CompTIA Network+ (N10005)
✓ LAN / WAN ➢ LAN (Local Area Network) ● data network restricted to a single geographic location ● encompasses a relatively small area ● (examples) office, building, school, etc. ➢ WAN (Wide Area Network) ● spans more than one geographic location location ● connects separate LANs ➢ MAN (Metropolitan Area Network) ● WAN that is confined to a certain geographic area ● (example) university campus, city, etc.
✓ Network Models ➢ PeertoPeer ● decentralized network model ■ no centralized storage of data or control over the sharing of files or resources ● each computer serves as its own client and server ■ no admin is needed ● no more than 10 computers should be connected ➢ Client / Server ● centralized model ● services are managed from a central location ■ user management ■ security ■ backup procedures ● size is only limited by server size ● The role of the client computer is to request the data from the server ➢ Centralized Computing model ● one system provides both the data storage + processing power for client systems ➢ Distributed Computing model ● processing power distributed between client systems and server 1
✓ Wired Network Topologies ➢ Topology ● physical topology network’s physical layout of computer cables/devices ● logical topology the way in which the network appears to the devices that use it ➢ Bus ● all computers are connected to a single cable serving as the backbone ■ T Connectors used for systems to connect to backbone ● each end of the bus must be terminated ■ if not, it disrupts data transmissions ● one end also must be grounded ● a hub or switch is not needed ➢ Ring ● it is logical ● data travels in a circular fashion ● hub or switch is not needed ● if single system on ring fails, whole network fails ● when computers are added or removed from network, disruption occurs ● MSAU (Multi Access Unit) performs the token circulation ➢ Star ● all computers connect to a central device (hub or switch) ● each connected device requires a single cable to be connected ■ creates a pointtopoint (PtP) connection ● easiest to expand and add devices ● most popular ➢ Mesh ● each computer on network connects to every other computer ■ pointtopoint (PtP) with each computer ● provides high level of redundancy ● better fault tolerance ● to calculate number of connections in a mesh ■ y(y1)/2 ; y = # of computers | 5 computers = 10 connections ➢ Hybrid ● combines different kinds of topologies ➢ PtP (PointtoPoint) ● 2 computers connected directly to each other ● no need for a central device ● can be created using a crossover cable 2
● (example) computer connected to printer ➢ PtMP (PointtoMultiPoint) ● looks like a star network, but without a central connection ● has a single system acting as common source through which all members are connected ● had device that provides a path to any or all connected devices ➢ MPLS (Multiprotocol Label Switching) ● technology designed to speed up traffic flow ● creates a channel/path for packets to reach destination ● each packet is assigned a label ■ the label associates it with the specific path ● all packets with the same label use the same path ■ known as LSP (Label Switched Path) ● eliminates need to check the packet for forwarding at each hop ● reduces need to check routing tables
✓ Wireless Network Topologies ➢ Infrastructure ● used to extend a wired LAN to included wireless devices ● wireless devices communicate with the wired LAN through the WAP ● commonly used to extend a wired LAN to include wireless devices ● WAP forms a bridge between a wireless and wired LAN ● WAP must stay connected to the wired network ● there can be several wap to cover a large area, or a single wap for smaller areas ➢ Ad Hoc ● devices communicate directly between themselves without using an access point ● connect a small number of computers ● does not use an AP
✓ Virtual Networks ➢ VPN (Virtual Private Network) ● a secure communication channel across the public network, enabling access for a client to a private network ■ such as a company's internal network ● provides pointtopoint dedicated link between two points over a public IP network. ● establishes connection between remote clients and a private network 3
●
Components of VPN Connection ■ VPN client computer that initiates the connection ■ VPN server authenticates connections ■ Access method public network, sometimes a private intranet ■ VPN protocols ○ PPTP (PointtoPoint Tunneling Protocol) ○ L2TP (Layer 2 Tunneling Protocol) ○ enables authentication and encryption to protect data from general public ● LANtoLAN ■ when a VPN is used to connect one private LAN to another ➢ VLAN (Virtual Local Area Network) ● used for network segmentation ● Logical group of workstations ● segmentation is used for several reasons ■ security, organization, performance ● a group of connected computers that act as if they are on their own network segments ● VLan Membership ■ Protocolbased = assigned by their protocol in use and the Layer 3 ■ Portbased = the ports of the switch are configured to belong to the various VLAns ■ MAC addressbased = assigns membership according to the workstation’s MAC address ■ Subnetbased = the subnets of the IP addresses of individual computers are used to identify the VLAN to which it belongs { OSI +TCP/IP Models + Network Protocols }
✓ OSI Layers ➢ (Open System Interconnection) ➢ Describes a network architecture that enables data to be passed between computer systems ➢ Layer 1 Physical Layer ● Layer 1 Devices = NIC, Hub, Repeater, network cabling ● Defines the physical structure of the network and the topology ● Hardware ■ type of cable, connector, pinout format for cables 4
●
Topology ■ ring, mesh, star, bus ● defines voltage, frequency of signals, speed and bandwidth, maximum distance, multiplexing strategy ● Common problems = NIC failure or not properly seated, faulty hub or repeater, cut or damaged network cable ● bits the logical grouping of data at the Physical Layer ➢ Layer 2 Data Link Layer ● Layer 2 Devices: Bridge, Switch, NIC, AP ● Receives and puts data on the cable ● Provides error detection and correction ● Two sublayers: MAC and LLC ● responsible for getting data to Layer 1 (Physical Layer) ■ getting data on or off the cable ● responsible for error detection, error correction and hardware addressing ● When sending data: groups bits into packets for transmission over network ● When receiving data: takes packaged data and breaks it into individual bits for Layer 3 ● MAC Layer ■ (Media Access Control Layer) ■ MAC address is defined at this layer ■ (example) 00:A0:C9:14:C8:29 ○ First half of MAC address is ID number of the NIC manufacturer ○ Second half is the unique number assigned to the NIC by the manufacturer ● LLC Layer ■ (Logical Link Control Layer) ■ responsible for flowcontrol ○ Will make sure not too much data is being sent; waiting period for data is not too long; data that was damaged gats resent ■ CRC (Cyclic Redundancy Check) ○ provides error detection by using a calculated value ○ is a value that is added to the packet by the LLC on the sending end ○ it’s recalculated on the receiving end and compared to the original; if matches, data is ok ● frames / packets the logical grouping of data at the Data Link Layer 5
➢ Layer 3 Network Layer ● Layer 3 Devices: Switch, Router ● Handles the discovery of destination systems and addressing ● Manages network addresses ● when Receiving Data ■ reads data packets that are passed from Layer 2 ■ Checks packets for destination address ■ Compares destination address to its own IP address to determine if the packet should be passed up to Layer 4 ● when Sending Data ■ receives data from layer 4 ■ adds its own IP address to the packet as the source address ● ●
protocols at Layer 3 are responsible for route selection Datagrams / Packets the logical grouping of data at the Network Layer ➢ Layer 4 Transport Layer ● Provides connection services between sending and receiving devices ● Ensures reliable data delivery ■ correct sequence, without errors, fastest and most efficient flow rate possible ● Manages flow control through buffering or windowing ● Provides segmentation, error checking, and service identification ● Segmentation blocks of data need to be broken into packets of manageable sized for the lower layers (and opposite for upper layers) ● data is transferred over network in two ways: ■ UDP connectionless ○ excellent for data that must be delivered asap ○ (examples) video, walkitalkie radio, etc. ○ no confirmation ■ TCP connectionoriented ○ connection is established before communication begins ○ data is delivered in sections ○ confirmation system is used to make sure the data was delivered ● Data flow control ■ Buffering data is temporarily stored and waits for the destination device to become available ■ Windowing data is sent in groups of segments 6
➢ Layer 5 Session Layer ● Synchronizes the data exchange between applications on separate devices ➢ Layer 6 Presentation Layer ● Serves as translator between Layer 7 and Layer 5 ● Translates data from the formated used by applications into one that can be transmitted across the network ● Formats data from Layer 7 into format that can be sent over network ● Handles encryption and decryption of data ■ encryption scrambling of data so that it can’t be read by anyone other than the intended recipient ● Provides compression and decompression functionality ➢ Layer 7 Application Layer ● Provides access to the network for applications ● Take requests and data from the users and pass them to the lower layers of the OSI model ● provides full enduser access to network services ● this is where bits (0s and1s), MAC and IP addresses are translated so ppl can understand it
✓ TCP/IP Model TCP/IP Model
OSI Model
4. Application Layer
7. Application Layer 6. Presentation Layer 5. Session Layer
3. Transport Layer
4. Transport Layer
2. Internet Layer
3. Network Layer
1. Network Interface Layer
2. Data Link Layer 1. Physical Layer
7
✓ Protocol Ports Protocol
Port
FTP
20,21
SSH
22
Telnet
23
SMTP
25
DNS
53
DHCP (BOOTP server) 67 DHCP (BOOTP client)
68
TFTP
69
HTTP
80
POP3
110
NNTP
119
NTP
123
IMAP4
143
SNMP
161
HTTPS
443
RDP
3389
✓ Protocols ➢ IP (Internet Protocol) ● connectionless ● responsible for addressing and routing of packets between computers ● used to move data around a network ● Layer 3 Network Layer ➢ TCP (Transmission Control Protocol) ● Layer 4 ● connectionoriented 8
●
➢
➢ ➢
➢
➢
➢ ➢
➢
➢
➢
➢
responsible for guaranteed delivery of data ■ offers flow control, sequencing, retransmission of dropped packets ● TCP threeway handshake ■ 1. sends message called a SYN to the target host ■ 2. host sends back acknowledgement, ACK ■ 3. responds to the acknowledgement with another ACK ● breaks data into manageable packets ● tracks info such as source & destination of packets ● able to reroute packets UDP (User Datagram Protocol) ● connectionless ● Layer 4 Transport Layer DHCP (Dynamic Host Control Protocol) ● Gives out IP addresses FTP (File Transfer Protocol) ● used for transferring files between two remote systems ● uploads and downloads files to and from remote host ● basic filemanagement tasks ● Layer 7 Application Layer ● port 21 is mostly used in modern implementations, not 20 SFTP (Secure File Transfer Protocol) ● securely uploads and downloads files to and from remote host ● based on SSH security ● Layer 7 Application Layer TFTP (Trivial File Transfer Protocol) ● connectionless ● Layer 7 Application Layer SMTP (Simple Mail Transfer Protocol) ● HTTP (Hypertext Transfer Protocol) ● retrieves files from a web server ● Layer 7 Application Layer HTTPS (Hypertext Transfer Protocol Secure) ● secure protocol for retrieving files from a web server ● Layer 7 Application Layer POP3 / IMAP4 ● retrieves mail ● cannot send mail ● Layer 7 Application Layer Telnet ● enables sessions to be opened on a remote host ● Layer 7 SSH (Secure Shell) 9
➢
➢
➢ ➢
➢ ➢ ➢
➢ ➢ ➢ ➢
● port: 22 ● enables secure sessions to be opened on remote host ● or secure alternative to Telnet ● Layer 7 ICMP (Internet Control Message Protocol) ● used for error reporting, flow control, route testing ● Layer 3 ARP (Address Resolution Protocol) ● resolves IP addresses to MAC addresses to enable communication between devices ● Layer 2 RARP (Reverse Address Resolution Protocol) ● resolves MAC addresses to IP addresses NTP (Network Time Protocol) ● communicates time synchronization information between devices ● Layer 8 NNTP (Network News Transport Protocol) SCP (Secure Copy Protocol) LDAP (Lightweight Directory Access Protocol) ● Accesses and queries directory services systems ● Layer 7 IGMP (Internet Group Management Protocol) TLS (Transport Layer Security) SIP (Session Initiated Protocol) RTP (Realtime Transport Protocol) ● for transporting realtime data ● often used with VoIP ● Layer 7
✓ DNS (Domain Name Service) ➢ resolves hostnames to IP addresses ➢ before DNS the Internet used to use a text file called HOSTS to perform name resolution ➢ DNS Clients ● AKA resolvers ● systems that ask DNS servers for a hostnametoIP address mapping ➢ DDNS (Dynamic DNS) ● newer system that enables hosts to be dynamically registered with the DNS server ➢ DNS namespace ● space that has logical divisions hierarchically organized 10
.com .edu .uk .de ➢ FQDN (Fully Qualified Domain Name) ● domain name along with subdomains ● (example) www.comptia.org ■ www = host ■ comptia = secondlevel domain ■ .org = toplevel domain ➢ reverse lookup ● IP addresstohostname ● accomplished by using Pointer Records (PTR) ■
➢ DNS Records ● MX (Mail Exchange) ■ stores info about where mail for the domain should be delivered ● AAAA (IPv6) ■ Stores info for IPv6 addresses ■ it is commonly used to map hostnames to an IP address for a host ● CNAME (Canonical Name) ■ stores additional hostnames, or aliases, for hosts in domain ■ give single computer multiple names (aliases) ● PTR (Pointer) ■ used to perform a reverse DNS lookup ■ name is returned when query originates with an IP address ● SOA (Start of Authority) ■ record of info containing data on DNS zones and other DNS records ➢ WINS (Windows Internet Name Services) ● can be used to resolve NetBIOS names to IP addresses
✓ SNMP ➢ (Simple Network Management Protocol) ➢ protocol that makes NMS possible ● NMS = Network Management System ➢ used for monitoring information on a network ➢ performed through a software component called an agent ➢ monitor any device that is SNMP capable ● computers, printers, routers, servers, etc. ➢ MIB ● databases of info to define what parameters are accessible, readonly and can be set
11
➢ Communities logical groupings of systems. If device is part of a ‘community’ tit communicates only with other devices within it ➢ “traps” captures snapshot data of the system ● could be system errors, resource info etc. ➢ SNMPv2 ● enhancements on v1 ● includes bit strings, network addresses and counters ➢ SNMPv3 ● better security: authentication + encryption
✓ DHCP ➢ scopes ranges of IP addresses ➢ lease address that is assigned for a predetermined amount of time ➢ reservation when a specific address assigned to a client. IP always remains the same. ➢ exclusion certain IP addresses that are not to be given out ➢ DHCP is protocoldependent, not platformdependent. ➢ Can provide DNS suffixes to clients ● DNS Suffixes define DNS servers to be used and the order in which to use them ➢ Process ● 1. Client broadcasts dhcpdiscover packet ● 2. DHCP picks up the packet, compares request with scopes it has defined ● 3. DHCP sends address + lease duration through dhcpoffer packet ● 4. Client receives offer, determines if it is suitable ● 5. Client sends back dhcprequest packet ● 6. DHCP finalizes and sends dhcpack packet of acknowledgement { Addressing + Routing }
✓ IP Addressing ➢ IP Address defines the number of the network and the number of the node ➢ Subnet Mask defines which portion of the IP address refers to the network address and which refers to the node address ➢ Default Gateway path out of the network for a given device
12
●
➢ ➢ ➢ ➢ ➢ ➢ ➢
if system is not configured with any static routes or a default gateway, it is limited to operating on its own network segment Subnetting = increased number of network IDs; decreases number of node IDs Unicast = single address is specified. Data is delivered to a specific node. Broadcast = message goes to everyone on the network Multicast = a single source sends data to multiple destination addresses CIDR (Classless Interdomain Routing) ● method to assign addresses outside the standard ABC classes BOOTP = used to obtain info needed to connect to the network System that does not support APIPA will assign itself an IP address of 0.0.0.0.
IPv4
Loopback Address
IPv6
127.0.0.1
::1
Public IP ranges Class A: 1.0.0.0 126.255.255.255 Class B: 128.0.0.0 191.255.255.255 Class C: 192.0.0.0 223.255.255.255
Global Unicast Addresses
Private network addresses
Class A: 10.0.0.0 10.255.255.255 Class B: 172.16.0.0 172.31.255.255 Class C: 192.168.0.0 192.168.255.255
Sitelocal Address ranges FEC0::
Autoconfigured addresses
APIPA: 169.254.0.1 169.255.254.0
Linklocal Addresses FE80::
Networkwide addresses
✓ NAT (Network Address Translation) ➢ Enables a LAN to use a different set of IP addresses for internal traffic and another for external ➢ computers can “hide” behind a single IP address ➢ one registered IP address acts as the gateway between the internal and external networks ➢ to the remote host, the request looks like it is originating from a single address ➢ system performing NAT function keeps track of who asked for what and makes sure data is returned ➢ PAT (Port Address Translation) ● a service of NAT ➢ SNAT (Static NAT) ● maps a private IP to a static unchanging public IP address 13
✓ Routing ➢ Default Gateway ● is the router’s IP address ● help forward the packet to its destination network ● provides route for destinations outside the local network ● gateway can be a device, system or application that translates data from one format into another ➢ Routing Table ● Destination = the host IP address ● Network Mask = the subnet mask value for the destination ● Gateway = Where the IP address is sent ● Interface = address of interface used to send the packet of destination ● Metric = measurement of directness of a route, the lower the metric the faster the route ■ Hop Counts number of hops necessary to reach node. if it counts to infinity it means route is unreachable. ■ MTU (Maximum Transmission Unit) defines largest data unit that can be passed without fragmenting ■ Bandwidth maximum packet size permitted for transmission ■ Costs the lower the cost, the more that route should be favored ■ Latency amount of time it takes for packet to travel from one location to another ➢ routers get info for the routing table in two ways: static routing & dynamic routing
✓ Static Routing ➢ is manually entered into the routing table ➢ route add = command used to add a static route to the routing table ➢ route add p = makes the static route persistent
✓ Dynamic Routing ➢ routers pass info about themselves to other routers so that they can build routing tables ➢ uses 2 protocols: DistanceVector Routing & linkstate ➢ DistanceVector Routing ● each router on network communicates all the routes it knows about to the routers to which it is directly attached ■ RIP ○ limited to a max of 15 hops ○ requires updates every 30 seconds ○ no authentication 14
RIPv2 ○ authentication ○ limit 15 hops ■ BGP ○ pick best available route ■ EIGRP ○ uses neighbors to help determine routing table ○ keeps copy of their routing info ○ find best possible route ○ using DAUL (Diffusing Update Algorithm) ● Convergence time for the routers to detect and accommodate a change ● Routing Loops occur when routing tables on the routes are slow to update ■ Split Horizon to prevent routing loops ■ Poison Reverse to prevent routing loops ● Next Hop the next closest router that a packet can go through ■
➢ LinkState Routing ● build a map of entire network and then holds the map in memory ● updates occur less frequently ● OSPF (Open Shortest Path First) ■ leastcost path ■ used in medium to large enterprise networks ● ISIS ■ discovers shortest path for data to travel using Shortest Path First algorithm (SPF) ■ in large ISP networks
✓ STP (Spanning Tree Protocol) ➢ Actively monitors the network and shuts down redundant links to prevent switching loops ➢ Switching loops caused by having more than one path between two switches in a network ● STP prevents this ➢ STA is the algorithm STP uses to correct loops ➢ BPDU (Bridge Protocol Data Unit) ● used to identify the status of ports and bridges across the network ➢ redundant paths and loops can be avoided with ports by: ● blocking | disabled | forwarding | learning | listening
✓ Trunking 15
trunking is the use of multiple network cables Link Aggregation is another name for it the process of transferring VLAN traffic between multiple switches to connect the two (or more) switches together ● configure a port on each switch as a “trunk port” ● connect two switches via trunk ports ➢ IEEE 802.1Q is the trunk standard that now allows you to connect switches from different manufacturers ➢ ➢ ➢ ➢
✓ Port Mirroring ➢ monitors network traffic ➢ enables administrators to monitor the traffic outbound and inbound to the switch { Components + Devices }
✓ Bridges ➢ Connects LANs to reduce overall network traffic ● enables data to pass through it or prevent data from passing through it ■ done by reading MAC address ➢ divide larger networks into smaller sections ● sits between 2 physical network segments and manges flow of data between them ● can elect to forward the data or block it from crossing ➢ can connect two physical LANS into a larger logical LAN ➢ learning bridges can build a list of MAC address ➢ Bridge Placement ● 80% of data should be local ● 20% should be for other side of bridge ➢ Bridge Loops ● when more than one bridge is implemented on network ● Spanning Tree Protocol assigns value to bridge to be used to control bridgelearning process ➢ Transparent Bridge ● devices on network don’t see it ● used to segment a network ● reduces number of collisions and traffic ● blocs or forwards data based on the MAC address 16
➢ Source Route Bridge ● used in token ring networks ➢ Translational Bridge ● converts one networking data format to another
✓ NIC ➢ Link Light indicates whether a network connection exists ➢ Activity Light indicates activity, should flicker
✓ Switches ➢ Cutthrough packet just gets forwarded, no error check ➢ storeandforward error checked before forwarded ➢ Fragment Free faster at forwarding + checking
✓ CSU/DSU ➢ translates digital signals used on a LAN into those used in WAN
✓ Modems ➢ modulate/demodulate ➢ translates signals from analog to digital ➢ translates signals from digital to analog
✓ Media Converter ➢ interconnects older technologies with newer ones ➢ a hardware device ➢ connects newer Gigabit Ethernet technologies with older 100BaseT networks or older copper standards with fiber { Specialized Network Devices }
✓ Bandwidth Shaper ➢ Monitors and shapes ● identifies where bandwidth usage is high and the time of day ● shape bandwidth usage ➢ Traffic Shaping ● used to control bandwidth usage on the network ● control who uses bandwidth, for what purpose and what time 17
✓ Content Filter ➢ controls what a user is allowed to pursue ➢ block access to certain websites or a user
✓ Load Balancer ➢ ➢ ➢ ➢
workload is distributed between several servers increases redundancy and data availability increases performance by distributing workload can be either a hardware device or software
✓ Multilayer Switches ➢ Operates as a router + switch ➢ Layer 2 + Layer 3
✓ Content Switch ➢ ➢ ➢ ➢ ➢
identify and forward data by its port and application help distribute the load 1. examines the network data it receives 2. decides where the content is intended to go 3. then forwards it
✓ Proxy Server ➢ usually part of firewall system ➢ a server that sits between a client pc and Internet ➢ sends request as if it originated the request ● as if the request came from the proxy, not the client cp ➢ retrieves info and returns it to the client ➢ Caching ● makes a copy of all or part of the page in its cache ● when page is requested again, proxy server answers the request from the cache ➢ allows network admins to filter client requests ➢ can block access to certain websites ➢ ACL a list of allowed or unallowed websites 18
✓ Virtual Servers ➢ a single server can host multiple logical machines
✓ Virtual Switches ➢ ➢ ➢ ➢
allows multiple switches to exist on same host used with VLAN implementations can provide a direct challenge to the virtual Ethernet adapters for config info Open vSwitch an open source virtual switch
✓ Virtual PBX ➢ ➢ ➢ ➢ ➢
(Virtual Private Branch Exchange) phone system handles features such as call routing, voicemail, faxing.. etc. a service that is contracted out to a vendor routed through a vendor ● they are responsible for the equipment and software ● VoIP is used for routing the voice traffic
✓ Onsite / Offsite ➢ offsite data center hosted elsewhere and remotely accessed ➢ another vendor is responsible for maintaining hardware and software ➢ (example) Electronic Monitoring Company has data come in to servers in Colorado, but operates work with the data from workstations in Indiana
✓ NaaS (Network as a Service) ➢ vendors offer an entire network ● freeing a company from administration ➢ similar to Saas (Software as a Service) ➢ OpenStack is an open source NaaS implementation { Installation + Configuration }
✓ Demarcation Point ➢ point where the service provider stops being responsible for the line and it becomes the technicians responsibility 19
✓ Packet Switching messages are broken into smaller pireces called packets each packet is assigned source, destination and intermediate node address most popular switching 1. VirtualCircuit switching ● uses a logical connection between the source and the destination device ➢ 2. Datagram Circuit switching ● packets are independently sent and can take different paths through the network to reach their intended destinations ● packets can be routed around network congestion ➢ ➢ ➢ ➢
✓ Circuit Switching ➢ offers a dedicated transmission channel that is reserved until it is disconnected ➢ when transmission is complete, channel is closed ➢ after physical connection is established, it is unavailable to any other sessions until transmission completes
✓ ISDN ➢ ➢ ➢ ➢ ➢ ➢ ➢ ➢ ➢
used to transmit voice, video and data uses public network, requires dialin access can be used for circuitswitching connections can be used for packetswitching connections used with copper/fiberoptic leased from a service provider requires dialup access ISDN is faster than PSTN PSTN used when little traffic is sent over a line. most costeffective. limited to 56 Kbps ● requires dialup access
➢ ➢ ➢ ➢
D Channels carries signaling information B Channel carries the data BRI ISDN uses two B+1 D channels PRI ISDN uses 23 B+1 D channels
✓ TCarrier ➢ ➢ ➢ ➢
used to create pointtopoint network connections for private networks uses in circuit switching leased from telephone companies T1 ● 1.5 Mbps 20
● synonymous with DS1 ➢ T3 ● 4.7 Mbps ● synonymous with DS3 ➢ Fractional T leasing portions of a Tcarrier service
✓ ATM ➢ ➢ ➢ ➢
uses fixed cells that are 53 bytes long 1.544 Mbps to 622 Mbps Cell switching uses SVC + PVC
✓ Frame Relay ➢ operates at Layer 1 + Layer 2 ➢ a packetswitching technology ● PVC (Permanent Virtual Circuit) ■ a permanent dedicated virtual link ● SVS (Switched Virtual Circuit) ■ represents a temporary virtual circuit established and maintained only for the duration of a data transfer sesion
✓ SONET/OCx (Synchronous Optical Network) ➢ defines synchronous data transfer over optical cable ➢ delivers voice, data and video ➢ OCx (Optical Carrier) ● represent the range of digital signals that can be carried in a SONET fiberoptic networks ● each level defines the speed at which it operates ➢ SDH is the European counterpart of SONET ➢ DWDM works with SONET/SDH ➢ PON (Passive Optical Network) ● services a number of different locations ■ uses unpowered optical splitters to split the fiver
✓ DSL Internet Access ➢ uses a standard phone line to provide highspeed Internet access ➢ ADSL 21
● ● ● ● ●
provides a high data rate in only one direction fast download speeds but slower upload speeds designed to work with existing POTS service best for homeuse most common
● ● ●
1st Channel responsible for analog traffic 2nd Channel provides upload access 3rd Channel used for downloads
➢ HDSL ● ● ➢ SDSL ● ●
provides bidirectional high data service VHDSL faster version same speeds for both uploads and downloads cannot share a phone line
➢ Troubleshooting DSL ● Physical connections ● NIC ● Drivers ● protocol Configuration ● DSL LEDs
✓ Cable Internet Access ➢ Cable Modem ● uses coax connection for connecting to the provider’s outlet ● uses UTP connection for connecting directly to a system or to a hub or switch ● uses MDIX ● shares available bandwidth with everyone else in cable area
✓ Satellite ➢ Oneway Satellite system ● requires a satellite card and satellite dish installed at user’s site ● outgoing requests sent through phone line ● inbound traffic returns on satellite link ➢ Twoway Satellite System ● provides data paths for upstream and downstream data ➢ Rain Fade = signal loss due to moisture interference ➢ Latency = time lapse between sending info and time to return 22
➢ Line of sight = path between satellite dish and satellite
✓ Cellular ➢ LTE ● 4G ● upload speed = 50 Mbps ● download speed = 100 Mbps ➢ WiMax ● 4G ● upload speed: 56 = Mbps ● download speed = 1 Gbps ➢ HSPA+ ● 3G { Cabling + Wiring }
✓ Broadband vs Baseband Transmissions ➢ Baseband ● digital signals over a single wire ● bidirectional, but not at the same time ● TDM (Time Division Multiplexing) ■ divides a single channel into time slots ➢ Broadband ● use analog transmissions ● FDM (Frequency Division Multiplexing) ■ used to create multiple channels ➢ BPL (Broadband over Power Lines) ● transmit data over lines used for electrical power ● IEEE 1901 = for highspeed communication devices ● IEEE 105 = for hybrid home networks ● bpl = HomePlug
✓ Simplex / Half Duplex / Full Duplex ➢ Simplex = oneway communication of data through the network ➢ Halfduplex = transmitting + receiving but not at same time ➢ FullDuplex = simultaneously transmit and receive 23
✓ Noise ➢ any undesirable influence that degrades or distorts the signal ➢ EMI (Electromagnetic Interference) ● waves that emanate from electrical devices or cables ➢ RFI (Radio Frequency Interferences) ● caused by radio waves ➢ Crosstalk ● when two wires near each other and the signal from one infringes on signal traveling through the other wire ➢ Attenuation ● loss of signal strength as it moves farther from source ➢ Latency ● amount of time it takes electrons to move through the wire
✓ Cabling ➢ Twisted Pair ● STP (Shielded Twisted Pair) ■ Max Length = 100 meters ■ Foil around each pair prevents EMI ■ less susceptible to interference ■ are larger than UTP and less flexible due to shielding ● UTP (Unshielded Twisted Pair) ■ Susceptible to interference (fluorescent light) ■ 4 pairs of twisted wires, 8 wires total ■ Categories (max Length: 100 meters; 328 feet) ○ CAT1 – Standard telephone cable ○ CAT3 – 10 Mbps ○ CAT4 – 16 Mbps ○ CAT5 – 100 Mbps ○ used with RJ45 connectors ○ CAT5e – 1 Gbps ○ CAT6 – 10 Gbps (55 meters) ○ CAT6e – 10 Gbps (100 meters) ➢ Plenum area above suspended ceiling ● fire resistant cable ➢ Coax Cable ● Single core of copper ● Central conductor wire surrounded by insulation which is surrounded by a braided metal shield 24
● ●
●
●
●
Used for Cable Modems, ISP (Internet Service provider), Cable TV and Modembased internet connections All coax cables have an RG (Radio Grade) rating ■ The exam includes RG6 and RG59 (most commonly used) ■ both are rated at 75 Ohms RG49 ■ “Thinnet” / “10Base2” ■ Carries 10 Mbps of Ethernet data ■ Max length: 185 meters ■ 50 ohm impedance RG6 ■ “Thicknet” / “10Base5” ■ 10 Mbps ■ 50MHz or higher ■ Max length: 500 meters ■ 75 ohm impedance RG6/U ■ used for cable TV ■ 75 ohms of impedance ■ Max length: 300 meters
●
●
Connectors: ■ Ftype (most common) ■ BNC (older) screw by spinning on ■ 75 oh impedance Note: ■ “Baseband” (Base) only one signal at a time is sent onto the network medium ■ “Broadband” multiplexes the signals to allow multiple signals on the medium
➢ FiberOptic Cable ● shoots pulses of light ● MultiMode ■ larger core, 50 115 microns in diameter 62.5 microns most common ■ 10 Gbps ■ 500600 meters ■ uses LED (Light Emitting diodes) to send light signal ■ multiple sets of data at a time ● SingleMode ■ Narrow core, less than 10 microns ■ Data travels over single path 25
■ ■ ■ ■ ■
➢
➢
➢ ➢
Provides highest bandwidth and longest distance 1 Tbps uses Laser to send light signal 3000 meters 40 km Throughput up to 100 Gbps
Plenum ● area above suspended ceiling ● used to run network cables ● plenum cables create low smoke and low toxic fumes Coaxial Connectors ● BNC ● FConnectors Twisted Pair Connectors ● RJ45 Fiber Optic Connectors ● ST ● SC ● LC
✓ Wiring Standards ➢ T568A ● 1. GreenWhite ● 2. Green ● 3. OrangeWhite ● 4. Blue ● 5. BlueWhite ● 6. Orange ● 7. BrownWhite ● 8. Brown ➢ T569B ● (preferred standard) ● switch up green with orange ➢ if needed to connect T568A with type B, use a crossover cable
✓ Crossover Cable ➢ A standard network cable is wired using the T568A or B on each end (straightthrough wiring) ➢ Crossover cable has the A on one connector and B on the other side.
✓ Rollover Cable 26
➢ ➢ ➢ ➢
Cable that is used to connect to a Cisco Router for Configuration aka Yost Cable Almost 100% unique to Cisco routers called ‘rollover’ because the pinouts on one arc are reversed on the other end ● as if the wire has been rolled over and you are viewing it from the opposite side
✓ Loopback Cable ➢ used when troubleshooting a network issue ➢ used to identify if the problem is with the NIC ➢ tests NIC circuitry that sends and receives data within the NIC ● does not check the actual connection pins
✓ Network CrossConnects ➢ Horizontal cabling ● cabling that runs from work area to Telecom Room ● Run a single piece of cable running from the work area to Telecom room
✓ Patch Panel ➢ makes reconfiguring/moving cables safe and easy ➢ the front of a patch panel has female connectors (ports) for network cables ➢ The back of patch panel has permanent connections ● the horizontal cable runs are connected here ➢ Data flow can be changed by rearranging the patch cables plugged into the front of the patch panel
✓ MDF (Main distribution Frame) ➢ houses the network and telphone equipment that connects to the outside world
✓ IDF (Intermediate Distribution Frame) ➢ where all the horizontal runs come together
✓ Demarcation ➢ a location in the building where a connection is made to the outside world ➢ for telephone & computer networks ➢ everything inside the demarcation point is the responsibility of the network administrator or the company ➢ everything outside of demarcation point is the responsibility of service provider ➢ ➢ NIU (Network Interface Unit) 27
●
piece of equipment that established the demarcation point between your network and the service provider’s network ● First piece of equipment that is located inside the demarc point ● marks point where technicians responsibility begins with the network ● unit that allows network to interface with outside world ➢ Demarc Extension ● cable used to connect to the NIU ● for computer networks, 1st device inside the NIU is a powerful switch ➢ Nicknames for NIU ● Smart Jack ● NIB (Network Interface Box) ● NID (Network Interface Device)
✓ CSU / DSU ➢ used when troubleshooting a network issue ➢ used to identify if the problem is with the NIC ➢ tests NIC circuitry that sends and receives data within the NIC ● does not check the actual connection pins ➢ T1 (1.544 Mbps) ➢ T3 (45 Mbps) ➢ T1 and T3 connected telephone service to customer ➢ is the device that connects the T1 or T3 to your network ● channel service unit/ digital service unit ➢ A CSU/DSU is required on each end of the T1 or T3 line ● many new routers have it builtin to them ➢ European counterpart to T1 and T3 are E1 and D3 Carrier
Channels
Speed
T1
24
1.544 Mbps
T3
672
44.736 Mbps
E1
32
2.048 Mbps
E3
512
34.368 Mbps
28
✓ Boding ➢ ‘bond’ two NICs together as one single connection ➢ physically add another NIC card on the computer, then make another cable connection to the switch ➢ aka Link Aggregation ; NIC Teaming ➢ the Link Aggregation Control Protocol (LACP) controls how multiple network devices operate as a single connection
✓ 802.3 Ethernet Standards ** ➢ 10BaseT ● Cable Type: Cat3 & Cat5 ● Max Distance: 100 meters ● Bandwidth: 10 Mbps ➢ 100BaseTX ● Cable Type: Cat5 ● Max Distance: 100 meters ● Bandwidth: 100 Mbps ➢ 100BaseFX ● Cable Type: FiberOptic ● Max Distance: 412 meters ● Bandwidth: 100 Mbps ➢ 100BaseX ● Cable Type: Fiber Optic ● Max Distance: 70 km ● Bandwidth: 1000 Mbps (1 Gbps) ➢ 1000BaseT ● Cable Type: Cat5 & Cat5e & Cat6 ● Max Distance: 100 meters ● Bandwidth: 1000 Mbps (1 Gbps) ● 1000BaseX { Wireless }
✓ 802.11 Wireless Standards ➢ 802.11a ● Frequency: 5 GHz ● 54 Mbps 29
● Range: 20-45 meters ➢ 802.11b ● Frequency: 2.4 GHz ● 11 Mbps ● Range: 45 - 120 meters ● uses WEP for security ➢ 802.11g ● Frequency: 2.4 GHz ● 54 Mbps ● Range: 30 -100 meters ● compatible with 802.11a and 802.11b ➢ 802.11n ● Frequency: 2.4 GHz or 5 GHz ● 600 Mbps ● Range: 100 - 200 meters ● MIMO - device can use multiple antennas ● Compatible with 802.11b and 802.11g
✓ Encryption ➢ WEP (Wired Equivalent Privacy) ● 64-bit key ➢ WPA (WiFi Protected Access) ● 128-bit key ➢ WPA 2 ● 256-bit key (best encryption) ➢ Encryption Protocol ● TKIP ● AES ■ replaced TKIP ■ used in WPA2 ■ best encryption
✓ Extra Notes: ➢ Packet Sniffer ● used to capture network data ● hardware or software device ➢ Port Scanner ● mointor traffic coming into and out of ports
30