Network+ Study Guide - Uneditable
Network+ Study Guide - Uneditable
Network+
How To Use This Study Guide
First, let’s be clear about what this study guide is NOT. It is NOT comprehensive, and it is NOT
intended to be enough for you to study off exclusively. There are probably whole sections I
skipped or glossed over, mostly because I thought they were too obvious to need written down.
This guide is brief on purpose. This guide is an excellent resource to review information, to be
reminded of terms you’ve learned about but may have forgotten, and to understand how to
mentally organize the information so you can recall it easier.
This guide is thorough, but incomplete. A lot of this material, especially the first few sections,
is not heavily on the Network+ test, but exists to provide background to help you through
technical questions commonly asked on interviews. I also took these notes using multiple
resources. Unlike my Security+ study guide, which follows the Darril Gibson book closely, much
of the research for these notes was done on my own while taking examcompass tests or
reading through various guides. I do hope to clean it up at some point. The less relevant
sections will be marked in red.
I really hope this guide helps you pass the test. I know not everyone likes to take notes while
they read, but it helps me process information quickly, and it allows me to give back to the IT
community in some small way.
If you really appreciate this study guide and found it useful, why not buy me a coffee?
You can send a few dollars my way at paypal.me/electricintheforest if you feel so inclined, and if
you guys are generous enough, I’ll put that money to more certifications and keep building out
study guides as I go.
Please Upvote This Guide on Reddit for Visibility! And feel free to share!
For Starters:
This information goes very in-depth on some topics that may or may not be featured on the
net+. It is worth learning this material, but focus more of your time on the content lower in this
guide.
When information is transmitted from one device to another, it is compiled on device 1 at the
highest available layer, granted a header and footer, and then passed to the next layer. That
layer repeats this process until the lowest layer is reached. Then, all that data is passed to
device 2, which undoes that process according to the headers in footers, starting from the
lowest layer, and proceeding to the highest.
b. Many nodes connected to one medium. That medium makes decisions for how
best to pass data between many nodes.
c. Your Router. It takes the packets segmented by the transport layer and routes
them
4. Transport Layer
a. Segments data into packets, approves or denies packets passing through
b. Forwards Port
c. 5 classes of connection. Internet uses TP4
d. This is the layer where TCP and UDP become important, because they each
behave differently and have their own headers that they add on to data being
sent out.
i. TCP sends out “segments” and is used when precise, reliable
communication is necessary. This means that no data is lost along the
way and the protocol ensures lost packets are resent to the recipient.
ii. UDP sends out “datagrams” and is used when consistent, stable
communication is necessary. This is typically used for games and
teleconferencing where continuously receiving packets is more important
than receiving every packet. If a packet comes through and its checksum
declares that it is incomplete, it is simply tossed aside.
5. Session Layer
a. Continuous data streams- strong open channels, clean session termination
b. Like starting a Skype Call
6. Presentation Layer
a. Encoding and data compression - HTML, CSS, etc. How does the raw data get
communicated into a form that can be represented in an application
b. Webpages from code
7. Application Layer
a. Determines whether the high-level communication can happen at all. Assesses
available network and hardware resources versus the communication requests.
b. This layer interacts with a theoretical 8th layer, the user, and thus creates a UI
that can be interacted with directly.
c. HTTP, FTP, SMTP, DHCP, DNS
However, this connection is an ABSTRACTION in that, even they are “talking”, they aren’t doing
so directly. The CONCRETE communication is actually happening through the networking layer
(and so on downwards to physical), but, in the eyes of the transport layer, it’s as if they are
communicating directly.
Also I love how it shows the routers in the middle. This is exactly what happens when you send
packets out; they are received by other routers and sent along to the next router.
● DNS can often be related to a phone book, wherein you look up something easy to
remember to gain more specific information.
○ The chief difference in functionality between a phone book and DNS is that DNS
will output the location of specific data based on proximal servers.
○ In other words, if I, in America, and someone in China both type in a URL, we
may be given a different IP from which to pull the data we’re requesting, based
on whichever server is closer to each of us that houses that data.
● Another key function of DNS is that, rather than creating one centralized database which
can be difficult to change, DNS typically assigns a domain range to each ‘user.’
○ For instance, a household network with a single internet connection has a ‘range’
of IP addresses with which to connect to the internet. This means computers can
switch their IPs based on the network administrators designations.
○ The DNS is broken into domains, and each domain has its own authority to
assign addresses. Each domain can also be broken further into sub-domains.
● DNS is structured into authoritative zones, which can be further broken into smaller
portions, and are typically represented within a URL and called by each zone’s label.
○ For instance, www.example.com gives us information about three zones.
○ The highest level domain is “com”.
○ The first subdomain is “example”
○ And the second subdomain is “www”
○ The ‘.’ indicates the distinction between multiple labels.
● Each top-level domain (‘com’ in the example) requires two servers to contain master lists
of its NS data. This is to provide redundancy in case one server should fail or become
inaccessible.
● ICANN delegates the management of all top-level domains.
● FQDN - Fully Qualified Domain Name
○ Two parts, hostname and domain name
DNS Operation
● In order to resolve the real location of a DNS search, a recursive query system is setup
wherein the requesting computer follows a trail of hints to find the authoritative location.
○ For instance, ‘.com’ will be queried first, and then further queries will be made
from its recommendations, or ‘hints’ until the final solution is found.
○ However, because this is resource intensive en masse, cached name servers
often retain relevant queries for set period of time, determined by the ‘time-to-live’
status of the original query.
● There are three main types of queries that can be made from the clients side
○ Non-recursive queries are requests made directly to authoritative servers.
○ Recursive queries are requests made to a server, which will then continue to
query other servers until it can give an authoritative answer to the client.
○ Iterant queries are when the client side queries multiple servers to find the
authoritative answer itself.
6
● Requests can sometimes become circular, when servers refer queries to a location that
is also on an unknown server. In these cases, the querying server can look at the glue,
or alternate server hint provided in the original query response.
● Because query records can be maintained for the duration of the TTL (time to live) set by
the server administrator, DNS updates do not happen immediately, and can take up to
several days if records are held for long periods of time.
● Servers and Host Names are not One-to-One
DNS Messages
● Question
● Answer
● Authority
● Additional Space
● Header Section
○ Identification
○ Flags
■ Query/Response (0/1)
■ Reply/Status/Request (4 bit value of 1/2/0)
■ Authoritative? (0/1)
■ Client Request Recursion? (0/1)
■ Replying Server Support Recursion? (0/1)
○ Number Of Questions
○ Number of Answers
○ Number of Authority Resource Records (RR)
○ Number of Additional RR
Assorted info:
● DNS uses UDP 53 for URL queries
● DNS uses TCP 53 for zone transfers- when name servers exchange updated records
● DNS uses BIND - Berkley Internet Name Domain software on Unix/Linux servers
TCP/IP Layers
● Unlike OSI, TCP/IP utilizes layers, but not as strictly.
○ Application Layer
■ Creates and utilizes user data, and communicates that to other high-level
applications, often through the transport layer’s “pipelines”.
■ HTTP, FTP (file transfer protocol), and SMTP (simple mail transfer
protocol) - All ways that applications communicate with themselves and
each other.
○ Transport Layer
■ Host-to-host communication, like local networks. Communicates on behalf
of applications.
■ UDP is used for unreliable communications, whereas TCP is called for
more reliable transmission, flow control, and connection establishment.
○ Internet Layer
■ Exchanges data across network boundaries (internetworking).
■ Responsible for IP address connections.
■ Transmits data to the next IP router closer to the final destination.
8
● A main DHCP server can communicate via relays (big router to repeaters) for the sake of
long-distance assignments
● There are three methods of assignment
○ Dynamic allocation - the DHCP server uses the lease system to assign each new
device an IP within a set range for a set period of time
○ Automatic Allocation - Similar to dynamic, each device is given an IP, however a
table is reserved so that devices can receive the same IP upon reconnection
○ Static Allocation - an IP is assigned manually and specifically to the MAC
Address of each connecting device semi-permanently. This is pre-configured.
● DHCP utilizes two UDP ports
● Acts in 4 stages according to DORA -
○ Discovery - The client queries the server at address 255.255.255.255 with
DHCPDISCOVER
○ Offer - The server responds with DHCPOFFER which includes the clients MAC
address, offered IP, subnet mask, lease duration, and the IP of the server making the
offer
■ The server makes an offer based on the CHADDR (clients hardware
address) and responds with YIADDR (Your IP address)
○ Request - If a client received offers from multiple servers, it will select an offer
and request that IP with DHCPREQUEST. It will also alert the other servers of
which offer it accepted. The other servers will terminate their offers.
○ Acknowledgment - Once the server receives DHCPREQUEST it will respond with
DHCPACK. Once the client receives that packet of data, it will probe the new IP to
ensure there are no conflicts.
● DHCP Inform can be used if the client wants additional DHCP information after DORA.
● DHCP Release c an be used optionally to return and terminate an IP address. This is not
mandatory.
● Clients can choose optional setting available through DHCP and BOOTP PARAMETERS.
● Reliability of DHCP protocols is ensured through the process of renewing leases that may
end.
○ Clients periodically send DHCPREQUEST through unicast (the direct connection
made post IP assignment). If that fails, it is presumed the server is down.
○ DHCPREQUEST will periodically be resent to see if the server has come back
online.
○ If the server remains down, DHCPREQUEST will be broadcast in the hopes that
another server can renew the IP lease.
○ If no renewal is possible, DHCPDISCOVER will be broadcast so that a new IP
address can be assigned.
I also highly recommend you play Terminus, a Linux learning game that’ll teach you the basics if
you don’t already know them.
http://web.mit.edu/mprat/Public/web/Terminus/Web/main.html
1. BIOS (Basic input/output system)
a. Performs basic checks on essential hardware
b. Checks for bootloader program in all drives (hard and disc)
c. Executes and gives control to the MBR bootloader
2. MBR Bootloader
a. Runs the Master Boot Record to determine default boot options - found in the first
sector of the bootable disc
b. MBR has three partitions
i. Primary Bootloader Info
ii. Partition Table Info
iii. MBR validation
c. Possible to change boot priority during this stage
d. Executes GRUB
3. GRUB - GRand Unified Bootloader
a. Contains Kernel images and allows their selection
b. Executes Kernel
4. Kernel
a. Handles all O/S processes such as memory management, I/O, task scheduling,
and interprocess communication.
b. Initially mounts initrd (Initial RAM Disk) as the original root file system in order to
access essential drivers for hardware and hard drive partitions
c. Then boots the full kernel and mounts the real file system according to GRUB
settings
d. Simplified Process
i. Configures hardware, I/O, and memory
ii. Identifies and uses initrd to decompress and mount drivers into memory
iii. Configures virtual devices such as RAID and LVM
iv. Unmounts initrd
v. Mounts the root file system and frees up unused memory
vi. Fully initializes kernel, which runs idle until called
e. Executes Init, and then goes idle until called by a process
5. Init
a. First Process PID=1
b. Runs and terminates every other process
c. Creates User space
d. First sets up a Daemon to create the GUI
e. Init initializes with a runlevel parameter which determines what processes it starts
up
f. Init goes idle once it has started all necessary processes until a process needs to
be terminated, or init is called directly.
11
g. Default Init is limited in that it runs processes serially, rather than in parallel,
potentially slowing boot significantly on I/O processes
● RAID 1
○ Basic data redundancy, without parity.
○ Read speeds are normally slower than that of the fastest drive, though
theoretically the system supports speeds as fast as RAID 0
○ Write speeds are limited to the slowest drive
● RAID 5
○ Block level striping, with distributed parity.
■ Data is maintained as long as n-1 drives remain.
○ Requires a minimum of three drives
○ High speed, and decent data redundancy make this practical, however, when
one drive goes bad, the system must rebuild the array (check for and redistribute
parity) and because speeds are so slow, the time it takes to do this can often
crash a second drive, wrecking the system.
● RAID (0+1)
○ A nested RAID
○ Striped drives, that are also mirrored (S1+S2)+(S1+S2)
○ Provides speed improvements from the striping, and redundancy/parity from the
mirroring
○ Disadvantaged against RAID 10 due to the long rebuild process if even a single
drive goes bad
○ If one drive goes bad, such as M1, its complementary drive is also useless,
leaving you essentially with a RAID 0 and no redundancy.
● RAID 10 (1+0)
○ The preferred RAID setup for data-intensive systems.
○ Creates a stripe across two pairs of mirrored drives
○ Performance second only to RAID 0, with redundancy and parity
○ As long as one drive from each mirror is still functioning, data retains integrity
● RAID 50 (5+0)
○ Distributed parity and striping, which is then also striped.
○ Volume equal to 2/3rds the total capacity of all involved drives
○ High performance, fairly redundant
○ Same, and possibly increased, limitations as RAID 5, wherein the rebuild process
can put significant strain on the system during drive failure
○ Requires “hot swapped” drives in case of any failure
○ Can handle a failure of a single drive in each set of RAID 5
○ Requires a minimum of six drives
Cabling
Misc Cabling
● RJ Connectors- Registered Jack
13
■ Cheaper
○ STP is shielded
■ Much larger cables- more difficult to install
■ If improperly grounded, the shielding can actually cause MORE
interference
■ More expensive, and require maintenance if ground or shielding is
damaged
● Ethernet Cable
○ Typically uses RJ45
○ Copper cable
○ 5, 5e (1000Mbps), 6, and 6a(10,000Mbps) cables are common for internet usage
○ Utilized twisted wires to prevent signal interference
○ Standard 100 meter range
○ Modern cables can hit 100Gbit/s (Cat 7), with proposed cables up to 400 Gbit/s
○ Cat 3 still exists, but is 10Mbps, typically used in telephony
○ Two standards exist for wiring RJ45 Ethernet Connections: T568A or T568B
○ Crossover Cabling
■ Requires T568A on one side, T568B on the other
■ Connects two similar devices (two computers, two routers)
○ Patch Cable/Straight Through Cable
■ It doesn’t matter which standard is used, as long as both sides of the cable
match
■ Connects two different kinds of devices
○ Rollover Cable
■ Attaches a computer terminal to router’s console port
■ Not for networking
○ Auto MDIX (Medium-dependant interface)
■ Allows two devices connected by ethernet to auto-negotiate maximum
speeds and duplex capacities
■ Removes the need for crossover cables!
● GBIC and SFP (gigabit interface converter and small form factor pluggable)
○ Big and small versions of a device that convert from electrical to optical
● Baseband
○ Digital signaling, bi-directional transmission
○ One channel for both directions of signal!
○ IEE 802.3 - ethernet
○ Very narrow frequency range
● Broadband
○ Analog signalling, unidirectional transmission
○ For transmission to be both ways, requires two channels
○ High frequency range
15
Multimode MMF
● 850 and 1300 nm wavelengths
● Larger core to support multiple transverse modes.
● Greater wavelength acceptance makes for easier connections
● Inferior over long distances to SMF
● Speeds
○ 100 Mbits/s over 2 km
○ 1Gbit/s over 1km
○ 10Gbit/s over 550m
16
PC Boot Requirements
● Motherboard
○ Hosts the BIOS
17
Equipment
● Hub - Shouts data to every node connected
● Switch - Directs data directly to specific recipients
● Bridge - Connects two parts of intranet
● Router
● Gateway - Communicates between devices using different protocols
● WAP - Wireless Access Point
● - Network Interface Card
● CSU/DSU: A CSU/DSU (Channel Service Unit/Data Service Unit)
○ Converts a signal from one form to another
○ Most commonly in cable modems
● Modems
○ Convert physical analog signal to digital signal
● Proxy Servers
○ Basically propaganda- filters data and only communicates what it wants to
Firewalls
● Packet Filtering
○ Operate at the network level- check the headers and footers (destination) of
packets and filter based on that.
● Circuit Level Filtering
○ Operates on the session layer
○ filters based on the presence of a TCP handshake
○ Needs a secure connection
● Application Level Filtering
18
○ Works on the application layer, obviously, and looks at the actual content of
packets.
● Stateful Inspection
○ Most commonly used
○ Operates at both the Network and Application Level
○ Requires a secure connection via TCP
○ Inspects the actual contents of packets
○ Basically Application + Circuit Level
10Base2 (“ThinNet”) / 185 Coaxial cable with BNC 10 Mbps Also old and rarely used,
m. connector. SHARED remember that it requires
MEDIUM special circular BNC
connector, similar to
“cable TV connector”
10BaseT / 100 m. Twisted Pair wire with 10 Mbps Used RJ-45 connectors
EXCLUSIVE MEDIA (look like large phone line
(connected to hubs rather connector)
than to other nodes),
RJ-45
Faster Speed/Other media Uses next-generation fiber 10+ Gbps Another speed
Ethernet (10GBASE-SR, optic cabling to achieve improvement and change
10GBASE-CX4, etc) / 10+ Gbps speeds in connectors, cabling
2000+ m.
Wireless
● IrDA - Infrared Data
○ 16-25 Mbps
○ Only works along the same lines that light can travel
● Bluetooth (802.15.1)
○ 25-35 foot range
21
○ Signal Modulation
■ FHSS - Frequency Hopping Spread Spectrum
● Rapidly switch between multiple channels
● Enables multiple access between devices
● Any interference only happens momentarily because of the hops
● Usable in 2.4GHz band
■ DSSS - Direct Sequence Spread Spectrum
● Used by 802.11b, and 802.11g (in tandem with OFDM)
● When sending a message, the packet is “Spread” with random
data to increase bandwidth
● This allows it to become a “noise” signal which blocks interference
● Also makes signal less jammable, and secure!
■ OFDM - Orthogonal Frequency Division Multiplexing
● Used by 802.11a, 802.11g, 802.11n, and 802.11ac
● Resilient to many forms of interference. Super complex though.
● Something to do with sending multiple signals in parallel
○ Signal Modulation by Wireless Standard!
■ 802.11b
● Primary: DSSS
■ 802.11g
● Primary: OFDM
● Also: DSSS
■ 802.11a
22
● Primary: OFDM
■ 802.11n
● Primary: OFDM
■ 802.11ac
○ DCF - PCF - Distributed/Point Coordination Function
■ Employs collision avoidance methods
● WiMax - Worldwide Interoperability for Microwave Access
○ IEEE 802.16
○ Competes with LTE
○ Supports mobile, fixed, and nomadic connections
● General Wireless Info!
○ Wireless is more expensive than wired networks
○ Wireless is also affected by most other transmissions
○ MAC bridge can translate wireless frames into ethernet frames and vice versa
○ Wireless isn’t by default secure
■ Security was designed WEP - > WPA - > WPA2
■ WEP is fucking awful, and replaced by nearly everything else. WPA and
TKIP function on existing WEP hardware, typically.
■ WPA utilizes TKIP to encrypt data
■ WPA2 utilizes AES to encrypt data better
● WPA2 was instituted by 802.11i
● This implementation is known as CCMP
● CCMP - Counter Mode with Cipher Block Chaining
Message Authentication Code Protocol
○ Wireless devices can enter ad-hoc mode where they create a mesh, rather than
utilizing the star topology of connecting to a router, but this is difficult to run and
configure
○ Utilizes CSMA/CA (Collision Avoidance) rather than CD (Collision detection)!
● Wardriving is the act of searching for Wi-Fi wireless networks by a person in a moving
vehicle, using a portable computer, smartphone or personal digital assistant (PDA).
IPv4
● Four octets of numbers
○ First octet tells you the size of the network, based on its range
○ Three sizes on networks - netid always represents 255
○ University - range 1-126
■ netid.hostid.hostid.hostid
○ Corporate/Hospital - range 128-191
■ netid.netid.hostid.hostid
○ Small Business/Home - range 192-223
■ Netid.netid.netid.hostid
23
● Within LANs sharing an IP address, private IPs are setup for each node - NAT
IPv6
● Written in hexadecimal, and 128 bit
● 0000:0000:0000:1aff:1923:ab00:0000:22a1:3712:0000:0000:0000:acc2:32aa:8eff:bf00
○ You can replace a block of 0000 with “::” but only once. The computer can figure out how many 0’s
there are because it knows how long the string should be.
■ 0000:0000:0000:1aff:1923:ab00:0000:22a1:3712::acc2:32aa:8eff:bf00
■ ::1aff:1923:ab00:0000:22a1:3712:0000:0000:0000:acc2:32aa:8eff:bf00
● EUI-64 can be used for IPv6 Auto-configuration
● DHCPv6 is a thing.
● IPv6 Link-Local Address(FE80::/10) is the same as IPv4 APIPA address (169.0.0.0…)
○ Automatic private addressing, when a pc needs an IP, but DHCP is down
● Unicast
○ Addressed and routed to a single IPv6 address
● Anycast
○ Addressed and routed to any and only one of a set of IPv6 Address
● Multicast
○ Addressed and routed to multiple IPv6 Addresses
● Honestly, IPv6 is complex, and not well-utilized yet. Worth checking its wiki page, but
don’t break your brain over it.
● https://en.wikipedia.org/wiki/IPv6_address
Data Link
● ARP Address Resolution Protocol
○ Translates logical IP addresses into physical MAC addresses
○ Basically the connection between layer 2 and 3
● RARP Reverse… bla bla. It does the opposite
Network
● ICMP - Internet Control Message Protocol
○ Connectionless protocol that enables Pinging routes
○ Manages control messages
○ Pings return RTT - Round Trip Time
● IGMP - Internet Group Messaging Protocol
24
Transport
● TCP - Transmission Control Protocol
○ Connection oriented protocol that allows sending and receiving with receipts
○ Introduces concept of ports, or specific openings on nodes for specific data
● UDP - User Datagram Protocol
○ Sessionless TCP - no receipts, no guarantee of delivery
Application
● HTTP - Hypertext transfer protocol
○ transports data on the internet, typically in pages and HTML.
○ Port 80
● HTTPS - Secure HTTP
○ Uses port 443 a nd SSL (Secure Socket Layer) to securely transfer data on the
internet
● SMB - Server Messages Block
○ Allows shared access to files, printers, etc on a network
○ CIFS - Common Internet File System - Commonly known as
○ Port 445
● FTP - File Transfer Protocol
○ Port 20 (data) / Port 21 (Transmission control)
○ Securityless transfers of simple data
○ SFTP - Secure FTP
■ Uses port 22 and SSH to transfer simple files securely
○ FTPS
■ Uses port 990, occasionally 21 and SSH to transfer simple files securely
○ FTPS/SFTP simply secure files differently, but both use SSH and AES
● TFTP - Trivial FTP
○ Port 69
○ UDP based FTP
○ Unreliable, mostly used for local data
● Telnet - Telecommunications network
○ Allows you to fully connect to a remote computer like another user with login and
everything.
○ Port 23
○ Clear text commands
25
● NetBIOS default resolves names by broadcasting a request, and hoping the computer
with that name will respond. If it doesn’t, each node receiving the broadcast should relay
the message further.
○ Because this is cumbersome, specific NetBIOS utilities have been developed
○ DNS - See Above
○ NetBIOS Name Server - Stores NetBIOS names for easy name resolution.
○ WINS Server - Windows NetBIOS server
■ Primary and optional secondary server for redundancy
■ More features than NetBIOS
● Windows lets you store NetBIOS names in one of two files
○ LMHOSTS File - Local Area Network NetBIOS names
○ HOSTS File - Remote hosts and Local hosts NetBIOS names
● Uses TCP 139
● Provides error detection and recovery
● Session Layer
WAN Tech
● IEEE 1905.1
○ Enables easy home configurations of 802.11 wireless, 802.3 ethernet, and 1901
internet over power lines
○ Provides a common interface for the various techs
● IEEE 1901
○ BPL - Broadband over Power Lines
● DOCSIS - Data over Cable Service Interface Specification
○ Allows the addition of a data line to traditional cable infrastructure
● POTS - Plain Old Telephone Service (Also PSTN - Public Switched Tele Network)
○ Utilizes phone networks and analog-to-digital modems
○ Extremely slow, up to 56Kbps
○ Widely used, affordable
● ISDN - Integrated Service Data Network
○ Faster than POTS, but completely obsolete
○ Used wires specially setup by phone companies
○ Two 64 Kbps “B” channels
○ Circuit-Switched Network for voice
○ Packet-Switched for data
○ Can be used for video conferencing
● DSL - Digital Subscriber Line
○ The successor of ISDN
○ Requires special telecom line as well
○ Up to 10Mbps (occasionally 15Mbps)
○ Requires DSL modem to convert high speed DSL signal to network friendly
language
○ SDSL - Similar down and up speeds
○ ADSL - Most commonly used, high down, normal up
○ IDSL - Longer range DSL
● Cable
○ Around 60Mbps
○ Uses cable line like cable tv, and coaxial cables
○ Requires cable modem
30
● T1/T2/T3 (T3 can be known as E3 in europe, and DS3) AKA T-Carrier or E-Carrier
○ T(X) lines are dedicated business lines. Reliable.
○ Upgrade to PTSN connections, often used as backbone connections
○ E lines upgrade at 4x each iteration, starting at 2.048Mbit/s. T lines fluctuate.
○ T3 line can be 15,000/mo - up to 45 Mbps
■ Equal to 672 dedicated phone lines!
○ https://en.wikipedia.org/wiki/T-carrier#Comparison_of_T-carrier_and_E-carrier
○ Examples of Circuit Switching technology
● OC1/OC3/OC(X) - Optical Carrier
○ OC1, 51.84 Mbps - very very business line
○ Multiples of OC are multiples of 51.84
○ Fiber optics
● Leased Line
○ Less necessary nowadays, it’s a dedicated data line to a LAN
○ Expensive, but reliable due to no competing traffic
Cellular/Mobile WAN
● GSM - Global System for Mobile Communication
○ Utilizes TDMA
■ Time Division Multiple Access
● Each phone gets a time slot to transmit over very short intervals
○ Standard Cellular data system everywhere but USA and Russia
○ Requires a SIM
● CDMA - Code Division Multiple Access
○ Cellular tech
○ More security than GSM
○ Allows more people to connect at once
○ Built into phones- no SIM
● LTE - Long Term Evolutions
○ Built off GSM/EDGE
○ Marketed as 4G, but not truly 4g.
○ Only slightly better than WiMax
● WiMax - Worldwide Interoperability for Microwave Access
○ IEEE 802.16
○ Competes with LTE
○ Supports mobile, fixed, and nomadic connections
● LTE-Advanced and WiMax-Advanced are TRUE 4g tech.
■ Port 5004
■ TLS - Transport Layer Security
● Encrypts Streams
● Secures HTTP
■ RTCP - RTP Control Protocol
● Provides out of band statistics and control over an RTP session
● Port 5005
● H.323
○ Pre-dates SIP, basically the same, but more complex
○ Port 1720
● MGCP - Media Gateway Control Protocol
○ Call control protocol for VoiP
○ Uses ports 2427 and 2727
● VTC - Video Teleconferencing
○ Cisco Medianet
■ Advanced Cisco architecture designed for video and rich-media platforms
■ It’s just all around good for video, end-to-end
■ Rich Media
● Advanced, dynamic and interactive ads, basically
● Respond when moused over, auto download applets, play video
○ Utilizes IP/SIP and ISDN
● Tunneling Protocols
○ Basic Info
■ Typically work at layer 4 (transport)
■ Typically replaces TCP/UDP
■ Allows you to use a protocol where it doesn’t natively belong
■ Fucking Trojan Horses, man
■ GRE, PPTP, IPSEC, and VPN are closely connected
○ PPTP - Point to Point Tunneling Protocol
■ Makes VPNs work
■ Uses TCP and GRE
■ PPTP uses port 1723, GRE uses UDP 47
■ GRE - Generic Routing Encapsulation
● Works with PPTP
● Tunneling protocol
● Encapsulates network layer protocols to be transfered via
Point-to-point links
● IP PBX
○ Connects VOIP to POTS etc
○ Makes all variations of phone lines work together
● LWAPP - Lightweight Access Point Protocol
○ Allows multiple wifi access points to be controlled in one place
○ CAPWAP - Control and Provisions of Wireless Access Points
33
● IPsec - IP Security
○ Session oriented security.
○ NETWORK LAYER - despite being session oriented, it operates at the network
layer, and provides GREAT end-to-end encryption of application data because of
this
○ Negotiates mutual authentication between clients and sets up an encryption key
that both clients agree on
○ Encrypts every packet sent during the session
WLAN Tech
● Roaming - Ability to connect in one WAP area and another without
reauthentication
● LWAPP - Lightweight Access Point Protocol
○ Allows multiple wifi access points to be controlled in one place
○ CAPWAP - Control and Provisions of Wireless Access Points
● Channel overlapping- Multiple channels share the same frequency band and
cause interference
● 802.11a-ht, and 802.11g-ht allow 802.11n to send special packets that are
compatible with earlier standards, but still speed up those standards!
● Antennas
○ Most WAPs use Dipole antennas
○ Dipole antennas, like omnidirectional antennas, cover a 360 degree
horizontal distance
○ Dish antennas and unidirectional antennas are great for long range, but
lack the area spread and require aiming
● MU-MIMO - Multi-User MIMO
○ Allows multiple users to transmit signals further and stronger
● Beacon Frame
○ Periodically sent by WAP to announce the presence of the LAN
○ Advertises the SSID, or Service Set Identification (network name)
● Infrastructure Mode/BSS - Basic Service Set
○ WLAN that requires a central WAP
○ Every BSS has a BSSID, which is the mac address of the central WAP
● Ad-Hoc/Peer-to-Peer/IBSS - Independent Basic Service Set
○ WLAN where devices communicate with each other, without the use of
WAP
○ Without the central WAP, one IBSS cannot communicate with another
BSS
● ESS - Extended Service Set
○ WLAN with multiple WAP
○ ESS have SSID, which is a 32byte maximum string
○ APs in an ESS are connected by DS - Distribution System
34
Network Management
● NMAP - Network Mapper
○ Security scanner used to discover hosts and services on a network
● Microsoft Active Directory
○ Implementation of LDAP - Lightweight Directory Access Protocol
○ Designed for Microsoft networks
○ Security, Access Control, and Group Policy
○ Can install and update software across the network
○ Assigns roles and permissions to computers along the network
● VLAN - Virtual LAN
○ Although all computers are physically on the same network, they are logically
assigned to different LANs so that they can have different administrators
○ Allows load-balancing of traffic among hosts
○ Switch Ports can be used to configure membership of a VLAN
■ MAC address to IP mapping can as well
○ Port Trunking
■ Utilized to carry data from multiple VLANs across a network
■ Utilizes 802.1q or ISL (interswitch link) tags in the packet headers to
identify the target VLAN
■ VTP - VLAN Trunk Protocol
● Cisco proprietary
○ Establish VLAN connections
■ Dynamic - VLAN assignment is designated by software, typically reading
MAC address or user ID. The switch queries a database to check this info
■ Static - Each port is assigned a VLAN, so any device connecting to that
port is assigned to that VLAN
● LACP - Link Aggregation Control Protocol
○ Enables several physical ports to act as a single logical channel.
○ Increases throughput by aggregating several connections!
○ NIC Teaming - Network Interface Controller
■ Form of LACP for network cards. Increases throughput and redundancy
● Load Balancing Server
○ Intelligently coordinates traffic and requests so that no part of the system gets
overwhelmed
35
● Redundancy
○ Multiples of everything so that if one thing goes down, the system still runs
● Access Control
○ The ability to determine who can see/do what on the network
○ User-Defined: User chooses what to share
○ Mandated: Central server determines permissions (Active Directory!)
● SDN - Software Defined Networking
○ Meant to address modern needs of quickly changing tech and data centers
○ Architecture designed to make network management simpler and more dynamic
● SNMP - Simple Network Management Protocol
○ Allows for the collection of data from, and management of, devices connected to
a network
○ Devices attached to the network have SNMP agents which send back data to the
main SNMP controller
■ These alerts are sent via “traps” and are unsolicited by the manager
■ The management station receives notifications from the agent on UDP
162
■ The agent receives requests on UDP 161
○ Net SNMP
■ Suite of software that allows SNMP to be deployed
■ Common Commands
● https://en.wikipedia.org/wiki/Net-SNMP
● Snmpget - communicate updated info with agents
● Snmpwalk - receives a subtree of management values with
getnext commands
○ MIB - Management Information Base
■ Database often connected to SNMP
■ Allows users to manage the entities in a communication network
■ Contains information about configuration and device states
Additional Security
○ Monitors the state of connections and allows packets based on those states
● eDiscovery
○ Tracking, collection, and analysis of all data for legal purposes
Tech Agreements
● AUP - Acceptable Use Policy
○ A set of constraints and practices a user must agree to in order to access a
network
● SLA - Service Level Agreement
○ Defines what a customer will receive from a service provider (standards and
quantities?)
○ Specific performance requirements from a vendor
● MOU - Memorandum of Understanding
○ The rules and responsibilities two parties must follow while working on a
collective goal
● MSA - Multisource Agreement
○ Agreement across vendors to set certain standards for compatibility in products
from different manufacturers
● SOW - Statement of Work
○ Activities, deliverables, and time-line from vendor to client
○ Includes purpose, scope of work, cost estimates, requirements, etc
Network Storage
● SAN - Storage Area Network
○ Enables mass block-level data storage to be accessed by the network
41
Advanced Routing
● DSCP - Differentiated Services Code Point
○ Allows different IP packets to be labelled and handled differently
○ Allows for effective management of QoS (quality of service) and Traffic
management
○ CoS - Class of Service
■ Identifier in packet header that defines QoS standard
● AS - Autonomous System
○ A collection of IP routing prefixes under control of a single Administrator
(normally an ISP)
○ Presents a clearly defined routing policy for the internet
○ Basically a set of rules that a large group uses for their routing and internet
connection, that needs to be officially registered
○ Autonomous Systems can communicate through BGP
○ Autonomous System Number is assigned by ICANN and is essential to run an
AS
○ Four Types of AS
■ Multihomed AS
● Maintains connection to other AS for redundancy
■ Stubbed AS
● Only connected to one other AS- can be a waste if parent AS has
similar settings
■ Transit AS
● AS that allows other AS to talk through it to other AS
■ Internet Exchange Point AS
● Physical Infrastructure that allows ISPs and AS to send traffic
between one another
● IGP - Interior Gateway Protocol
○ Allows gateways to communicate routing data between each other within an
autonomous system
○ Two categories of Protocols:
42
■ Only allows one single best path to be active, and deactivates useless
links
■ Designed to prevent looping and broadcast static
■ Replaced by SPB
■ SPB - Shortest Path Bridging
● Allows all links to remain active and evaluates them for a cost
● Reduces user era
● Makes the pathing more dynamic
● Allows the system to adapt faster to plug and play activity
■ 802.1w - RSTP - Updated STP Rapid reconfiguration of STP
● EGP - Exterior Gateway Protocol
○ Allows two gateway hosts to share routing information throughout a network of
separate Autonomous systems
○ BGP - Border Gateway Protocol
■ Hybrid Routing Protocol
■ Path-Vector protocol/distance vector protocol
■ Does all the heavy lifting between AS networks
■ iBGP (internal) is good for large private networks
■ eBGP (external) runs gateways between AS’s
● Redundancy and Backups in Routing
○ VRRP - Virtual Router Redundancy Protocol
■ Allows for automatic assignment of available IP routers to available IP
clients
○ HSRP - Hot Standby Router Protocol
■ Allows for a second router to be setup as a failsafe if the primary default
gateway goes down
■ If one router goes down, the next highest priority router will take over its
IP
Remote Access
● RDP - Remote Desktop Protocol
○ Microsoft proprietary GUI that allows you to connect to another computer
○ Needs port 3389 open
● RAS - Remote Access Service
○ Outdated dial up microsoft thing
● PPP - Point-to-Point Protocol
○ Data link layer protocol
○ Versions of it are used for DSL connections
○ Can enable authentication between two nodes
○ Less outdated dial up access thing?
○ Replaces SLIP - Serial Line Internet Protocol
44
Repair Tools
● Crimping Tool
○ Connects ends to twisted pair wires
● Punch Down Tool
45
○ Pinging IPv6
■ In windows - ‘Ping -6 host1’ or ‘ping host1 -6’
■ In Linux - ping6 host1
○ Nbtstat - Windows command to troubleshoot Netbios name resolution issues
● SNR - Signal to Noise Ratio
○ ...Measures the ratio of actual signal to background noise.
● LG - Looking Glass Server
○ Read only portal to all the routers in an organization
● Demarc
○ The juncture at which the ISPs cabling ends and local cabling begins
● Smart Jack
○ Placed on the demarc!!
○ Remote line diagnostics
● Demultiplexer
○ Single in, multi out
● MDF - Main Distribution Frame
○ Cabling rack that connects and manages telecommunication wiring between itself
and IDFs - Intermediate Distribution Frame.
○ MDF connects between public and private lines entering a building
○ IDF connects between MDF and equipment
A+
A+ Notes are not comprehensive, and only contain the information I considered less common
knowledge, or more detailed. These notes are INCOMPLETE. This section is only here if you
need a little background for networking.
○ CMOS Ram - RAM supported by a series of small batteries so that it can retain
BIOS settings even after power-down
○ Highest BIOS permissions are Supervisor Password
○ Can configure CPU performance, Memory performance, User/Supervisor
Passwords
○ Hardware Diagnostics
○ LoJack or CompuTrace
■ Tracks your device to find it if stolen or lost
■ Built into bios so automatically installs on storage device
■ Includes Phone Home which sends location data to central location
■ Includes Theft Mode to lock down or delete files from PC
○ Secure Boot Capability will only run applications with known-good signatures
● UEFI - Unified Extensible Firmware Interface
○ Updated BIOS tech
○ Supports HDD over 2 TB
○ GUI
○ Mouse Support
○ Network Capable
○ Backwards/Forwards Compatible
○ Modular Design
● TPM - Trusted Platform Module
○ Enables disk encryption, password protection, and other security features
○ Retains Encryption keys, signatures, etc
○ Enables DRM
○ Integrates with Windows BitLocker for full disk encryption
● PXE- Preboot Execution Environment
○ Enables booting from a network device
○ Apple Netboot does the same on apple
Advanced Memory
● RAM - Random Access Memory
○ SRAM - Static RAM
■ Very expensive, but ultra fast
■ Takes a lot of space
■ Often in processor cache
● L1, L2, L3 caches
○ DRAM - Dynamic RAM
■ Our favorite memory
■ Constantly refreshed- otherwise data disappears
■ Can put data anywhere and access it through referencing memory
address (unlike tape drives)
○ SDRAM - Synchronous DRAM
■ Synchronous with common system clock
■ Queues up one process while waiting on another
■ NOT SRAM - Static RAM
■ SDR SDRAM - Single Data Rate SDRAM
■ DDR SDRAM - Double Data Rate SDRAM
● DDR Memory is typical in computers
● Multiplies data rate by the clock speed
51
● Multi-channel Memory
○ Multiple sticks to increase throughput in pairs or trios
○ Matched memory must be identical
● Single-Sided v Double-Sided memory
○ Can be physical, but more specifically “ranks” of memory.
○ Think about it like virtual separation between the RAM
Cables
● USB 1.1
○ Low Speed - 1.5 Megabits per second, 3 meters
○ Full speed - 12 megabits per second, 5 meters
● USB 2.0
○ 480 megabits per second, 5 meters
○ A/B/Mini/Micro Plugs
● USB 3.0 Superspeed
○ 5 Gigabits per second, 3 meters
○ A/B/Micro Plugs
● Firewire IEEE 1394
○ Daisy chain up to 63 devices
○ 4.5 meters per link
○ FireWire 400 - Alpha Mode - 1394a
■ 100/200/400 Mbit/s half-duplex
○ FireWire 800 - Beta Mode - 1394b
■ 800 Mbit/s full duplex
■ Optical up to 100 meter
● SATA 1.0
○ 1.5 Gbit/s 1 meter
● SATA 2.0
○ 3 Gbit/s 1 meter
● SATA 3.0
○ 6 Gbit/s 1 meter
● eSATA
○ 2 meters, matches internal sata of device
● DB-15 - VGA
○ Analog only, 5-10 meter range
● HDMI - High Definition Multimedia Interface
○ Digital, 20 meter range
○ 19 pin Type A connector
■ Proprietary
○ MiniHDMI Type C connector
○ 4-14 Gbps depending on type (1.0 = 4, 2.0 = 14)
● DVI - Digital Video Interface
○ Single Link
■ 3.7 Gbps HDTV at 60fps
○ Dual Link
56
Wireless
● Infrared -IrDA
○ 4Mbit/s, line of sight
○ 1 meter
○ Laptop, phone, camera
● NFC - Near Field Communication
○ 106, 212, 424, kbit/s
○ 10cm range (3.9 inches)
● Bluetooth
○ Class 1
■ 100 milliWatts (mW) 100 meter range
○ Class 2
■ 2.5mW 10 meters
○ Class 3
■ 1 mW, 1 meter
○ V1 - 1 Mbit/s, V2 - 3Mbit/s, V3 24Mbit/s, V4 - 24Mbit/s (lower power)
● 802.11 - see networking details.
Computer Power
Connectors
● SATA Power
○ 15 pins, includes +3.3V, +5V, and +12V
● Molex connector
○ 4 pins, +12V, +5V
○ Storage devices, drives, fans, peripherals.
● 4 pin ATX +12V
57
PSU Specifications
● Amp - rate of electron flow per second
● Voltage - electrical “pressure” pushing the electrons
● Watts - Volts * Amps
● AC - Alternating Current
○ Great long range efficiency.
○ 110-120 volts and 60Hz in NA
○ 220-240 volts and 50 Hz in Europe
● DC - Direct Current
● Voltage Rails
○ Single Rail
■ One 12 volt rail power supply
○ Multiple Rails
■ Each output on PSU has separate 12v rail
■ Additional protection from multiple rails - overloads won’t smoke up
● To identify the size of the PSU you need, just add up the watts of every device you want
to connect, and then double that.
○ Modular PSUs are better so you don’t have unnecessary cables connected
Devices
Printers
Nah
58
Laptops
● Express Cards
○ Come in 34 mm/54mm
○ External slotted expansion
○ Can connect to USB 2.0 bus (480Mbit/s), USB 3.0 bus(5Gbit/s), or PCIe
bus(2.5Gbit/s)
● SO-DIMM - Small Outline Dual In-LIne Memory Module
○ Laptop sized memory
● Everything else can be connected via USB adapters pretty much
● Smart Card reader - A security card reader built into your laptop
Displays
● TN LCD - Twisted Nematic Liquid Crystal Display
○ Very fast response time and low power draw
○ Poor viewing angle
● IPS LCD - In Plane Switching LCD
○ Great color representation, but more expensive than TN
● Backlighting
○ CCFL - Cold Cathode Fluorescent Lamp
■ Old school, high voltage, thick.
○ LED backlit LCD displays
■ LEDs… light the display
● OLED
○ Organic LED
○ Fades over time
○ Light, flexible, no glass needed
○ Doesn’t require backlight
● Wireless and bluetooth antennas often wind around the display
Mobile Devices
Ugh god its cellphones and tablets. Did you know they have cases? Have you heard of
bluetooth?
Go research NFC. Leave me alone I can’t take notes on dumb things like this.
59
Hardware Troubleshooting
Transferring Windows OS
● Windows Easy Transfer
○ Allows you to move user data from one computer to another in Vista, 7, and 8
● Can only “in-place upgrade” from 7 to 8
● Windows 7 Upgrade Advisor
○ Gives info about future software compatibility and what to do to preserve data
and functionality after windows 7 upgrade
● Windows Upgrade Assistant
○ Checks compatibility for in-place upgrades (7/8)
○ Checks hardware compatibility with new OS for old pcs (xp, vista)