Upload
dan-sheets
View
237
Download
1
Embed Size (px)
Citation preview
7/27/2019 Comptia Network+ Study Sheet
1/30
2013
NETWORK+ STUDY
GUIDE
DAN SHEETS
7/27/2019 Comptia Network+ Study Sheet
2/30
NETWORK+ STUDY
Network+ Study Page 1
Contents
1. Network Fundamentalsa. The OSI Modelb. TCP/IP Suite
2. Network Topologies3. Cables and Connectors4. WAN technologies5. LAN Types and Properties6. Network Technologies & Protocols7. Network Addresses8. Routing
a. IPv4 and IPv6b. Properties of Routing
9. Network Devices / Standards10.Network Performance11.Network Tools12.Network Security13.Wireless Networking14.Authentication and Encryption
7/27/2019 Comptia Network+ Study Sheet
3/30
NETWORK+ STUDY
Network+ Study Page 2
The OSI Model
Developed by OSI (Open Systems Interconnection) Reference model to define basic stands for network communication
Protocol A set of rules and procedures used for communication Standards of Communication
o Packagingo Addressingo Paymento Getting the package on the network
Application Layer
Data is Data
End users interact with the network at this layer HTTP, FTP, SMTP, Telnet, DNS, TFTP, POP3, Proxy Servers
Presentation Layer
Data is Data
Concerned with Presentation of data Compression & Encoding Character set translations .tiff, .jpg, .mpeg
Session Layer
Data is Data
The Boss of the end to end connection Handles creation, maintenance and teardown
Transport Layer
Data placed into Segments
Handles delivery of data from one host to another TDP, UDP Uses Port numbers Novell Netware SPX runs at this layer Packet Filtering
Network Layer
Data placed into Packets
Routing occurs IP, ICMP, IGMP, ARP, RARP Packet Filtering
Data Link Layer
Data placed into Frames
MAC addresses Switches, bridges and Wireless Access points Performs error detection but NO recovery Uses FCS (Frame Check Sequence) Split into 2 Parts (LLC & MAC) LLC (Logical Link Control) Interacts with Network Layer MAC ( ) Interacts with Physical Layer MAC layer decides where one frame ends and another begins
Physical Layer Ones & Zeroes Physical and electrical specifications Hubs, repeaters and NICS Signal encoding occurs here (converting data to electrical signals)
7/27/2019 Comptia Network+ Study Sheet
4/30
NETWORK+ STUDY
Network+ Study Page 3
TCP/IP Suite
Architecture Based off the 4 layer DARPA model
Each of the 4 layers have individual protocols which work together to form a
protocol stack
Application Transport Internet Network Access
TCP Transmission Control Protocol
Connection oriented Ensure data arrives througho Acknowledgementso Timeout mechanism and retry mechanismo Sequence number tracking (amount of data and out of order)o Error recovery process
Transport layer of TCP/IP suite / OSI Layer 4 Packet Segmentation
o The numbering and Splitting of the data 3 Way Handshake (1. Syn 2. Syn/Ack 3. Ack)
o SYN Synchronize Sequence Numbero ACK Acknowledgement Number
Connection Termination 4 Packets TCP Window The amount of unacknowledged data a sender can send
on a connection before it gets an ack from the receiver
TCP Sliding Window
7/27/2019 Comptia Network+ Study Sheet
5/30
NETWORK+ STUDY
Network+ Study Page 4
IP
Best-Effort
Unreliable
Connectionless
The Internet Protocol (IP) is the principal communications protocol in theTCP/IP Suite
Has the task of delivering packets from the source host to dest. Basedsolely in IP addresses
Defines datagram structures that encapsulate the data to be delivered Uses a checksum to detect errors, packets are discarded
IPv4 Header
IPv6 Internet Protocol version 6 (IPv6) is the latest revision of the Internet Protocol (IP), thecommunications protocol that provides an identification and location system for
computers on networks and routes traffic across the Internet. IPv6 was developed by
the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of
IPv4 address exhaustion.
Advantages over IPv4o Plenty of Addresses 3.4 x 1038o Simplified the Internet Routing Tableso Easy and Automated Configurationo Security is Required
128 Bits long, displayed in 16 hexadecimal blocks Simplify by suppressing leading 0s, replace contiguous 0 sets with :: FE80:0000:0000:0000:05EE:00FF:0238:47B1 FE80::5EE:FF:238:47B1 Types of IPv6 Address
o Unicast (One to One) Global Addresses Public Addresses Valid on Internet Link-local Addresses (Similar to APIPA, FE80)
7/27/2019 Comptia Network+ Study Sheet
6/30
NETWORK+ STUDY
Network+ Study Page 5
Unique Local Addresses (Private- Begins with FC or FD)o Multicast (One to Many)o Anycast (One to One of Many)o Broadcast (One to All)
IPv6 Header
Network Topologies ( A Layout of a Network, which can be either physical or logical)
Bus
Semi-Outdated
Older
Also called Linear bus
Shared network segment with terminators at each end Easy to use, inexpensive, uses coaxial cable Easy to extend by adding cable with a repeater that boosts the
signal Serious Drawbacks
Only 1 Host can send data at a time All hosts see all data Not scalable Single point of failure Becomes slow by heavy network traffic Difficult to troubleshoot cable break or loose connector
will cause reflections and bring down the whole network
Uses less cable than other topologies Theoretically easiest to put together
Star Multiple hosts serving as the points of the star Most popular way to connect computers in a workgroup or
departmental network
Some fault tolerance; only the host connected to bad cable isaffected
Still a central point of failure (Center device) No shared segments No collisions Highly scalable Hosts can send data at any time
7/27/2019 Comptia Network+ Study Sheet
7/30
NETWORK+ STUDY
Network+ Study Page 6
Uses more cable than bus topology
7/27/2019 Comptia Network+ Study Sheet
8/30
NETWORK+ STUDY
Network+ Study Page 7
Ring Each host is connected to the two closest hosts Commonly used in token ring networks Advantages
One computer cannot monopolize the network Continue to function after capacity is exceeded but the
speed will be slow
Disadvantages Failure of one computer can affect the whole network Difficult to troubleshoot Adding/Removing computers disrupts the network
Token Ring Only the computer with the token can transmit Stations can be given transmission priority over others Defined by IEEE 802.5 Token BUS is defined by IEEE 802.4 Runs at 4, 16, 100 and 1000 Mbps Scalable, the more hosts you have, the longer hosts have to wait to
transmit
Uses a central MAU (Multi-Station Access Unit) or SMAU (Smart)
Network Types LAN local Area Network CAN Campus Area Network MAN Metropolitan Area Network WAN Wide Area Network (Internet)
Converged Network A network transporting multiple types of trafficATM Asynchronous transfer Mode
High Speed cell switching technology Cells are only 53 bytes in size (48 Data, 5 header) Cells are fixed in size Connection-oriented
7/27/2019 Comptia Network+ Study Sheet
9/30
NETWORK+ STUDY
Network+ Study Page 8
FDDI Fiber-Distributed Data Interface Range is 60 miles via fiber-optic cable Built in fault tolerance through use of dual rings Speeds up to 100 MBPS Token passing technology WAN technology
Full and Partial Mesh Full Mesh each host has at least two connections When all nodes are connected to each other fully connected network Because of scalability, Mesh networks are uncommon Advantages
Point-to-point line configuration makes isolation of faults easy Messages travel through dedicated line, privacy and security are
enhanced
Best fault tolerance Dedicated links ensure each connection carries its own data load
Disadvantages The more extensive the networks, greater investment to build N(N-1) / 2 = Number of connections
Partial Mesh Only some nodes are organized in a full mesh Hybrid Mesh The Internet runs on Hybrid Mesh
Mixture of different topologies
7/27/2019 Comptia Network+ Study Sheet
10/30
NETWORK+ STUDY
Network+ Study Page 9
Standard Cable and Connectors
Twisted Pair STP Shielded Twisted Pair UTP Unshielded Twisted Pair RJ45 Connector CAT cabling is Twisted Pair
CAT CAT 3: 10 Mbps CAT 5: 100 Mbps CAT 5e: 1000 Mbps CAT 6: 1000 Mbps CAT 6a: 1000 Mbps All categories can travel up to 100 Meters before reduction of signal
Fiber Optic Cable Uses light pulses instead of electricity to transmit data Singlemode: Smaller core, Laser based, Long distances Multimode: Larger core, LED based, Shorter distances Benefits
o More Secureo Not Susceptible to EMIo Very Fast, Long Distances
Drawbackso More expensiveo Not as flexible
SC ST LC MT-RJ
Coaxial 4 Layerso Copper Coreo Inner Insulatoro Shielding Wire Mesho Outer Insulator
Thinnet (RG-58)o 10 Mbpso 185 Meters Attenuationo BNC Connector
Thickneto 10 Mbpso 500 Meters Attenuationo AUI DB-15 Connector
RG-59 & RG-6o Used for cable TVo F-Connector
Serial (RS-232) 9 Pin Male or Female
7/27/2019 Comptia Network+ Study Sheet
11/30
NETWORK+ STUDY
Network+ Study Page 10
Plenum Grade Cable Non plenum cable insulation can be toxic when
burned
RJ-11 Connector used for Analog phones
BNC A miniature quick connect/disconnect RF connector
used for coaxial cable. It features two bayonet lugs on
the female connector; mating is achieved with only a
quarter turn of the coupling nut. They are used with
radio, television, and other radio-frequency electronicequipment, test instruments, video signals, and was
once a popular connector for 10BASE2 computer
networks
F-Connector Coaxial RF connector commonly used for "over the
air" terrestrial television, cable television and
universally for satellite television and cable modems
Cable Faults Split Pair Two wires incorrectly mapped in exactly the same way on bothends of the cable
Far-end crosstalk signal bleedover between pairs in the same wire at thefar end of the cable. Not detectable with a tone generator and locator Delay skew the difference between the lowest and the highest
propagation delay measurements for the wires in a cable. Not detectable
by tone generator
Short Circuit -
7/27/2019 Comptia Network+ Study Sheet
12/30
NETWORK+ STUDY
Network+ Study Page 11
WAN Technology (Type of Switch, Speed, Media, Distance)
Frame Relay
Nodes connected
through a packet
switching cloud
Connection-Oriented
Packet-switching WAN
technology
Most VCs are Permanent
Virtual Circuits (PVCs)
A Frame Relay Cloud is
the frame providers
network of Frame RelaySwitches
Circuit Switching A physical connection path is established between the source and thedestination typically through a series of circuits
Packet Switching Data is broken into packets which then each take a separateindependent route to the destination where they are reassembled
E1/T1
(E)uropean Version
T-carrier - Sometimes abbreviated as T-CXR, refers to one of severaldigital transmission systems developed by Bell Labs. T-carriers are used
in North America, South Korea, and Kyoto.
E-carrier system, which revised and improved the earlier American T-carrier technology, and this has now been adopted by the InternationalTelecommunication Union Telecommunication Standardization Sector
(ITU-T). This is now widely used in almost all countries outside the US,
Canada, and Japan.
Smart Jack: The actual termination of a T1 LineT-carrier and E-carrier
systems
North American Japanese European (CEPT)
Level zero (channel
data rate)
64 kbit/s (DS0) 64 kbit/s 64 kbit/s
First level 1.544 Mbit/s (DS1) (24
user channels) (T1)
1.544 Mbit/s (24 user
channels)
2.048 Mbit/s (32 user
channels) (E1)
(Intermediate level, T-carrier hierarchy only)
3.152 Mbit/s (DS1C)(48 Ch.)
Second level 6.312 Mbit/s (DS2) (96
Ch.) (T2)
6.312 Mbit/s (96 Ch.),
or 7.786 Mbit/s (120
Ch.)
8.448 Mbit/s (128 Ch.) (E2)
Third level 44.736 Mbit/s (DS3)
(672 Ch.) (T3)
32.064 Mbit/s (480
Ch.)
34.368 Mbit/s (512 Ch.) (E3)
Fourth level 274.176 Mbit/s (DS4)
(4032 Ch.)
97.728 Mbit/s (1440
Ch.)
139.264 Mbit/s (2048 Ch.)
(E4)
Fifth level 400.352 Mbit/s (DS5)
(5760 Ch.)
565.148 Mbit/s (8192
Ch.)
565.148 Mbit/s (8192 Ch.)
(E5)
ADSL Asymmetric Digital Subscriber Line allows POTS and data transmittedsimultaneously
SDSL Symmetric Digital Subscriber Line cannot share data transmission with POTSVDSL Very High Speed Digital Subscriber Line Allows Max Bandwidth available on
standard phone line ( 13 55 Mbps)
Cable Modem Provides high speed Internet connections using a broadband cableconnection
Satellite High Speed Internet
7/27/2019 Comptia Network+ Study Sheet
13/30
NETWORK+ STUDY
Network+ Study Page 12
Typically used where DSL and Cable Internet are not availablePON Passive optical Network
Fiber to the premisesE3/T3 T3: 44.736 MBPS(DS3 basically 28 T1 Lines)
Wireless Provided through WIFI Hotspots 4G (WiMAX, LTE, HSPA+)
ATM Asynchronous Transfer Mode Advanced packet switching network using fixed length packets (53 bytes) Provides data rates up to 622 Mbps
SONET Synchronous Optical Network Divided into OC Levels (Optical Carrier Levels)
o OC-1 = 51.84 Mbpso OC-24 = 1.244 Gbps
MPLS
Uses Labeling
Multiprotocol Label Switching Technique Not a service
ISDN Integrated Services Digital Network
o BRI: Basic Rate 2 64K B-Channels / 1 16K D-Channello PRI: Primary Rate 23 64K B-Channels / 1 64K D-Channel
POTS Plain Old Telephone Service
PSTN Public Switched Telephone Network
VPN Virtual Private Networko Allows travelling users to connecto Uses Tunneling Protocols (PPTP, L2TP)
7/27/2019 Comptia Network+ Study Sheet
14/30
NETWORK+ STUDY
Network+ Study Page 13
LAN Types & Properties
Ethernet Bonding: Taking 2 or more cables, allowing them to act together
Format: How Fast / Base / Type of Cable
T=Twisted Pair
5-4-3 Rule: 5 Cable Segments, 4 Repeaters, 3 mixing Segments10BaseT Standard Ethernet100BaseTX Fast Ethernet / 100 Mbps / Twisted Pair100BaseFX Fast Ethernet / 100 Mbps / Fiber Optic1000BaseT Gigabit Ethernet / 1000 Mbps / Twisted Pair1000BaseX Gigabit Ethernet / 1000 Mbps / Fiber Optic10GBaseSR Variations of Fiber Optic
10000 Mbps10GBaseLR10GBaseER
10GBaseSW
10GBaseLW
10GBaseEW
10GBaseT Twisted PairCSMA/CD Carrier Sense Multiple Access with Collision DetectionBroadcast The transmitting of a packet that will be received by every device on the
network
Collision When 2 clients transmit at the same time Detected by an increase in voltage All data becomes unusable, is discarded
Cross Connect Cable which connects you to a backbone or providerPatch Panel A patch panel, patch bay, patch field or jack field is a number of circuits,
usually of the same or similar type, which appear on jacks for monitoring,
interconnecting, and testing circuits in a convenient, flexible manner
MDF / IDF Main Distribution Frame Intermediate Distribution Frame
Demarc The point at which the telephone company network ends and connects toyour wiring
7/27/2019 Comptia Network+ Study Sheet
15/30
NETWORK+ STUDY
Network+ Study Page 14
Network Devices
HUB HUB is a center device used to connect multiple computer and networkingdevice to each other, used in LANs
HUBs work on Physical layer in OSI model HUBs are a half duplex device Hubs broadcast all packets on all outgoing ports Passive hubDoes not amplify signals Active Hub Amplifies weak signals
Repeater In telecommunications, a repeater is an electronic device that receives asignal and retransmits it at a higher level or higher power, or onto the other
side of an obstruction, so that the signal can cover longer distances
Works on the Physical (1) layer of the OSI modelModem Device that modulates an analog carrier signal to encode digital information,
and also demodulates such a carrier signal to decode the transmitted
information.
NIC A network interface controller (NIC) (also known as a network interface card,
network adapter, LAN adapter and by similar terms) is a computer hardware
component that connects a computer to a computer network
Media Converters Used to convert from one form of media to another Most typical would be to convert between twisted pair copper and fiber
optic cable
Switch PoEo Power over Ethernet is used to transfer electrical power, along with
data, over standard twisted pair cable
STA - Spanning Tree Algorithmo Used by switches to determine the best route when there is more
than one connection to a node
VLANo Can be created in order to emulate multiple broadcast domains
using switches Trunking
o When a switch presents more than one VLAN configuration over asingle connection to another switch or router
Port Mirroringo Used to send a copy of network data to a second (mirrored)
connection usually for the purposes of monitoring
Port Authenticationo Used to restrict access based up authentication. Used in 802.11
(Wireless)
Basically a multiport bridge
Multi Layer Switcho Layer 3 switch (Can function based of IP addresses)o Content Switch (Ability to examine and filter higher level data)
Bridge Bridges operate at the Data link layer Simplistic routing tables based on MAC addresses Used to create separate collision domains
Wireless Access point Basically the same thing as a hub for wireless networksRouter Routers are used to connect networks together
7/27/2019 Comptia Network+ Study Sheet
16/30
NETWORK+ STUDY
Network+ Study Page 15
Routers have sophisticated network tables which can determine the bestroute to get information from one network to another
Functions at the network layer of the OSI model Used to create separate broadcast domains
Firewall Used to protect private networks from external intrusion Can control what data is allowed in or out of a network Can be hard or software
IDS/IPS Intrusion Detection System / Intrusion Prevention SystemLoad Balancer Used when more than one line of communication available
Distributes the bandwidth load Round Robin DNS:
Bandwidth Shaper Similar to load balancer, provides much higher level of controlProxy Server NAT Server (Disguise an end users identity)
Can cache requests to save on bandwidthCSU/DSU Channel Service Unit/Data Service unit
Hardware device which converts data frames used on a LAN into dataframes used on a WAN
Typically used to connect a T1 line to a local networkTelephone Devices 100 Pair UTP
66 block oldest standard for punchdown block 25 Pair UTP cables
110 Blocks
7/27/2019 Comptia Network+ Study Sheet
17/30
NETWORK+ STUDY
Network+ Study Page 16
Networking Technologies / Protocols
ARP
Address Resolution
Protocol
A Known IP address is resolved to a MAC address ARP allows a device to acquire the MAC address of a remote host when
only the IP address of the remote host is known
Keeps an ARP cache of known IP to MAC addresses In Windows, ARP utility displays IP to Physical translation tables
Proxy ARP Service that runs on routers Allows a router to respond to ARP requests from hosts Router will answer the ARP Request with the MAC address of the
interface received the request
Reverse ARP
OBSOLETE
Resolves a MAC address to an IP address A workstation boots up and realizes it has no IP address RARP request contains its own MAC address
UDP
Conectionless
User Datagram Protocol No guarantee of Delivery (Unreliable, Best effort Delivery) No error checking, no confirmation
DHCP
Dynamic Host
ConfigurationProtocol
Allows a server to dynamically distribute IP addressing andconfiguration information to clients
Provides IP address, Subnet Mask, Default Gateway, DNS & WINS, leaseLength
APIPA A Feature of Microsoft Windows, APIPA is a DHCP failovermechanism for local networks
4 Step Process DORA (Discover, Offer, Request, ACK)o Discover L3 Broadcasto Offer Contains IP and Masko Request Host decides which offer to accepto Ack Proper DHCP server gives the host additional information
(DNS Server, etc)
DHCP lease Renewalo DHCPREQUESTo DHCPACK
DHCP Relay Server DHCP Server
o TCP/IP service used to dynamically assign IP addresses on anetwork
o Responsible for managing the pool of IP addresses available tobe used on the network
ICMP
Internet Control
Message Protocol
Provides a mechanism for routers or dest. Hosts to communicate withsource hosts
Takes the form of specially formatted IP datagrams A required element in some implementations of TCP/IP Reports errors only about processing of non ICMP IP datagrams
DNS
Domain Naming
Service
Distributed Database for Internet Namespace Uses TCP and UDP port 53 Use UDP for queries, Use TCP for copying distributed database DNS Components
o DNS Servers TCP/IP service used to resolve host names to IP
7/27/2019 Comptia Network+ Study Sheet
18/30
NETWORK+ STUDY
Network+ Study Page 17
addresses
Responsible for maintaining a directory of names in adatabase and respond to client requests
o DNS Databaseo DNS Clients
Domain NamespaceRoot Domain (.)
o Top-Level Domain (net,com,org)o Second-Level Domain (Microsoft)o Sub-Domain (hq,Canada)o FQDN (sales.hq.microsoft.com) Sales server
DNS Zoneo A zone is an area of DNS namespace to which a DNS Server can
be authoritative (has the right to give definitive answers)
DNS Recordso A (Host IPv4)o AAAA (Host IPv6)o PTR (Pointer)o
CNAME (Alias)o MX (Mail Exchanger)
Dynamic DNSo Dynamic Updateso DHCP Integration
FTP Uses port 20,21 Listens on port 21, port 20 for data transfer FTP requires username & password, sends in plain text FTP allows anonymous FTP TFTP (Simplistic, Connectionless)
o Port 69o No security, does not require username/Password
HTTP(S) Hyper Text Transfer Protocol HTTP uses TCP Port 80 HTTPS uses TCP port 443 (Uses SSL (Secure Socket Layer)
SIP (Voip) Session Initiation Protocol can establish, modify and terminatemultimedia sessions or calls
Examples: Multimedia conferences, distance learning, Internet callsRTP (VoIP) Real-Time Transport Protocol provides end-to-end network transport
functions suitable for applications transmitting real-time data such as
audio, video, over multicast or network services
SSH Secure Shell Similar to Telnet but secure
Employs encryption through certificates and authenticates the server to theclient
TCP port 22POP3 Post Office Protocol
Used to retrieve Email TCP port 110
NTP Network Time Protocol Synchronizes distributed clocks to the millisecond
7/27/2019 Comptia Network+ Study Sheet
19/30
NETWORK+ STUDY
Network+ Study Page 18
UDP port 123IMAP4 Internet Message Access Protocol
Used to access all server-based messaging folders TCP port 143
Telnet Terminal emulation protocol that allows remote access to a system TCP port 23
SMTP Simple Mail Transfer Protocol Used for sending email TCP port 25
SNMP2/3 Simple Network Management Protocol Works by having network devices acting as agents, collecting information
and providing that information to SNMP managers
UDP port 161 Consists of 3 components: A management console software product
installed on a network computer, agents installed on the devices you want
to manage, and MIBs for each of the agents.
IGMP Internet Group Management Protocolo Communications protocol used by hosts and adjacent routers on IP
networks to establish multicast group memberships
o Integral part of IP multicastTLS Transport Layer Security establishing a secure connection between a
client and server
Capable of authenticating both client and the server creating an encryptedconnection between the two
Considered to be a replacement for SSLRDP Remote Desktop Protocol
Proprietary protocol developed by Microsoft
TCP Ports UDP PortsFTP 20,21 TFTP 69
SSH/SFTP/SCP 22 NTP 123
TELNET 23 DNS 53
SMTP 25 BOOTP/DHCP 67
DNS 53 SNMP 161
HTTP 80
POP3 110
IMAP4 143
HTTPS 443
7/27/2019 Comptia Network+ Study Sheet
20/30
NETWORK+ STUDY
Network+ Study Page 19
Network Address
MAC ADDRESSES
MAC Address Names MAC Address L2 Address Physical Address Hardware Address BIA (Burned In Address)
Format
12-23-F5-45-56-78
Theoretically each device has a unique MAC 6 Bytes, can be expressed with Dash -, Colon : or Decimal . First 3 bytes Organizationally Unique Identifier (OUI) Last 3 bytes Network Interface Controller (NIC)
MAC Broadcasts Has a destination of everyone Broadcast address is FF-FF-FF-FF-FF-FF (Case insensitive)
IPv4
Format 32 Bit Address Dotted Decimal Notation
Classes Class Networkoctets
NumberRange
MaxNetworks
Max Hosts Special IPAddresses
A 0 1 1 126 126 16,777,214 10.0.0.0B 10 2 128 191 16,384 65,534 142.222.0.0C 110 3 192 223 2,097,152 254 195.143.1.0D 1110 Multicasting 224 239E11110
Experimental 240 255
IPv6
Format 128 Bit Address Eight groups of 4 hex digits separated by colons
7/27/2019 Comptia Network+ Study Sheet
21/30
NETWORK+ STUDY
Network+ Study Page 20
Addressing Technologies
Subnetting Subnetting allows you to create multiple logical networks that exist within asingle Class A, B, or C network. If you do not subnet, you are only able to
use one network from your Class A, B, or C network, which is unrealistic
Subnet Mask: A 32 Bit combination used to describe which portion of anaddress refers to the subnet and which part refers to the host
Classful vs Classless Subnetso Classless addressing used a variable number of bits for the network
and host portions of the address
o Classless treats the IP address as a 32 bit stream of ones andzeroes, where the boundary between network and host portions
can fall anywhere between 0 and bit 31
Routing Protocolso Classful routing DO NOT send the subnet mask along with updateso Classless routing DO send the subnet mask along with updates
NAT (Network
Address Translation)
The process of modifying IP address information in IPv4 headers while intransit across a traffic routing device
PAT (Port Address
Translation)
An extension to network address translation (NAT) that permits multipledevices on a local area network (LAN) to be mapped to a single public IPaddress
The goal of PAT is to conserve IP addressesSNAT (Secure
Network Address
translation)
Provides a secure mechanism for translating internal, nonroutable addresses
into routable addresses. As traffic flows out of a data center, the gateway and
source address of IP packets are translated and switched to the appropriate
upstream gateway router. This ensures that traffic is sent and returned through
the desired path.
Public vs Private Public IP Addresses are used to navigate around in what today is known asthe Internet
Private IP Addresses are different from Public IP Addresses in the sense thatthey are not assigned to computers that can be located or reached over thelargest network in the world, or the Internet. These IP Addresses are
usually assigned by a router on a personal or smaller network such as a
home or office network. The individual routers that are routing the packets
from one computer to another are responsible for assigning these Private
IP Addresses.
o 10.0.0.0 to 10.255.255.255o 172.16.0.0 to 172.31.255.255o 192.168.0.0 to 192.168.255.255
Addressing Schemes
Unicast A method of sending IP datagrams to a single network destination
Multicast A method of sending IP datagrams to a group of receivers in a single
transmission
Broadcast Data is transmitted to ALL possible destinations
7/27/2019 Comptia Network+ Study Sheet
22/30
NETWORK+ STUDY
Network+ Study Page 21
ROUTING
IPv4 & IPv6 Routing Protocols
Link StateEach router communicatesall the networks it knowsabout to other routers towhich it is directly attached
OSPF (Open Shortest Path First)o Used in medium to large networkso Bases its paths off link stateso Can also use cost metrics to give performance to certain paths
IS-IS (Intermediate System to Intermediate System)o Intermediate system is another name for a routero Originally designed with the OSI model
Distance VectorEach router builds a mapof the entire network.LSAs (Link State
Advertisements) are usedto communicateinformation about networksthey are connected to
RIP (Routing Information protocol)o Maximum 15 hopso Originally had updates send every 30 secondso Does not support Authenticationo Uses broadcast communication
RIPv2o Maximum 15 hopso Supports Authenticationo Uses multicast communication
BGPo Core routing protocol of the interneto Typically used by ISPs
Hybrid EIGRP (Enhanced Interior Gateway Routing Protocol)o Evolved from IGRPo Uses the Diffusing-Update Algorithm (DUAL)o Each router keeps a copy of its neighbors routing tableso Each router periodically send out a hello packet to keep track of
the state of its neighbors
Properties of Routing
IGP vs. EGP IGP (Interior Gateway Protocol)o
A routing protocol used to exchange information within a LAN EGP (Exterior Gateway Protocol)
o A routing protocol used to route information outside a localnetwork, typically out to the Internet
Static vs. Dynamic Static Routingo All routers have to have their routing table configured and updated
regularly
Dynamic Routingo Routers communicate with each other to share their routing
information with each other
Hop One portion of the path between source and destination Each time packets are passed to the next device a hop occurs Hop Count the number of intermediate devices (like routers) through
which data must pass between source and destination
Routing Tables Used by network devices in order to determine where a packet should besent in an attempt to get it routed to its final destination
Convergence The process of all routers becoming aware of the changes to the network
Network Standards
7/27/2019 Comptia Network+ Study Sheet
23/30
NETWORK+ STUDY
Network+ Study Page 22
CSMA/CD
Carrier Sense Multiple
Access / Collision
Detection
Carrier Sense hosts listen to the wire before sending Multiple Access More than one host is doing this Collision Detection A hosts ability to detect that their data has been
involved in a collision
When signals collide change in voltage all data becomes unusableEach node will continue transmitting to ensure all nodes detect the
collision
When all nodes have detected the collision, the backoff algorithm isinvoked and transmission stops
Virtual LAN A single L2 device may be partitioned to create multiple distinctisolated broadcast domains
Can be configured through software Acts like an ordinary LAN, but connected devices dont have to be
physically connected to the same segment
802.1QIEEE Ethernet
Standards
(Institute of Electrical
and ElectronicsEngineers)
Half Duplex: Does not allow simultaneous sending & receiving Full Duplex: Does allow simultaneous sending & receiving 802.3: Defines Ethernet 10Base-2: ThinEthernet 10 MBPS 185 Meters 10Base-5: Thick Ethernet 10 MBPS 500 Meters 802.3i: 10BaseT, 10MBPS Range 100 Meters 802.3u: 100Base-t, 100 MBPS 802.3z: Gig Ethernet (1000 MBPS) 802.3ae: 10 Gig Ethernet (10000 MBPS) 802.11: Wireless Ethernet 802.1: Overall Internetworking Standards 802.2: Defines the LLC sub-layer of the Data Link Layer
Broadcast Storm A broadcast storm occurs when a network system is overwhelmed by
continuous multicast or broadcast traffic. When different nodes are
sending/broadcasting data over a network link, and the other network devicesare rebroadcasting the data back to the network link in response, this will
eventually cause the whole network to melt down and lead to the failure of
network communication
7/27/2019 Comptia Network+ Study Sheet
24/30
NETWORK+ STUDY
Network+ Study Page 23
Network Performance
QoS Quality of Service is a strategy used to control the flow of network traffic Administrators can provide preferential delivery for the applications which
need it
Traffic Shaping Used to enforce the control of network traffic One of the methods administrators use to ensure QoS is Traffic Shaping Generally traffic should be shaped based upon different priority factors
o Users, Applications, Time of DayLoad Balancing A General term which defines the use of more than one (insert variable) to
provide a service
Client needs are satisfied by the first available (insert variable) Sometimes clients needs can be satisfied by all available (insert variable) Variables
o Servers, Hard Drives, Transmission LinesHigh Availability a system design approach and associated service implementation that
ensures a prearranged level of operational performance will be met during
a contractual measurement period
Caching Engines Used to store information so it does not have to be retrieved off thenetwork multiple times
A proxy server is an example of a caching engine CARP (Cache Array Routing Protocol)
Fault Tolerance If something is fault tolerant then it means that in the event of a failure(fault) it will continue to function (tolerance)
RAID (Redundant Array of Independent Discs)Latency Sensitivity Latency-sensitive data is data whose retrieval or transmission must meet
certain time constraints in order to be acceptable to the user.
High Bandwidth
Applications
VoIP Video Applications
Uptime The uptime and reliability of computer and communications facilities issometimes measured in nines. Having a computer system's availability of99.999% means the system is highly available, delivering its service to the
user 99.999% of the time it is needed. In other words you get a total
downtime of approximately five minutes and fifteen seconds per year with
99.999% uptime.
7/27/2019 Comptia Network+ Study Sheet
25/30
NETWORK+ STUDY
Network+ Study Page 24
Network Command Line Tools
Traceroute (UNIX) View entire path a packet takes to get from one device to anotherTracert (Windows) View entire path a packet takes to get from one device to anotherIpconfig (Windows) Used to view TCP/IP configurationIfconfig (UNIX) Used to view TCP/IP configurationPing Used to check connectivity between networking devicesArp Used to view and manage the ARP cacheNslookup Used by Windows to troubleshoot DNS name resolution issues
Has both interactive and non-interactive modeHostname (Windows) Displays the host name portion of the full computer name of the computerDig (UNIX) Used by Unix to troubleshoot DNS name resolution issues
NSLOOKUP can also be used, but DIG is considered to be more powerful Does not have an interactive mode
Mtr (UNIX) Network Diagnostic Tool Combines the functionality of Traceroute and Ping
Route (BOTH) Used to view and manipulate the TCP/IP routing tableNbtstat Used to display NetBIOS statistics to assist in troubleshooting name
resolution issuesNetstat Used to display TCP/IP statistics and connectionsRoute Used to display and manage the routing table
Networking Hardware Tools
Cable Stripper Used to strip off the outer insulation of a cable when getting ready for aconnector
Snips / Wire Cutter Used to cut cablesCrimper Used to attach a connector on the end of a cableCable Tester Electronic device used to verify the electrical connections in a cable or
other wired assembly
Punch Down Tool Used to connect wire to a punch down blockTDR/OTDR A Time Domain Reflectometer is used to check the continuity of a coppercable
Optical Domain Reflectometer is used to check the continuity of a fiberoptic cable
Can be used to help locate a break in a cableToner Probe Used to locate the end of a cable
Made up of 2 components, a tone generator and a probeVoltage Event
Recorder
Used to monitor the quality of the power coming from a wall outletMultimeter Used to test a variety of information about cables, connectors and outletsButt Set Used to allow an administrator to butt in to a communication lineProtocol Analyzer Used to analyze network protocol (May be hardware or software)Loopback plug Also referred to as a loopback adapter is a connection device that is
plugged into a computers port in order to perform a loopback test
7/27/2019 Comptia Network+ Study Sheet
26/30
NETWORK+ STUDY
Network+ Study Page 25
Network Security
Attacks
Wireless Security
Threats
Rogue Access Point Access point placed on the network without theadministrators knowledge
Evil Twin WAP that is camouflaged as a legitimate hot spot to gatherpersonal or corporate information without the end users knowledge
Viruses Software which is designed to perform harm to a system which is loadedwithout the users permission
o Worms Can self propagate from system to systemo Trogan Horse Disguises itself as a harmless program to fool the
user into installing and/or executing it
Attacks Denial of Service (DoS) An attack which is not designed to steal ordestroy, but rather to overwhelm a system to the point that it cannot
perform normal functions
Distributed Denial of Service (DDoS) An attack in which a multitude ofcompromised systems attack a single target, causing denial of service for
users of the targeted system
Smurf Involves flooding a network with the same ICMP Echo Requestmessages used by Ping but sent to the networks broadcast address. Thesemessages are also spoofed; the source address field contains the IP address
of the computer that is the intended victim. This way, all the computers
receiving the broadcast will send their responses to the victim computer,
flooding its in-buffers.
Social Engineering (phising) Someone pretending to be somebody thatthey are not in order to gain your trust so you will share secret information
Man in the Middle An attacker gets between the sender and therecipient, intercepts information in transmission, and modifies the
transmission before passing it on
Buffer Overflow Occurs when more data is sent to an application than itcan process or store in the buffer
Packet Sniffing The process of capturing any data passed over the localnetwork and looking for any information that may be useful
FTP Bounce an exploit of the ftp protocol whereby an attacker is able touse the PORT command to request access to ports indirectly through the
use of the victim machine as a middle man for the request
Security Devices
Firewalls Used to control the flow of data Work by establishing a set of rules
o Allow all except (Explicit deny)o Block all except (Implicit deny)
Advanced firewall capabilities include:o Stateful Inspectiono Packet Filtering
DMZ (Demilitarized Zone)o Also called perimeter network
IDS (Intrusion
Detection System)
Can be host or network based Used to help an administrator recognize a possible attack on a network
system
IPS (Intrusion Similar functionality to an IDS, but will actively make changes to lock down
7/27/2019 Comptia Network+ Study Sheet
27/30
NETWORK+ STUDY
Network+ Study Page 26
Prevention System) the network or system if a potential intrusion is present
VPN Concentrator Hardware based VPN server. Used to setup a secure VPN connection withthe remote client before passing them on through to the internal network
NESSUS Comprehensive vulnerability scanning program. Detects potentialvulnerabilities on the tested systems by launching a series of attacks
NMAP A security scanner used to discover hosts and services on a computernetwork thus creating a map of the network
Security Methods Honeypotso A trap set to counteract attempts at unauthorized use of
information systems
Honeynetso A decoy network set up with intentional vulnerabilities; its purpose
is to invite attack so that attacker methods can be studied
Network Access Security
Access Control Lists
(ACLs)
A form of filtering used to control whether someone should be given accessto a network or system
o MAC Filteringo IP Filteringo PORT filtering
Tunneling and
Encryption
Virtual Private Networks (VPNs) are used to securely extend the internalnetwork out to remote clients
o Client-to-siteo Site-to-site
VPN Protocolso Point to Point Tunneling Protocol (PPTP)o Layer 2 Tunneling Protocol (L2TP)o IPSec
ISAKMP Uses The IP Authentication Header (AH) protocol
Encapsulates the payload of a datagram for transmissionacross a network
SSL (Secure Sockets Layer) TLS 2.0 (Transport Layer Security) SSL VPN
Remote Access Remote Access Service (RAS) Point to Point Protocol (PPP) Point to Point Protocol over Ethernet (PPPoE) Remote Desktop Protocol (RDP) Independent Computing Architecture (ICA) Secure Shell (SSH)
User Authentication Authenticationo The process of identifying a user or computer
Authorizationo The process of determining the level of access for a user or
computer
Accountingo The process of keeping a log of activity by a user or computer
RADIUS (Remote Authentication Dial In User Service)
7/27/2019 Comptia Network+ Study Sheet
28/30
NETWORK+ STUDY
Network+ Study Page 27
o Uses UDP connections TACACS+ (Terminal Access Controller Access Control System)
o Relies on TCP connections Kerberos
o Uses a secret key to keep authentication information (usernames &passwords) secure
o Uses a symmetric key encryption methodology so it is typicallyused within private networks where key management can behandled easily
o Allows for users to have a single sign-ono Can also be used for mutual authentication
Multifactor Authenticationo Using more than one form of authentication to identify a user
Something they know (Username, Password) Something they have (Physical, Smartcard) Something they are (Biometric, Fingerprint, Voice)
Public Key Infrastructure (PKI)o A term used to describe a network which has been fully configured
to use certificates and public key encryption Cryptography
o A process of applying an algorithm to clear text in order to convertit to cipher text
o Symmetric Key Encryption The same key is used to encrypt and decrypt data There needs to be a key for every unique communication Good for use in a small secure environment When used over an unsecure network an asymmetric key is
usually used to secure the exchange
o Asymmetric Key Encryption Key pairs are used to encrypt and decrypt data Key exchange and storage is simplified Good for use in a large unsecure environment The most common form of asymmetric encryption is
known as public key encryption
802.1x (A Secure network access control standard)o It is really a set of protocols and requirements which include
certificate services and RADIUS
o Typically used for secure wireless network access although it iscapable of securing wired networks as well
Remote Access Authentication Protocolso Password Authentication Protocol (PAP)o Challenge Handshake Allocation Protocol (CHAP)o Microsoft Challenge Handshake Allocation Protocol(v2) (MSCHAP &
MSCHAPv2)
o Extensible Authentication Protocol (EAP)
7/27/2019 Comptia Network+ Study Sheet
29/30
NETWORK+ STUDY
Network+ Study Page 28
Wireless Networking
Benefits of Wireless Networkingo No more cableso Easier to installo Connect networks through walls and other obstacleso Quickly allow temporary access
802.11 a/b/g/n Speeds Distance Channels Frequency
802.11a 54Mbps Less than 100feet
36,40,44,4852,56,60,64
5Ghz
802.11b 11Mbps 300Ft outdoors100Ft indoors
1 through 11 2.4Ghz
802.11g 54Mbps 300Ft outdoors100Ft indoors
1 through 11 2.4Ghz
802.11n 100Mbps 1000Ft 2.4Ghz &5Ghz
Components of a Wireless Access Point BSS (Basic Service Set) ESS (Extended Service Set) SSID (Service Set Identifer) ESSID (Extended Service Set Identifer) BSSID (Basic Service Set Identifier) BSA (Basic Service Area)
Wireless Access Point Placement must be consideredo Where are the clients locatedo Different hardware has different signal strengtho Antenna Type
Directional RF Interference
802.11n MIMO (Multiple in multiple out)Antenna Gain
Beam Widths (Horizontal and Vertical) Rear Lobe coverage Polarization Impedance, VSWR
7/27/2019 Comptia Network+ Study Sheet
30/30
NETWORK+ STUDY
Authentication and Encryption / Wireless Security
WPA Wireless Protected AccessWi-Fi Alliance
Name
Authentication
Mechanism
Cipher Suite Encryption
Mechanism
WPA-Personal Preshared Key TKIP RC4
WPA-Enterprise 802.1X/EAP TKIP RC4
WPA2-Personal Preshared Key CCMP (default)
TKIP (Optional)
AERS (Default)
RC4 (Optional)WPA2-Enterprise 802.1X/EAP CCMP (Default)
TKIP (Optional)
AES (Default)
RC4 (Optional)
802.1x Requires the use of Certificates and RADIUS Certificates can be used to provide a higher level of authentication of the
user and/or computer attempting to connect
A RADIUS server is used to centralize the connection requests to thewireless network
WEP Wired Equivalency Privacy Originally used 40 bit key, later advanced to 128 bit encryption Not secure, easily cracked
Radius Remote Access Dial In User Service (RADIUS) is a networking protocol thatprovides centralized Authentication, Authorization, and Accounting (AAA)
management for computers that connect and use a network service
Client/Server protocol that runs in the application layer Uses UDP as transport method
TKIP Temporal Key Integrity Protocol Designed as a solution to replace WEP without requiring replacement of
legacy hardware
MAC Filtering Specify what computers can connect to you WAP based upon the MAC address
of their wireless card