Transport and
Application
Application Layer
Request and
Response

Transport Transport
Layer Layer
Segmentation Reassembly

​ opyright © 2024 The Computing Technology Industry Association,


C 32
Inc. All rights reserved.
SOHO Router – The Internet
• WAN: SOHO connection to
Internet
• Public switched telephone
network (PSTN)
• High-bandwidth trunks
connecting IXPs
• ISP links between networks in
IXP datacenter

​Copyright © 2024 The Computing Technology Industry Association, Inc. All rights reserved. 33
Binary Numbers – Base 10

Ten- One- Hundred- Ten- One- Hundreds Tens Ones


millions millions thousands thousands thousands

Digit Digit Digit Digit Digit Digit Digit Digit


x 10,000,000 x 1,000,000 x x x x x x
100,000 10,000 1,000 100 10 1

​ opyright © 2024 The Computing Technology Industry Association,


C 34
Inc. All rights reserved.
Binary Numbers – Base 10

128 64 32 16 8 4 2 1

Digit x 128 Digit x 64 Digit x 32 Digit x 16 Digit x 8 Digit x 4 Digit x 2 Digit x 1

​ opyright © 2024 The Computing Technology Industry Association,


C 35
Inc. All rights reserved.
Binary Conversion

Let's look at how to convert 205 into binary.

128 64 32 16 8 4 2 1

Digit x 128 Digit x 64 Digit x 32 Digit x 16 Digit x 8 Digit x 4 Digit x 2 Digit x 1

1 1 0 0 1 1 0 1

​ opyright © 2024 The Computing Technology Industry Association,


C 36
Inc. All rights reserved.
Activity: Binary Conversion

Convert 132 into binary.

128 64 32 16 8 4 2 1

Digit x 128 Digit x 64 Digit x 32 Digit x 16 Digit x 8 Digit x 4 Digit x 2 Digit x 1

1 0 0 0 0 1 0 0

​ opyright © 2024 The Computing Technology Industry Association,


C 37
Inc. All rights reserved.
Lesson 1.4
Troubleshooting Methodology

​ opyright © 2024 The Computing Technology Industry Association, Inc.


C 38
All rights reserved.
Discussion: Think About It

What is troubleshooting?
What steps should be
involved in the
troubleshooting process?

​Copyright © 2024 The Computing Technology Industry Association, Inc. All rights reserved. 39
Troubleshooting Methodology

Document
Establish a Test the
Identify Establish a Implement findings,
theory of theory to Verify the
the plan of the actions,
probable determine solution
problem action solution and
cause cause
outcomes

​ opyright © 2024 The Computing Technology Industry Association,


C 40
Inc. All rights reserved.
Identify the Problem
Gather information

• System documentation
• Installation and maintenance logs
• Vendor support sites

Question users

• Open questions to
uncover information
• Closed question to invite a
yes or no or fixed response

​ opyright © 2024 The Computing Technology Industry Association,


C 41
Inc. All rights reserved.
Identify Problem Symptoms
Identify symptoms

• Physical inspection
• Logs and diagnostic software
• Try to duplicate the problem

Determine if anything has changed

• Did it ever work?


• What has changed since it was last working?

Approach problems individually

• Verify symptoms are related before


treating them as one single issue

​ opyright © 2024 The Computing Technology Industry Association,


C 42
Inc. All rights reserved.
Establish a Theory of Probable Cause

Troubleshooting styles

• Question the obvious


• Methodically prove the
functionality of each
component

OSI Model Approach

• Top-down approach
• Bottom-up approach

​ opyright © 2024 The Computing Technology Industry Association,


C 43
Inc. All rights reserved.
Test the Theory to Determine the Cause
Question the obvious

• Use one or more method-based approaches


• Don’t jump to conclusions

Escalation

• Problem is beyond your knowledge or ability


• Problem falls under a system warranty
• Scope of the problem is very large
• Customer is difficult or abusive

​ opyright © 2024 The Computing Technology Industry Association,


C 44
Inc. All rights reserved.
Implement, Verify, and Document
Implement changes

• Implement fixes
• Escalate if higher authorization is needed

Verify the solution

• Make sure the system seems to work for you


• Make sure the system seems to work for customer

Document

• Document findings, actions, and outcomes


• Logs are useful for future troubleshooting

​ opyright © 2024 The Computing Technology Industry Association,


C 45
Inc. All rights reserved.
Activity: Troubleshooting
Several office employees report their
computers are unable to connect to the
Internet, affecting workflow and productivity.

Document
Establish a Test the
Identify Establish a Implement findings,
theory of theory to Verify the
the plan of the actions,
probable determine solution
problem action solution and
cause cause
outcomes

​ opyright © 2024 The Computing Technology Industry Association,


C 46
Inc. All rights reserved.
Summary
• Remember OSI model’s 7 layers (physical, data link, network, transport,
session, presentation, and application)
• Plan network structure and troubleshoot issues using OSI model layers
• Implement methodical approach to troubleshooting (identification,
planning, execution, verification, and documentation)
• Use strategies like top-to-bottom, bottom-to-top, and divide-and-
conquer
​ opyright © 2024 The Computing Technology Industry Association, Inc.
C 47
All rights reserved.

You might also like