CompTIA Network Study Notes
CompTIA Network Study Notes
[Link] 1
CompTIA Network+ (Study Notes)
o Network Administrator
o Network Field Technician
o Network Engineer
o Network Analyst
[Link] 2
CompTIA Network+ (Study Notes)
[Link] 3
CompTIA Network+ (Study Notes)
[Link] 4
CompTIA Network+ (Study Notes)
• Network Resources
o Client/Server Model
▪ Uses dedicated server to provide access to files, scanners, printers, and
other resources
▪ Administration and backup are easier since resources are located on a
few key servers
o Benefits of Client/Server
▪ Centralized administration
▪ Easier management
▪ Better scalability
o Drawbacks of Client/Server
▪ Higher cost
▪ Requires dedicated resources
▪ Requires network operating system
o Peer-to-Peer Model
▪ Peers (PCs) share resources (files/printers) with each other directly
▪ Administration and backup are more difficult since resources are located
on a many PCs which adds to the administrative burden
[Link] 5
CompTIA Network+ (Study Notes)
o Benefits of Peer-to-Peer
▪ Lower cost
▪ No dedicated resources required
▪ No specialized operating system required
o Drawbacks of Peer-to-Peer
▪ Decentralized management
▪ Inefficient for large networks
▪ Poor scalability
• Network Geography
o Personal Area Network (PAN)
▪ Smallest type of wired or wireless network
▪ Covers the least amount of area (few meters)
▪ Examples:
• Bluetooth cellphone to car
• USB hard drive to laptop
• Firewire video camera to computer
o Local Area Network (LAN)
▪ Connects components in a limited distance
▪ Each segment is limited to short distances, such as 100 meters with CAT 5
cabling
▪ Consists of Ethernet (IEEE 802.3) or WiFi networks (IEEE 802.11)
▪ Examples:
• Internal wired or wireless networks
o Campus Area Network (CAN)
▪ Connects building-centric LANs across a university, industrial park, or
business park
▪ Covers many square miles and buildings
▪ Examples:
• College campus
• Business Parks
• Military bases
o Metropolitan Area Network (MAN)
▪ Connects scattered locations across a city
▪ Larger than a CAN, but smaller than a WAN
▪ Covers up to a 25-mile radius in larger cities
▪ Examples:
• City departments like the police department
• Community college with campuses spread across a county
o Wide Area Network (WAN)
▪ Connects geographically disparate internal networks
[Link] 6
CompTIA Network+ (Study Notes)
▪
Consists of leased lines or Virtual Private Networks tunneled over the
Internet
▪ Covers distances around the country or around the world
▪ Examples:
• The Internet (largest WAN)
• Connecting two private corporate networks from New York to
Seattle
o Network Geography
o Ring Topology
▪ Uses a cable running in a circular loop
▪ Each device connects to the ring, but data travels in a
singular direction
▪ FDDI (Fiber networks) used two counter-rotating rings for
redundancy
[Link] 7
CompTIA Network+ (Study Notes)
o Star Topology
o Hub-and-Spoke Topology
o Full-Mesh Topology
[Link] 8
CompTIA Network+ (Study Notes)
o Partial-Mesh Topology
[Link] 9
CompTIA Network+ (Study Notes)
[Link] 10
CompTIA Network+ (Study Notes)
OSI Model
• OSI Model Overview
o OSI Model (Open Systems Interconnection)
▪ Developed in 1977 by the International Organization for Standardization
(ISO)
▪ Called the OSI model or OSI stack
▪ Consists of 7 layers
▪ Useful in troubleshooting networks
▪ Serves as a reference model in networks
o Purpose of Reference Model
▪ Categorize functions of the network into particular layer(s)
▪ Compare technologies across different manufacturers
▪ By understanding its functions, you can understand how best
to communicate with that device
o OSI Model Layers
[Link] 11
CompTIA Network+ (Study Notes)
• Layer 1 (Physical)
o Physical Layer (Layer 1)
▪ Transmission of bits across the network
▪ Physical and electrical characteristics
▪ Characteristics:
• How bits are represented on the medium
• Wiring standards for connectors and jacks
• Physical topology
• Synchronizing bits
• Bandwidth usage
• Multiplexing strategy
o How are bits represented on the medium?
▪ Electrical voltage (copper wiring) or light (fiber optics) represent 1’s and
0’s (bits)
▪ Current State
• If 0 volts, then 0 is represented
• If +/- 5 volts, then 1 is represented
▪ Transition Modulation
[Link] 12
CompTIA Network+ (Study Notes)
[Link] 13
CompTIA Network+ (Study Notes)
[Link] 14
CompTIA Network+ (Study Notes)
[Link] 15
CompTIA Network+ (Study Notes)
• AppleTalk
• Internetwork Packet Exchange (IPX)
• Internet Protocol (IP)
▪ Only Internet Protocol (IP) remains dominant
• IP v4
• IP v6
o How should data be forwarded or routed?
▪ Packet switching (known as routing)
• Data is divided into packets and forwarded
▪ Circuit switching
• Dedicated communication link is established between two devices
▪ Message switching
• Data is divided into messages, similar to packet switching, except
these messages may be stored then forwarded
o Route Discovery and Selection
▪ Routers maintain a routing table to understand how to forward a packet
based on destination IP address
▪ Manually configured as a static route or dynamically through a routing
protocol
• RIP
• OSPF
• EIGRP
o Connection Services
▪ Layer 3 augment Layer 2 to improve reliability
▪ Flow control
• Prevents sender from sending data faster than receiver can get it
▪ Packet reordering
• Allows packets to be sent over multiple links and across multiple
routes for faster service
o Internet Control Message Protocol (ICMP)
▪ Used to send error messages and operational information about an IP
destination
▪ Not regularly used by end-user applications
▪ Used in troubleshooting (ping and traceroute)
o Examples at Layer 3
▪ Routers
▪ Multilayer switches
▪ IPv4 protocol
▪ IPv6 protocol
▪ Internet Control Message Protocol (ICMP)
[Link] 16
CompTIA Network+ (Study Notes)
• Layer 4 (Transport)
o Transport Layer (Layer 4)
▪ Dividing line between upper and lower layers of the OSI model
▪ Data is sent as segments
▪ TCP/UDP
▪ Windowing
▪ Buffering
o TCP (Transmission Control Protocol)
▪ Connection-oriented protocol
▪ Reliable transport of segments
• If segment is dropped, protocol detects it and resends segment
▪ Acknowledgements received for successful communications
▪ Used for all network data that needs to be assured to get to its
destination
o UDP (User Datagram Protocol)
▪ Connectionless protocol
▪ Unreliable transport of segments
• If dropped, sender is unaware
▪ No retransmission
▪ Good for audio/video streaming
▪ Lower overhead for increased performance
o TCP vs UDP
o Windowing
▪ Allows the clients to adjust the amount of data sent in each segment
▪ Continually adjusts to send more or less data per segment transmitted
[Link] 17
CompTIA Network+ (Study Notes)
[Link] 18
CompTIA Network+ (Study Notes)
▪ Responsible for formatting the data exchanged and securing that data
with proper encryption
▪ Functions
▪ Data formatting
▪ Encryption
o Data Formatting
▪ Formats data for proper compatibility between devices
• ASCII
• GIF
• JPG
▪ Ensures data is readable by receiving system
▪ Provides proper data structures
▪ Negotiates data transfer syntax for the Application Layer (Layer 7)
o Encryption
▪ Used to scramble the data in transit to keep it secure from prying eyes
▪ Provides confidentiality of data
▪ Example:
• TLS to secure data between your PC and website
o Examples at Layer 6
▪ HTML, XML, PHP, JavaScript, …
▪ ASCII, EBCDIC, UNICODE, …
▪ GIF, JPG, TIF, SVG, PNG, …
▪ MPG, MOV, …
▪ TLS, SSL, …
• Layer 7 (Application)
o Application Layer (Layer 7)
▪ Provides application level services
• Not Microsoft Word or Notepad
▪ Layer where the users communicate with the computer
▪ Functions:
• Application services
• Service advertisement
o Application Services
▪ Application services unite communicating components from more than
one network application
▪ Examples:
• File transfers and file sharing
• E-mail
• Remote access
• Network management activities
[Link] 19
CompTIA Network+ (Study Notes)
• Client/server processes
o Service Advertisement
▪ Some applications send out announcements
▪ States the services they offer on the network
▪ Some centrally register with the Active Directory server instead
▪ Example:
• Printers
• File servers
o Examples at Layer 7
▪ E-mail (POP3, IMAP, SMTP)
▪ Web Browsing (HTTP, HTTPS)
▪ Domain Name Service (DNS)
▪ File Transfer Protocol (FTP, FTPS)
▪ Remote Access (TELNET, SSH)
▪ Simple Network Management Protocol (SNMP)
[Link] 20
CompTIA Network+ (Study Notes)
TCP/IP Model
• TCP/IP Model
o TCP/IP Model
▪ Also known as TCP/IP stack or the DoD Model
▪ Alternative to the OSI Model
▪ More relevant model for network designers since it’s based on TCP/IP
▪ Only a 4-layer model
o OSI Model to TCP/IP Model
[Link] 21
CompTIA Network+ (Study Notes)
• RTP
o Application (Layer 4)
▪ Defines TCP/IP application protocols
▪ Defines how programs interface with the transport layer service
▪ Layer with which the user interacts
▪ Examples:
• HTTP, TELNET, FTP, SNMP, DNS, SMTP, SSL, TLS, …
• Data Transfer Over Networks
o Ports
▪ Port numbers can be 0 to 65,536
▪ “Well-known” & Reserved Ports
• Ports 0 to 1024
▪ Ephemeral Ports
• Short-lived transport port that is automatically selected from a
predefined range
• Ports 1025 to 65,536
o Data Transfer
o IPv4 Packets
▪ Source Address
• IP of sender
▪ Destination Address
• IP of receiver
▪ IP Flags
• Allows packet fragmentation
▪ Protocol
• Is this packet using TCP or UDP?
[Link] 22
CompTIA Network+ (Study Notes)
[Link] 23
CompTIA Network+ (Study Notes)
[Link] 24
CompTIA Network+ (Study Notes)
[Link] 25
CompTIA Network+ (Study Notes)
[Link] 26
CompTIA Network+ (Study Notes)
o Ports to Remember
[Link] 27
CompTIA Network+ (Study Notes)
o Coaxial Cables
▪ RG-6
• Commonly used by local cable companies to connect individual
homes
▪ RG-59
• Typically used to carry composite video between two nearby
devices
• Example:
o TV to the cable box
o Coaxial Connectors
▪ BNC
• Termed Bayonet Neill-Concelman or British Naval Connector
[Link] 28
CompTIA Network+ (Study Notes)
[Link] 29
CompTIA Network+ (Study Notes)
[Link] 30
CompTIA Network+ (Study Notes)
[Link] 31
CompTIA Network+ (Study Notes)
o Specialized SC Connectors
[Link] 32
CompTIA Network+ (Study Notes)
• Transceivers
o Copper vs Fiber Optic Cables
▪ Fiber-Optic Advantages
• Higher bandwidth
• Longer distances
• Immune to EMI
• Better security
▪ Copper Advantages
• Less expensive
• Easy to install
• Inexpensive tools
o Media Converters
▪ Convert media from one format to another
▪ Layer 1 device
• Physical conversion of signal only
▪ Examples:
• Ethernet to Fiber Optic
• Fiber Optic to Ethernet
• Coaxial to Fiber
• Fiber to Coaxial
o Transceivers
▪ Device that sends and receives data
▪ Bidirectional
• Devices take turns communicating
• Known as half-duplex
▪ Duplex
• Devices can both communicate at the same time (full duplex)
▪ GBIC
• Standard, hot-pluggable gigabit Ethernet transceiver (copper or
fiber)
▪ Small Form-factor Pluggable
(SFP)
• Compact, hot-pluggable optical module transceiver
• Support up to 4.25 Gbps
• Known as Mini-GBIC
▪ SFP+
• Enhanced SFP
• Support up to 16 Gbps
▪ Quad Small Form-factor Pluggable (QSFP)
• Compact, hot-pluggable optical module transceiver
[Link] 33
CompTIA Network+ (Study Notes)
[Link] 34
CompTIA Network+ (Study Notes)
[Link] 35
CompTIA Network+ (Study Notes)
Ethernet Fundamentals
• Ethernet Fundamentals
o Ethernet Fundamentals
▪ In early computer networks, there were many different network
technologies competing for a portion of the market share
▪ Ethernet, Token Ring, Fiber Distributed Data Interface (FDDI), and others
fought for dominance
▪ Currently, Ethernet is dominant for Layer 1
▪ Due to Ethernet’s popularity, it is important to understand the
fundamentals of Ethernet
o Origins of Ethernet
▪ Was first run over coax cables (10Base5, 10Base2)
▪ Ethernet has changed to using twisted pair cables
▪ 10BASE-T is Unshielded Twisted Pair
• Maximum speed: 10 Mbps
• Maximum distance: 100 meters
o How should devices access the network?
▪ Deterministic
• Very organized and orderly
• Need an electronic token to transmit
• For example, Token Ring networks
▪ Contention-based
• Very chaotic
• Transmit (almost) whenever you want
• For example, Ethernet networks
o Carrier Sense Multiple Access/ Collision Detect (CSMA/CD)
▪ Ethernet devices transmit based on a principle called carrier sense
multiple access/collision detect (CSMA/CD)
▪ Carrier sense
• Listen to the wire, verify it is not busy
▪ Multiple access
• All devices have access at any time
▪ Collision detect
• If two devices transmit at the same time, a collision occurs
• Back off, wait a random time, and try again
[Link] 36
CompTIA Network+ (Study Notes)
o Example of CSMA/CD
o Collision Domains
▪ Comprised of all devices on a shared Ethernet segment (everything on
same cable or hub)
▪ Devices operate at half-duplex when connected to a hub (Layer 1 device)
▪ Devices must listen before they transmit to avoid collisions when
operating as CSMA/CD
o Collision Domains with Switches
▪ Ethernet switches increase scalability of the network by creating multiple
collision domains
▪ Each port on a switch is a collision domain, no chance of collisions, and
increases speed
▪ Switches can operate in full-duplex mode
[Link] 37
CompTIA Network+ (Study Notes)
o Speed Limitations
▪ Bandwidth is the measure of how many bits the network can transmit in
1-second (bps)
▪ Type of cable determines the bandwidth capacity of the network
o Distance Limitations
[Link] 38
CompTIA Network+ (Study Notes)
o Hub
▪ Layer 1 device used to connect multiple network devices/workstations
▪ Known as multiport repeaters
▪ Three basic types of Ethernet hubs:
• Passive hub
o Repeats signal with no amplification
• Active hub
o Repeats signal with amplification
• Smart hub
o Active hub with enhanced features like SNMP
o Collision Domains
▪ Hubs (layer 1) were used to connect multiple network segments together
▪ Each LAN segment becomes a separate collision domain
o Bridges
▪ Bridges analyze source MAC addresses in frames entering the bridge and
populate an internal MAC address table
▪ Make intelligent forwarding decisions based on destination MAC address
in the frames
[Link] 39
CompTIA Network+ (Study Notes)
o Switch
▪ Layer 2 device used to connect multiple network segments together
▪ Essentially a multiport bridge
▪ Switches learn MAC addresses and make forwarding decisions based on
them
▪ Switches analyze source MAC addresses in frames entering the switch
and populate an internal MAC address table based on them
o Layer 2 Switch
▪ Each port on a switch represents an individual collision domain
▪ All ports belong to the same broadcast domain
[Link] 40
CompTIA Network+ (Study Notes)
[Link] 41
CompTIA Network+ (Study Notes)
o Router
▪ Layer 3 device used to connect multiple networks together
▪ Make forwarding decisions based on logical network address information
• Such as using IP addresses (IPv4 or IPv6)
[Link] 42
CompTIA Network+ (Study Notes)
▪ Routers are typically more feature rich and support a broader range of
interface types than multilayer switches
▪ Each port is a separate collision domain
▪ Each port is a separate broadcast domain
o Layer 3 Switch
▪ Layer 3 device used to connect multiple network segments together
▪ Can make Layer 3 routing decisions and interconnect entire networks
(like a router), not just network segments (like a switch)
[Link] 43
CompTIA Network+ (Study Notes)
[Link] 44
CompTIA Network+ (Study Notes)
[Link] 45
CompTIA Network+ (Study Notes)
[Link] 46
CompTIA Network+ (Study Notes)
o First-Hop Redundancy
▪ Hot Standby Router Protocol (HSRP) uses virtual IP and MAC addresses to
provide a “active router” and a “standby router”
• HSRP is a Cisco-proprietary protocol
• If Active is offline, then standby answers
o Other First-Hop Redundancy Protocols
▪ Gateway Load Balancing Protocol (GLBP)
• Cisco-proprietary protocol
▪ Virtual Router Redundancy Protocol (VRRP)
• Open-source protocol
▪ Common Address Redundancy Protocol (CARP)
• Open-source protocol
o MAC Filtering
▪ Permits or denies traffic based on a device’s MAC address to improve
security
o Traffic Filtering
▪ Multilayer switches may permit or deny traffic based on IP addresses or
application ports
[Link] 47
CompTIA Network+ (Study Notes)
o Without STP…
▪ MAC Address table corruption can occur
o Broadcast Storms
▪ If broadcast frame received by both switches, they can forward frame to
each other
[Link] 48
CompTIA Network+ (Study Notes)
▪ Designated Port
• Every network segment has a designated port
• Port closest to the root bridge in terms of cost
[Link] 49
CompTIA Network+ (Study Notes)
o Port States
▪ Non-designated ports do not forward traffic during normal operation, but
do receive bridge protocol data units (BPDUs)
▪ If a link in the topology goes down, the
non-designated port detects the failure and determines whether it needs
to transition to a forwarding state
▪ To get to the forwarding state, though, it has to transition through four
states
▪ Blocking
• BPDUs are received but they are not forwarded
• Used at beginning and on redundant links
▪ Listening
• Populates MAC address table
• Does not forward frames
▪ Learning
• Processes BPDUs
• Switch determines its role in the spanning tree
▪ Forwarding
• Forwards frames for operations
▪ Root and Non-designated port are blocking
▪ Designated ports are forwarding
[Link] 50
CompTIA Network+ (Study Notes)
o Link Costs
▪ Associated with the speed of a link
▪ Lower the link’s speed, the higher the cost
▪ Long STP is being adopted due to higher link speeds over 10 Gbps
▪ Values range from 2,000,000 for 10-Mbps Ethernet to as little as 2 for 10
Tbps
[Link] 51
CompTIA Network+ (Study Notes)
o Using VLANs
▪ Same switches but switch ports can be in different VLANs
o VLAN Trunking (802.1q)
▪ Multiple VLANs transmitted over the same physical cable
▪ VLANs are each tagged with 4-byte identifier
• Tag Protocol Identifier (TPI)
• Tag Control Identifier (TCI)
▪ One VLAN is left untagged
• Called the Native VLAN
• Specialized Network Devices
o Specialized Network Devices
▪ Many other types of network devices besides routers, switches, servers,
and workstations
▪ Others devices serve specific functions to improve usability, performance,
and security
▪ Devices include
• VPN concentrators
• Firewalls
• DNS servers
• DHCP servers
• Proxy servers
• Content engines and switches
o VPN Concentrator
▪ Virtual private network (VPN) creates a secure, virtual tunnel network
over an untrusted network, like the Internet
▪ One of the devices that can terminate VPN tunnels is a VPN concentrator,
although firewalls can also perform this function
o Firewalls
▪ Network security appliance at your boundary
▪ Firewalls can be software or hardware
▪ Stateful firewalls
• Allows traffic that originates from inside the network and go out
to the Internet
• Blocks traffic originated from the Internet from getting into the
network
[Link] 52
CompTIA Network+ (Study Notes)
[Link] 53
CompTIA Network+ (Study Notes)
[Link] 54
CompTIA Network+ (Study Notes)
o Proxy Server
▪ Device that makes a request to external network on behalf of a client
▪ Used for security to perform content filtering and logging
▪ Workstation clients are configured to forward their packets to a proxy
server
o Content Engine
▪ Dedicated appliances that perform the caching functions of a proxy
server
▪ Are more efficient than a proxy server
▪ Also called Caching Engines
[Link] 55
CompTIA Network+ (Study Notes)
o Content Switches
▪ Distributes incoming requests across the various servers in the server
farm
▪ Also known as Load Balancers
[Link] 56
CompTIA Network+ (Study Notes)
[Link] 57
CompTIA Network+ (Study Notes)
o Virtual Desktops
▪ User’s desktop computer is run in browser
▪ Used from web, laptop, tablet, or phone
▪ Easier to secure and upgrade for the admins
[Link] 58
CompTIA Network+ (Study Notes)
[Link] 59
CompTIA Network+ (Study Notes)
[Link] 60
CompTIA Network+ (Study Notes)
[Link] 61
CompTIA Network+ (Study Notes)
Wireless Networks
• Wireless Networking (WLAN)
o Wireless Networks (WLANs)
▪ Allows users to roam within a coverage area
▪ Popularity has increased exponentially
▪ Convenient to use and expand network access throughout a room, floor,
or building
▪ IEEE 802.11 is the most common type
▪ Other wireless options exist (used for PAN)
• Bluetooth
• Infrared (IR)
• Near-Field Communications (NFC)
• Ant+
• Z-Wave
o Ad Hoc
▪ Wireless devices communicate
directly with each other
without the need for a
centralized access point
▪ Peer-to-Peer connections
o Infrastructure
▪ Wireless devices communicate
with other wireless or wired
devices through a wireless
router or access point
▪ Traditional WiFi in Home and
Office networks
[Link] 62
CompTIA Network+ (Study Notes)
[Link] 63
CompTIA Network+ (Study Notes)
o Mesh Topology
▪ May not use a centralized control
▪ Range of combined wireless defines network
▪ Uses WiFi, Microwave, Cellular, and more
o AP Placement
▪ Careful planning is required to
prevent the APs from interfering
with one another and still
maintaining the desired
coverage area in ESS
▪ Coverage should overlap
between APs to allow
uninterrupted roaming from one
cell to another but can’t use
overlapping frequencies
[Link] 64
CompTIA Network+ (Study Notes)
o AP Placement (5 Ghz)
▪ Identical channels should be separated by at least two cells instead of
one
o Site Surveys
▪ Wireless survey to determine coverage areas
▪ Produces a heat map with coverage
[Link] 65
CompTIA Network+ (Study Notes)
o Unidirectional Antenna
• Wireless Frequencies
o Spread Spectrum Wireless Transmissions
▪ Direct-Sequence Spread Spectrum (DSSS)
▪ Frequency-Hopping Spread Spectrum (FHSS)
▪ Orthogonal Frequency-Division Multiplexing (OFDM)
▪ Only DSS and OFDM are commonly utilized in today’s WLANs
o Direct-Sequence Spread Spectrum (DSSS)
[Link] 66
CompTIA Network+ (Study Notes)
[Link] 67
CompTIA Network+ (Study Notes)
[Link] 68
CompTIA Network+ (Study Notes)
[Link] 69
CompTIA Network+ (Study Notes)
[Link] 70
CompTIA Network+ (Study Notes)
o Geofencing
▪ GPS or RFID defines real-world boundaries
▪ Barriers can be active or passive
▪ Device can send alerts if it leaves area
▪ Network authentication can use it to determine access
o Disable SSID Broadcast
▪ Configures an AP to not broadcast the name of the wireless LAN
▪ Problem:
• Knowledgeable users can still easily find the SSID using wireless
sniffing tools
o Rogue Access Point
▪ Malicious users set up an AP to lure legitimate users to connect to the AP
▪ Malicious users can then capture all the packets (data) going through the
rogue access point
[Link] 71
CompTIA Network+ (Study Notes)
IP Addressing
• IPv4 Addressing
o Internet Protocol Version 4 (IPv4) Addressing
▪ Written in dotted-decimal notation
• [Link]
• [Link]
▪ Each IPv4 address is divided into 4 separate numbers and divided by dots
▪ Each of these division are call octets due to having 8 bits assigned
▪ 32-bits in length
o IPv4 Addressing
▪ IPv4 address is divided into network and host portions
▪ Subnet mask defines the network portion
• Network portion if a binary 1
• Host portion if binary 0
o Classes of IP Addresses
▪ Default subnet mask assigned by first octet
• Classful Masks if using default subnet mask
▪ Defines the Class of IP Address
Notice that 127 is skipped between Class A and Class B. It is a reserved block for the loopback address ([Link])
o Routable IPs
▪ Publicly routable IP addresses are globally managed by ICANN
• Internet Corporation for Assigned Names and Numbers
o ARIN, LACNIC, AFNIC, APNIC, and RIPE NCC
▪ Public IP’s must be purchased before use through your Internet Service
Provider
[Link] 72
CompTIA Network+ (Study Notes)
o Private IPs
▪ Private IP’s can be used by anyone
▪ Not routable outside your local area network
▪ Network Address Translation (NAT) allows for routing of private IPs
through a public IP
o Specialized IPs
▪ Loopback addresses (127.x.x.x range)
• Refers to the device itself and used for testing
• Most commonly used as [Link]
▪ Automatic Private IP Addresses (APIPA)
• Dynamically assigned by OS when DHCP server is unavailable and
address not assigned manually
• Range of 169.254.x.x
[Link] 73
CompTIA Network+ (Study Notes)
▪ Multicast
• Data travels from a single source device to multiple (but specific)
destination devices
▪ Broadcast
• Data travels from a single source device to all devices on a
destination network
• Assigning IP Addresses
o Assigning IP Addresses
▪ Static
• Simple
• Time-consuming
• Prone to human errors
• Impractical for large networks
▪ Dynamic
• Quicker
• Easier
[Link] 74
CompTIA Network+ (Study Notes)
• Less confusing
• Simplistic for large networks
o Components of an IP Address
▪ Information assigned from static or dynamic
• IP Address
• Subnet Mask
• Default Gateway
• Server addresses
o DNS
▪ Converts domain names to IP address
o WINS (optional)
▪ Converts NetBIOS computer name into an IP
address
o Dynamic Host Control Protocol (DHCP)
Configuration
▪ Based on the older Bootstrap Protocol
(BOOTP for short)
• Required static database of IP
and MAC to assign
▪ DHCP service assigns an IP from an
assignable pool (scope)
▪ IP Address Management is a piece of
software used to manage the IP’s
being assigned
o Dynamic Host Control Protocol (DHCP)
▪ Provides clients with
• IP
• Subnet mask
• Default gateway
• DNS server
• WINS server
• Other variables needed for VoIP
▪ Each IP is leased for a given amount of time and given back to the pool
when lease expires (TTL)
[Link] 75
CompTIA Network+ (Study Notes)
[Link] 76
CompTIA Network+ (Study Notes)
[Link] 77
CompTIA Network+ (Study Notes)
[Link] 78
CompTIA Network+ (Study Notes)
• Subnetting
o Subnetting
▪ Default classful subnet masks are rarely the optimal choice for a subnet
size
▪ Subnets can be modified using subnet masks to create networks that are
better scoped
▪ Creating a subnet involves borrowing bits from the original host portion
and adding them to the network portion
o Purpose of Subnets
▪ More efficient use of IP addresses than classful default
▪ Enables separation of networks for security
▪ Enables bandwidth control
[Link] 79
CompTIA Network+ (Study Notes)
o Subnet Masks
[Link] 80
CompTIA Network+ (Study Notes)
o Listing Subnets
[Link] 81
CompTIA Network+ (Study Notes)
[Link] 82
CompTIA Network+ (Study Notes)
• Subnetting Practice
[Link] 83
CompTIA Network+ (Study Notes)
[Link] 84
CompTIA Network+ (Study Notes)
• IPv6 Addresses
o Internet Protocol Version 6 (IPv6)
▪ We’ve essentially ran out of IPv4 addresses due to proliferation of
networked devices
▪ IPv6 addressing provides enough IP addresses for generations to come
▪ Enough IPv6 addresses for every person on the planet (5 x 10 28)
[Link] 85
CompTIA Network+ (Study Notes)
[Link] 86
CompTIA Network+ (Study Notes)
o Multicast
▪ Data travels from a single source device to multiple (but specific)
destination devices
o Anycast
▪ Designed to let one host initiate the efficient updating of router tables for
a group of hosts
▪ IPv6 can determine which gateway host is closest and sends the packets
to that host as though it were a unicast communication
▪ That host can anycast to another host in the group until all routing tables
are updated
▪ Data travels from a single source device to the device nearest to multiple
(but specific) destination devices
[Link] 87
CompTIA Network+ (Study Notes)
Routing
• Routing Fundamentals
o Routing Fundamentals
▪ Traffic is routed to flow between subnets
▪ Each subnet is its own broadcast domain
▪ Routers are the layer 3 devices that separate broadcast domains, but
multilayer switches are also used
[Link] 88
CompTIA Network+ (Study Notes)
• Routing Tables
o Routing Decisions
▪ Layer 3 to Layer 2 Mapping
• Router’s use ARP caches to map an IP address to a given MAC
address
▪ Make packet-forwarding decisions based upon their internal routing
tables
o Routing Tables
▪ Table kept by the router to help determine which route entry is the best
fit for the network
▪ A route entry with the longest prefix is the most specific network
▪ [Link]/24 more specific than [Link]/8
[Link] 89
CompTIA Network+ (Study Notes)
o Static Routes
[Link] 90
CompTIA Network+ (Study Notes)
o Routing Loops
[Link] 91
CompTIA Network+ (Study Notes)
• Routing Protocols
o Internal and Exterior Routing Protocols
▪ Interior Gateway Protocols (IGP)
• Operate within an autonomous system
▪ Exterior Gateway Protocols (EGP)
• Operated between autonomous systems
[Link] 92
CompTIA Network+ (Study Notes)
[Link] 93
CompTIA Network+ (Study Notes)
[Link] 94
CompTIA Network+ (Study Notes)
o Metrics
▪ If a routing protocol knows multiple paths to reach a network, how does
it choose its path?
• Metrics are the values assigned to a route
• Lower metrics are preferred over higher metrics
▪ Metrics calculated differently for each protocol (RIP, OSPF, IS-IS, EIGRP,
and BGP)
• Hop count
• Bandwidth
• Reliability
• Delay
• Other metrics
o Routing Protocol Summary
[Link] 95
CompTIA Network+ (Study Notes)
[Link] 96
CompTIA Network+ (Study Notes)
• Multicast Routing
o Multicast Routing
▪ Multicast sender sends traffic to a Class D IP Address, known as a
multicast group
▪ Goal
• Send the traffic only to the devices that want it
▪ Two primary protocols
• Internet Group Management Protocol (IGMP)
• Protocol Independent Multicast (PIM)
o Internet Group Management Protocol (IGMP)
▪ Used by clients and routers to let routers known which interfaces have
multicast receivers
▪ Used by clients to join a multicast group
▪ Versions
• IGMPv1
o Clients requests joining the group and is asked every 60
seconds if it wants to remain in the group
• IGMPv2
o Client can send a leave message to exit multicast group
• IGMPv3
o Client can request multicast from only specific server
o Called source-specific multicast (SSM)
o Allows multiple video streams to single multicast
[Link] 97
CompTIA Network+ (Study Notes)
[Link] 98
CompTIA Network+ (Study Notes)
[Link] 99
CompTIA Network+ (Study Notes)
o Circuit-Switched Connection
▪ Connection is brought up only when needed, like making a phone call
▪ On-demand bandwidth can provide cost savings for customers who only
need periodic connectivity to a remote site
o Packet-Switched Connection
▪ Always on like a dedicated leased line, but multiple customers share the
bandwidth
▪ SLAs used to guarantee a certain quality
(5mbps at least 80% of the time)
▪ Virtual circuits are represented as dashed lines
[Link] 100
CompTIA Network+ (Study Notes)
[Link] 101
CompTIA Network+ (Study Notes)
o Metro Ethernet
▪ Service providers are beginning to offer Ethernet interfaces to their
customers
▪ Less expensive and more common than specialized serial ports used in a
CSU/DSU
▪ Technology used by service provider is hidden from customer and they
only need to connect their network’s router to a Smart Jack
o Point-to-Point Protocol (PPP)
▪ Commonly used Layer 2 protocol on dedicated leased lines to
simultaneously transmits multiple Layer 3 protocols (IP, IPX)
▪ Each Layer 3 control protocol runs an instance of PPP’s Link Control
Protocol (LCP)
• Multilink interface
o Allows multiple physical connections to be bonded
together into a logical interface
• Looped link detection
o Layer 2 loop can be detected and prevented
• Error detection
o Frames containing errors can be detected and discarded
• Authentication
[Link] 102
CompTIA Network+ (Study Notes)
[Link] 103
CompTIA Network+ (Study Notes)
[Link] 104
CompTIA Network+ (Study Notes)
[Link] 105
CompTIA Network+ (Study Notes)
[Link] 106
CompTIA Network+ (Study Notes)
Network Security
• CIA Triad
o Network Security Fundamentals
▪ Networks are increasingly dependent on interconnecting with other
networks
▪ Risks exist not just on the untrusted Internet, but also inside our own
organization’s networks and must be minimized or eliminated
▪ Understanding the various threats facing our networks is important in
order to best defend the network against the onslaught of cyber-attacks
they are constantly facing
o Network Security Goals
▪ Commonly called the CIA Triad
• Confidentiality
• Integrity
• Availability
o Confidentiality
▪ Keeping the data private and safe
• Encryption
• Authentication to access resources
▪ Encryption ensures that data can only be read (decoded) by the intended
recipient
• Symmetric encryption
• Asymmetric encryption
o Symmetric Encryption (Confidentiality)
▪ Both sender and receiver use the same key
▪ DES (Data Encryption Standard)
• Developed in the mid-1970s
• 56-bit key
• Used by SNMPv3
• Considered weak today
▪ 3DES (Triple DES)
• Uses three 56-bit keys (168-bit total)
• Encrypt, decrypt, encrypt
▪ AES (Advanced Encryption Standard)
• Preferred symmetric encryption standard
• Used by WPA2
• Available in 128-bit, 192-bit, and 256-bit keys
[Link] 107
CompTIA Network+ (Study Notes)
▪ Sender and receiver use the same key to encrypt and decrypt the
messages
o Integrity
▪ Ensures data has not been modified in transit
▪ Verifies the source that traffic originates from
▪ Integrity violations
• Defacing a corporate web page
[Link] 108
CompTIA Network+ (Study Notes)
[Link] 109
CompTIA Network+ (Study Notes)
▪ Causes data to flow through the attacker’s computer where they can
intercept or manipulate the data
[Link] 110
CompTIA Network+ (Study Notes)
o Session Hijacking
▪ Attacker guesses the session ID for a web session, enabling them to take
over the already authorized session of the client
o Botnets
▪ Software robot that lies on a compromised computer
▪ Collection of computers (called zombies) can be controlled by a remote
server to perform various attacks/functions for the criminals
• Network Security Attacks (Part 2)
o Attacks on Availability
▪ Attack vary widely from consuming server resources to physically
damaging the system
• Denial of service (DoS)
• Distributed Denial of Service (DDoS)
• TCP SYN flood
• Buffer overflow
• ICMP attacks (Smurf)
• UDP attacks (Fraggle)
• Ping of Death
• Electrical disturbances
• Physical environment attacks
o Denial of Service
▪ Continually floods the victim system with requests for services and
causes the system to run out of memory and crash
[Link] 111
CompTIA Network+ (Study Notes)
o Electrical Disturbance
▪ Launched by interrupting or interfering with electrical service available to
a system
▪ Uninterruptable power supply (UPS), line conditioners, and backup
generator can help to combat these threats
▪ Examples
• Power spikes
• Electrical surges
• Power faults
• Blackouts
• Power sag
• Brownout
[Link] 112
CompTIA Network+ (Study Notes)
o Physical Environment
▪ Computing equipment can be damaged by influencing the physical
environment
• Temperature
o Attacker disturbs the HVAC to overheat your systems
• Humidity
o Create a high level of moisture/humidity
• Gas
o Inject gas into an environment that could ignite
▪ Threats generally mitigated through physical restrictions, access
credentials, and visual monitoring
• Network Security Attacks (Part 3)
o Other Attacks to Consider
▪ Insider Threats
▪ Phishing
▪ Ransomware
▪ Logic Bombs
▪ Deauthentication
▪ VLAN Hopping
o Insider Threats
▪ Employees or other trusted insiders who use their network access to
harm the company
o Logic Bomb
▪ Specific type of malware that is tied to a time or logical event
o Phishing
▪ Attackers send email to get a user to click link
o Ransomware
▪ Attackers gain control of your files, encrypt them, and hold them for a
ransom
o Deauthentication
▪ Attacker sends a deauthentication frame a victim to disconnect them
from the network
▪ Often used in wireless hacking attacks
o VLAN Hopping
▪ Attacker physically connects to a different switch port to access a
different VLAN
▪ Manually assigning switch ports and using NAC can help prevent this
• Protecting the Network
o Protecting the Network
▪ To successfully defend a network attacks use
[Link] 113
CompTIA Network+ (Study Notes)
• Physical controls
• User training
• Patching
• Vulnerability scanners
• Honey pots and Honey nets
• Remote-access security
• Security policies
• Incident response
o Physical Controls
▪ Reduces unauthorized access
▪ Mantraps
▪ Keypads
▪ Locked facilities
▪ Authenticated access
• Badges
• Biometrics
• Key fobs
• Passwords/Pins
o User Training
▪ Users present one of the greatest vulnerabilities to the network
▪ Training should include
• Social engineering awareness
• Virus transmission dangers
• Password security
• E-mail security
• Physical security
o Vulnerability Scanners
▪ Periodically test the network to verify that network security components
are behaving as expected and to detect known vulnerabilities
▪ Vulnerability scanners are applications that conduct these tests
▪ Examples
• Nessus
• Zenmap
• Nmap
o Patching
▪ Designed to correct a known bug or fix a known vulnerability in programs
and apps
▪ Should be implemented as they become available
▪ Updates add new features, but patches fix known vulnerabilities
[Link] 114
CompTIA Network+ (Study Notes)
• Security Policies
o Security Policy
▪ Lack of a security policy, or lack of enforcement of an existing policy, is a
major reason for security breaches
▪ Security policies serve multiple purposes
• Protecting an organization’s assets
• Making employees aware of their obligations
• Identifying specific security solutions
• Acting as a baseline for ongoing security monitoring
▪ Acceptable Use Policy (AUP) is a common component of a corporate
security policy
▪ Security policies contain a myriad of other complementary policies
▪ Larger organizations have complex policies
[Link] 115
CompTIA Network+ (Study Notes)
[Link] 116
CompTIA Network+ (Study Notes)
▪ How are you planning to dispose of your hard drives and devices when
they aren’t useful?
o Licensing Restrictions and Export Controls
▪ All software needs to have proper licensing, including any virtual
machines
▪ Some items are restricted from being exported to certain regions of the
world (cryptography)
• If your organization crosses international borders, check with your
legal and compliance teams to ensure you aren’t breaking any
laws
o Incident Response
▪ How will you react to a security violation?
▪ Prosecuting computer crimes can be difficult
▪ Successful prosecution relies on
• Means
o Did suspect have technical skills to perform the attack?
• Motive
o Why would they perform the attack?
• Opportunity
o Do they have the time and access?
• Multifactor Authentication
o Multifactor Authentication
▪ Something you know
▪ Something you have
▪ Something you are
▪ Something you do
▪ Somewhere you are
o Something You Know (Knowledge Factor)
▪ Usernames
▪ Passwords
▪ PINs
▪ Answers to personal questions
o Weaknesses of Passwords
▪ Not changing the default credentials
▪ Using common passwords
▪ Weak and short passwords
o Something You Have (Possession Factor)
▪ Smartcard
• Stores digital certificates on the card which are accessed once a
valid PIN is provided
[Link] 117
CompTIA Network+ (Study Notes)
▪ Key fobs
▪ RFID tags
o Something You Are (Inherence Factor)
▪ Fingerprints
▪ Retina scans
▪ Voice prints
o Something You Do (Action Factor)
▪ How you sign your name
▪ How you draw a particular pattern
▪ How you say a certain passphrase
o Somewhere You Are (Location Factor)
▪ Geotagging
▪ Geofencing
• Firewalls
o Firewalls
▪ Uses a set of rules defining the types of traffic permitted or denied
through the device
▪ Can be either software or hardware
▪ Also, can perform Network Address Translation (NAT) or Port Address
Translation (PAT)
o Packet-Filtering Firewalls
▪ Permits or denies traffic based on packet header
• Source IP address/port number
• Destination IP address/port number
▪ Looks at each packet individually
o Stateful Firewalls
▪ Inspects traffic as part of a session
▪ Recognizes whether traffic originated from inside or outside the LAN
o NextGen Firewalls (NGFW)
▪ Third generation firewalls that conduct deep packet inspection and
packet filtering
▪ Operates at higher levels of the OSI model than traditional stateful
firewalls
▪ Web Application Firewalls are a good example of these, as they inspect
HTTP traffic
o Access Control List (ACL)
▪ Set of rules typically applied to router interfaces that permit or deny
certain traffic
▪ ACL filtering criteria includes:
• Source IP, Port, or MAC
[Link] 118
CompTIA Network+ (Study Notes)
[Link] 119
CompTIA Network+ (Study Notes)
▪ Monitors all traffic, sends alerts, and drops or blocks the offending traffic
o Detection Methods
▪ Signature-based detection
• Signature contains strings of bytes (a pattern) that triggers
detection
▪ Policy-based detection
• Relies on specific declaration of the security policy
• Example: No Telnet allowed
▪ Anomaly-based detection
• Statistical anomaly
o Watches traffic patterns to build baseline
• Non-statistical anomaly
o Administrator defines the patterns/baseline
o HIDS/NIDS and HIPS/NIPS
▪ Network-based (NIDS/NIPS)
• Network device to protect entire network
▪ Host-based (HIDS/HIPS)
• Software-based and installed on servers/clients
▪ Network and Host-based can work together for more complete
protection
• NIPS might prevent a DoS attack whereas a HIPS solution could
focus on the protection of applications on a host from malware
and other attacks
[Link] 120
CompTIA Network+ (Study Notes)
[Link] 121
CompTIA Network+ (Study Notes)
▪ Can be used for secure VPN if combined with additional protocols for
encryption services
o VPN Types: L2F
▪ Layer 2 Forwarding (L2F) was developed by Cisco to provide for tunneling
of PPP
▪ Lacks native security features, like L2TP
o VPN Types: PPTP
▪ Point-to-Point Tunneling Protocol (PPTP) is an older protocol that
supports dial-up networks
▪ Lacks native security features, but Windows added some features in their
implementation
• IP Security (IPSec)
o IP Security (IPSec)
▪ VPNs most commonly use IPsec to provide protections for their traffic
over the internet
o IKE Modes
▪ IPsec uses the Internet Key Exchange (IKE) to create a secure tunnel
• IKE uses encryption between authenticated peers
[Link] 122
CompTIA Network+ (Study Notes)
[Link] 123
CompTIA Network+ (Study Notes)
Network Availability
• High Availability Networks
o High Availability
▪ Availability is measured by uptime
▪ Five nines of availability (99.999%)
▪ Maximum of 5 minutes of downtime per year
▪ Availability
• Concerned with being up and operational
▪ Reliability
• Concerned with not dropping packets
▪ Mean Time to Repair (MTTR)
• Measures the average time it takes to repair a network device
when it breaks
▪ Mean Time Between Failures (MTBF)
• Measures the average time between failures of a device
o Redundant Network with Single Points of Failure
▪ Link Redundancy (Multiple connections between devices)
• Internal Hardware Redundancy (Power supplies and NICs)
o Redundant Network with Now Single Points of Failure
▪ Link Redundancy (Multiple connections between devices)
• Redundancy of Components (Switches and Routers)
o Hardware Redundancy
▪ Takes many forms
▪ Devices with two network interface cards (NICs), hard drives, or internal
power supplies
▪ Often found in strategic network devices
• Routers, Switches, Firewalls, and Servers
• Not often found in clients due to costs and administrative
overhead involved in management
▪ Active-Active
• Multiple NICs are active at the same time
• NICs have their own MAC address
• Makes troubleshooting more complex
▪ Active-Standby
• One NIC is active at a time
• Client appears to have a single MAC address
o Layer 3 Redundancy
▪ Clients are configured with a default gateway (router)
[Link] 124
CompTIA Network+ (Study Notes)
• If the default gateway goes down, they cannot leave the subnet
• Layer 3 Redundancy occurs with virtual gateways
▪ Layer 3 Redundancy Protocols
• Hot Standby Router Protocol
• Common Address Redundancy Protocol
• Virtual Router Redundancy Protocol
• Gateway Load Balancing Protocol
• Link Aggregation Control Protocol
o Hot Standby Router Protocol (HSRP)
▪ Proprietary first-hop redundancy by Cisco
▪ Allows for active router and standby router
▪ Creates virtual router as the default gateway
o Common Address Redundancy Protocol (CARP)
▪ Open-standard variant of HSRP
▪ Allows for active router and standby router
▪ Creates virtual router as the default gateway
o Virtual Router Redundancy Protocol (VRRP)
▪ IETP open-standard variant of HSRP
▪ Allows for active router and standby router
▪ Creates virtual router as the default gateway
o Gateway Load Balancing Protocol (GLBP)
▪ Proprietary first-hop redundancy by Cisco
▪ Focuses on load balancing over redundancy
▪ Allows for active router and standby router
▪ Creates virtual router as the default gateway
o Link Aggregation Control Protocol (LACP)
▪ Achieves redundancy by having multiple links between devices
▪ Load balancing occurs over multiple links
▪ Multiple links appear as single logical link
o Content Engine
▪ Dedicated appliances that perform the caching functions of a proxy
server
▪ Are more efficient than a proxy server
▪ Also called Caching Engines
o Content Switches
▪ Distributes incoming requests across the various servers in the server
farm
▪ Also known as Load Balancers
• Designing Redundant Networks
o Design Considerations
[Link] 125
CompTIA Network+ (Study Notes)
[Link] 126
CompTIA Network+ (Study Notes)
o Hot Sites
▪ Building, equipment, and data is available
▪ Software and hardware are configured
▪ Basically, people can just walk into the new facility and get to work
▪ Downtime is minimal with nearly identical service levels maintained
o Backup and Recovery
▪ Full
• Complete backup is the safest and most comprehensive; Time
consuming and costly
▪ Incremental
• Backup only data changed since last backup
▪ Differential
• Only backups data since the last full backup
▪ Snapshots
• Read-only copy of data frozen in time (VMs)
• Quality of Service (QoS)
o Need for Quality of Service (QoS)
▪ Networks carry data, voice, and video content
▪ Convergence of media on the network requires high availability to ensure
proper delivery
▪ Optimizing the network to efficiently utilize the bandwidth to deliver
useful solutions to network users is crucial to success and cost savings
o Quality of Service (QoS)
▪ Enables strategic optimization of network performance for different
types of traffic
• Identifies types of traffic needing priority
• Determines how much bandwidth required
• Efficiently uses WAN link’s bandwidth
• Identifies types of traffic to drop during network congestion
▪ For example:
• Voice (VoIP) and Video should have higher priority levels (less
latency)
o Categories of QoS
▪ Delay
• Time a packet travels from source to destination
• Measured in milliseconds (ms)
▪ Jitter
• Uneven arrival of packets
• Especially harmful in VoIP
▪ Drops
[Link] 127
CompTIA Network+ (Study Notes)
• QoS Categorization
o Purpose of QoS
▪ To categorize traffic, apply a policy to those traffic categories, and
prioritize them in accordance with a QoS policy
o Categorization of Traffic
▪ Determine network performance requirements for various traffic types
(Voice, Video, Data)
▪ Categorize traffic into specific categories:
• Low delay
o Voice
o Streaming Video
• Low priority
o Web browsing
o Non-mission critical data
▪ Document your QoS policy and make it available to your users
[Link] 128
CompTIA Network+ (Study Notes)
[Link] 129
CompTIA Network+ (Study Notes)
o Marking of Traffic
▪ Alters bits within a frame, cell, or packet indicates handling of traffic
▪ Network tools make decisions based on markings
o Congestion Management
▪ When a device receives traffic faster than it can be transmitted, it buffers
the extra traffic until bandwidth becomes available
• Called queuing
▪ Queuing algorithm empties the packets in specified sequence and
amount
▪ Queuing algorithms types
• Weighted fair queuing
• Low-latency queuing
• Weighted round-robin
o Congestion Avoidance
▪ Newly arriving packets would be discarded if the device’s output queue
fills to capacity
▪ Random Early Detection (RED) is used to prevent this from occurring
• As the queue fills, the possibility of a discard increases until it
reaches 100%
• If at 100%, all traffic of that type is dropped
• RED instead drops packets from selected queues based on
defined limits
▪ If TCP traffic, it will be retransmitted
▪ If UDP, it will simply be dropped
o Policing and Shaping
▪ Policing
• Typically discards packets that exceed a configured rate limit
(speed limit)
• Dropped packets result in retransmissions
• Recommended for higher-speed interfaces
▪ Shaping
• Buffers (delays) traffic exceeding configured rate
• Recommended for slower-speed interfaces
o Link Efficiency: Compression
▪ Packet payload is compressed to conserve bandwidth
▪ VoIP payload can be reduced by 50%
• Payload size from 40 bytes to 20 bytes
▪ VoIP header can be reduced by 90-95%
• Uses RTP header compression (cRTP)
• Header size goes from 40 bytes to 2 to 4 bytes
[Link] 130
CompTIA Network+ (Study Notes)
[Link] 131
CompTIA Network+ (Study Notes)
Network Management
• SNMP
o Simple Network Management Protocol (SNMP)
▪ SNMP manager sends/receives messages to managed devices (routers,
switches, servers)
• SET sends information
• GET requests information
• TRAP receives unsolicited information from managed devices
o SNMP Versions
▪ SNMP v1
▪ SNMP v2
▪ SNMP v3
o SNMP v1 and v2
▪ Use community strings to gain access to a device
▪ Default community strings of public (read-only) or private (read-write)
devices are considered a security risk
o SNMP v3
▪ SNMPv3 addressed the weakness of community strings with three
enhancements
• Hashes message before transmitting (integrity)
• Validates source of message (authentication)
• DES-56 to provides confidentiality and privacy (encryption)
▪ SNMPv3 also groups SNMP components as entities to increase security
• Network Logging
o Syslog
▪ Routers, switches, and servers can send their log information to a
common syslog server
[Link] 132
CompTIA Network+ (Study Notes)
o Syslog Structure
o Logs
▪ Operating systems running on network clients and servers can also
produce logs
[Link] 133
CompTIA Network+ (Study Notes)
[Link] 134
CompTIA Network+ (Study Notes)
[Link] 135
CompTIA Network+ (Study Notes)
• Baselining
• Cable management
• Change management
• Network documentation
o Asset Management
▪ Formalized system of tracking network components and managing the
component’s lifecycle
• Prepare
o Budget for the items and gather requirements
• Plan
o Determine what components to acquire
• Design
o Determine the best configuration for the devices
• Implement
o Purchase, install, and configure the devices
• Operate
o Maintain operations and support on a daily basis
• Optimize
o Improve the network design through new devices
o Create a Baseline
▪ Collection of data under normal operating conditions
▪ Useful during comparison when troubleshooting network issues
▪ How do you know if your network is running normally if you don’t know
what normal is?
o Cable Management
▪ Process of documenting the network’s existing cable infrastructure
• Diagrams
• Cable labeling
• Locations of punch-down blocks
• Source cable locations
• Destination cable locations
▪ Using standard naming conventions are considered a best practice
• HR_D_RM102_0012
• IT_L_RM205_0004
o Change Management
▪ Coordinated system to account for upgrades, installs, and network
outages
▪ Simple router or switch upgrades may cause unwanted downtime. They
must be pre-coordinated
[Link] 136
CompTIA Network+ (Study Notes)
[Link] 137
CompTIA Network+ (Study Notes)
Troubleshooting
• Troubleshooting Methodology
o Troubleshooting Methodology
▪ Troubleshooting occurs through a three-step process
o Problem Report
▪ Issues are reported either by the end user, by administrators, or by
automated systems
o Problem Diagnosis
▪ Majority of a troubleshooter’s efforts are spent diagnosing the problem
o Problem Resolution
▪ Occurs once the problem is fixed
▪ Notate it in your trouble ticket system
▪ Verify user is happy with the resolution
o Why Use A Structured Approach to Troubleshooting?
▪ Using a structured approach saves time and is repeatable
▪ Prevents the technician from “hunting and pecking” for the solution
▪ Many approaches that could be used but for the Network+ exam you
must use CompTIA’s methodology
[Link] 138
CompTIA Network+ (Study Notes)
• Troubleshooting (Layer 1)
o Network Troubleshooting
▪ Resolving network issues is one of the main roles of a network
administrator
▪ Network Issue Categories
• Physical Layer
• Data Link Layer
• Network Layer
• Wireless Network
o Physical Layer
▪ If the physical layer isn’t working, none of the other layers will either!
▪ Common Issues:
• Bad cables or connectors
• Cable placement
• Distance limitations exceeded
• Splitting pairs in a cable
• EMI interference/Cross talk
• Transposed Tx/Rx
o Bad Cables or Connectors (Physical Layer)
▪ Faulty cables or connectors
▪ Wrong category of cable for the purpose
o Cable Placement (Physical Layer)
▪ Too close to high voltage cables, generators, motors or radio transmitters
o Distance Limits Exceeded (Physical Layer)
▪ Exceeding the Ethernet distance limitations can degrade the transmission
▪ Remember, always be less than 100 meters for copper cabling (CAT 5, 5e,
6, 6a, 7)
[Link] 139
CompTIA Network+ (Study Notes)
[Link] 140
CompTIA Network+ (Study Notes)
[Link] 141
CompTIA Network+ (Study Notes)
o Problem #2
[Link] 142
CompTIA Network+ (Study Notes)
o Problem #3
o Problem #4
[Link] 143
CompTIA Network+ (Study Notes)
[Link] 144
CompTIA Network+ (Study Notes)
[Link] 145
CompTIA Network+ (Study Notes)
[Link] 146
CompTIA Network+ (Study Notes)
[Link] 147
CompTIA Network+ (Study Notes)
[Link] 148
CompTIA Network+ (Study Notes)
[Link] 149
CompTIA Network+ (Study Notes)
[Link] 150
CompTIA Network+ (Study Notes)
[Link] 151
Hubs present several disadvantages when compared to switches and routers in network design. Firstly, hubs are older technology and merely rebroadcast incoming data to all ports, regardless of the intended recipient, which leads to unnecessary network traffic and increased chances of data collisions . This is inefficient compared to switches that make intelligent forwarding decisions based on MAC addresses, thereby maintaining network performance and security by limiting broadcast domains . Moreover, hubs contribute to higher collision rates as they operate at half-duplex, unlike switches that can handle full-duplex communication, significantly improving network throughput and reducing collisions . Additionally, modern switches and routers support advanced features such as VLANs, trunking, and quality of service, which enhance network flexibility, security, and scalability, features that hubs typically do not support .
Diagnostic tools such as 'ping' and 'tracert' help network administrators by verifying the connectivity between devices and identifying the path data packets take across the network. 'Ping' checks IP connectivity and latency, while 'tracert' shows the sequence of routers a packet passes through, highlighting where delays or blockages occur .
A switch improves network performance by creating separate collision domains for each connected device, allowing full-duplex communication without collisions. This contrasts with a hub, where all devices share the same collision domain and must operate in half-duplex, leading to potential collisions and reduced network efficiency . Additionally, switches forward data only to the specific device with the matching destination MAC address, whereas hubs broadcast data to all connected devices, further enhancing bandwidth efficiency and security .
Virtual LANs (VLANs) are significant in managing network traffic as they allow network administrators to segment a network into different broadcast domains within the same physical switch. This segmentation increases network efficiency by reducing the amount of broadcast traffic and improving overall network performance. VLANs also enhance network security by isolating sensitive data and systems from the rest of the network, making it more difficult for unauthorized devices to access restricted resources . By logically separating networks, VLANs prevent broadcast storms, reduce latency, and minimize the risk of unauthorized access, which is achieved through features like VLAN tagging and access control lists . Additionally, VLANs can help optimize bandwidth usage and improve network organization by grouping users, reducing congestion, and ensuring that network policies can be enforced more efficiently .
Using a Wireless Access Point (WAP) offers several advantages over solely relying on wired connections in a network. A significant benefit is the ability to provide connectivity to wireless devices, allowing users to move freely within a coverage area without being tethered by cables . This flexibility and mobility are ideal for dynamic environments like homes, offices, and public spaces. Furthermore, WAPs facilitate the expansion of a network by extending a wired Local Area Network (LAN) into the wireless domain, thus enabling seamless integration of both wired and wireless devices into the same subnet . Additionally, WAPs are cost-effective for connecting devices in environments where running physical cables would be prohibitive or impractical ."}
The client-server model in network administration offers advantages in centralized management, easier resource administration, and better scalability, where dedicated servers provide resources such as files, printers, and applications efficiently . This model simplifies backups and security policy enforcement since resources are centralized on key servers . Conversely, the peer-to-peer model, while more cost-effective and requiring no dedicated resources or specialized operating system, poses challenges for network administration. It involves decentralized management, making it harder to manage and backup resources spread across multiple devices, leading to inefficiency in larger networks . In summary, the client-server model enhances effectiveness in managing complex and larger networks, while the peer-to-peer model is more suited to smaller, cost-conscious setups with less stringent management needs.
Routers and switches serve different roles in network segmentation and data forwarding. A router is a Layer 3 device that connects multiple networks and makes forwarding decisions based on logical network addresses, such as IP addresses. Each port on a router acts as a separate broadcast and collision domain, thereby isolating traffic between networks and improving network efficiency . In contrast, a switch operates at Layer 2, connecting multiple devices within the same network. It forwards data based on MAC addresses, and each port on a switch represents an individual collision domain but remains within the same broadcast domain . This means switches facilitate communication within the same network segment, while routers enable communication between different network segments by routing data across them .
The primary benefits of a client/server network model include centralized administration, easier management, and better scalability, as resources are concentrated on dedicated servers, making management tasks more streamlined . However, this model has drawbacks such as higher costs, the need for dedicated resources, and the requirement of a network operating system . In contrast, the peer-to-peer network model benefits from lower costs, as it does not require dedicated resources or a specialized operating system, allowing peers to share resources directly with each other . The drawbacks of peer-to-peer networks include decentralized management, which can lead to increased administrative burden and complications in resource sharing, making it inefficient and poorly scalable for larger networks .
The Address Resolution Protocol (ARP) resolves IP addresses to their corresponding MAC addresses, which is crucial for network communication. It allows devices to communicate within a local network by finding the necessary MAC address for a given IP address. This mapping between Layer 3 (IP addresses) and Layer 2 (MAC addresses) helps ensure data packets are delivered to the correct hardware interface on a local network. ARP maintains a table, known as the ARP table, that contains this mapping, facilitating network communication by appending MAC addresses to outgoing data packets .
Power over Ethernet (PoE) enhances network infrastructure efficiency by allowing electrical power to be transmitted over Ethernet cables, eliminating the need for separate power cables or outlets for devices such as wireless access points and IP cameras. PoE is able to deliver up to 25.5 watts of power with PoE+ standards, reducing installation costs and simplifying maintenance by requiring only a single cable per device . Link aggregation improves network performance by combining multiple network connections into a single logical link, which increases the available bandwidth and minimizes congestion that might occur if each physical connection was handled separately. This capability increases the redundancy and reliability of network connections, reducing the risk of a bottleneck and improving overall network throughput . Both technologies contribute to the scalability and flexibility of network infrastructure, allowing organizations to efficiently expand and manage their networks with minimal downtime and disruption.