CompTIA Network Study Notes
CompTIA Network Study Notes
https://www.DionTraining.com 1
CompTIA Network+ (Study Notes)
o Network Administrator
o Network Field Technician
o Network Engineer
o Network Analyst
https://www.DionTraining.com 2
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 3
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 4
CompTIA Network+ (Study Notes)
• Network Resources
o Client/Server Model
▪ Uses dedicated server to provide access to files, scanners, printers, and
other resources
▪ Administration and backup are easier since resources are located on a
few key servers
o Benefits of Client/Server
▪ Centralized administration
▪ Easier management
▪ Better scalability
o Drawbacks of Client/Server
▪ Higher cost
▪ Requires dedicated resources
▪ Requires network operating system
o Peer-to-Peer Model
▪ Peers (PCs) share resources (files/printers) with each other directly
▪ Administration and backup are more difficult since resources are located
on a many PCs which adds to the administrative burden
https://www.DionTraining.com 5
CompTIA Network+ (Study Notes)
o Benefits of Peer-to-Peer
▪ Lower cost
▪ No dedicated resources required
▪ No specialized operating system required
o Drawbacks of Peer-to-Peer
▪ Decentralized management
▪ Inefficient for large networks
▪ Poor scalability
• Network Geography
o Personal Area Network (PAN)
▪ Smallest type of wired or wireless network
▪ Covers the least amount of area (few meters)
▪ Examples:
• Bluetooth cellphone to car
• USB hard drive to laptop
• Firewire video camera to computer
o Local Area Network (LAN)
▪ Connects components in a limited distance
▪ Each segment is limited to short distances, such as 100 meters with CAT 5
cabling
▪ Consists of Ethernet (IEEE 802.3) or WiFi networks (IEEE 802.11)
▪ Examples:
• Internal wired or wireless networks
o Campus Area Network (CAN)
▪ Connects building-centric LANs across a university, industrial park, or
business park
▪ Covers many square miles and buildings
▪ Examples:
• College campus
• Business Parks
• Military bases
o Metropolitan Area Network (MAN)
▪ Connects scattered locations across a city
▪ Larger than a CAN, but smaller than a WAN
▪ Covers up to a 25-mile radius in larger cities
▪ Examples:
• City departments like the police department
• Community college with campuses spread across a county
o Wide Area Network (WAN)
▪ Connects geographically disparate internal networks
https://www.DionTraining.com 6
CompTIA Network+ (Study Notes)
▪
Consists of leased lines or Virtual Private Networks tunneled over the
Internet
▪ Covers distances around the country or around the world
▪ Examples:
• The Internet (largest WAN)
• Connecting two private corporate networks from New York to
Seattle
o Network Geography
o Ring Topology
▪ Uses a cable running in a circular loop
▪ Each device connects to the ring, but data travels in a
singular direction
▪ FDDI (Fiber networks) used two counter-rotating rings for
redundancy
https://www.DionTraining.com 7
CompTIA Network+ (Study Notes)
o Star Topology
o Hub-and-Spoke Topology
o Full-Mesh Topology
https://www.DionTraining.com 8
CompTIA Network+ (Study Notes)
o Partial-Mesh Topology
https://www.DionTraining.com 9
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 10
CompTIA Network+ (Study Notes)
OSI Model
• OSI Model Overview
o OSI Model (Open Systems Interconnection)
▪ Developed in 1977 by the International Organization for Standardization
(ISO)
▪ Called the OSI model or OSI stack
▪ Consists of 7 layers
▪ Useful in troubleshooting networks
▪ Serves as a reference model in networks
o Purpose of Reference Model
▪ Categorize functions of the network into particular layer(s)
▪ Compare technologies across different manufacturers
▪ By understanding its functions, you can understand how best
to communicate with that device
o OSI Model Layers
https://www.DionTraining.com 11
CompTIA Network+ (Study Notes)
• Layer 1 (Physical)
o Physical Layer (Layer 1)
▪ Transmission of bits across the network
▪ Physical and electrical characteristics
▪ Characteristics:
• How bits are represented on the medium
• Wiring standards for connectors and jacks
• Physical topology
• Synchronizing bits
• Bandwidth usage
• Multiplexing strategy
o How are bits represented on the medium?
▪ Electrical voltage (copper wiring) or light (fiber optics) represent 1’s and
0’s (bits)
▪ Current State
• If 0 volts, then 0 is represented
• If +/- 5 volts, then 1 is represented
▪ Transition Modulation
https://www.DionTraining.com 12
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 13
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 14
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 15
CompTIA Network+ (Study Notes)
• AppleTalk
• Internetwork Packet Exchange (IPX)
• Internet Protocol (IP)
▪ Only Internet Protocol (IP) remains dominant
• IP v4
• IP v6
o How should data be forwarded or routed?
▪ Packet switching (known as routing)
• Data is divided into packets and forwarded
▪ Circuit switching
• Dedicated communication link is established between two devices
▪ Message switching
• Data is divided into messages, similar to packet switching, except
these messages may be stored then forwarded
o Route Discovery and Selection
▪ Routers maintain a routing table to understand how to forward a packet
based on destination IP address
▪ Manually configured as a static route or dynamically through a routing
protocol
• RIP
• OSPF
• EIGRP
o Connection Services
▪ Layer 3 augment Layer 2 to improve reliability
▪ Flow control
• Prevents sender from sending data faster than receiver can get it
▪ Packet reordering
• Allows packets to be sent over multiple links and across multiple
routes for faster service
o Internet Control Message Protocol (ICMP)
▪ Used to send error messages and operational information about an IP
destination
▪ Not regularly used by end-user applications
▪ Used in troubleshooting (ping and traceroute)
o Examples at Layer 3
▪ Routers
▪ Multilayer switches
▪ IPv4 protocol
▪ IPv6 protocol
▪ Internet Control Message Protocol (ICMP)
https://www.DionTraining.com 16
CompTIA Network+ (Study Notes)
• Layer 4 (Transport)
o Transport Layer (Layer 4)
▪ Dividing line between upper and lower layers of the OSI model
▪ Data is sent as segments
▪ TCP/UDP
▪ Windowing
▪ Buffering
o TCP (Transmission Control Protocol)
▪ Connection-oriented protocol
▪ Reliable transport of segments
• If segment is dropped, protocol detects it and resends segment
▪ Acknowledgements received for successful communications
▪ Used for all network data that needs to be assured to get to its
destination
o UDP (User Datagram Protocol)
▪ Connectionless protocol
▪ Unreliable transport of segments
• If dropped, sender is unaware
▪ No retransmission
▪ Good for audio/video streaming
▪ Lower overhead for increased performance
o TCP vs UDP
o Windowing
▪ Allows the clients to adjust the amount of data sent in each segment
▪ Continually adjusts to send more or less data per segment transmitted
https://www.DionTraining.com 17
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 18
CompTIA Network+ (Study Notes)
▪ Responsible for formatting the data exchanged and securing that data
with proper encryption
▪ Functions
▪ Data formatting
▪ Encryption
o Data Formatting
▪ Formats data for proper compatibility between devices
• ASCII
• GIF
• JPG
▪ Ensures data is readable by receiving system
▪ Provides proper data structures
▪ Negotiates data transfer syntax for the Application Layer (Layer 7)
o Encryption
▪ Used to scramble the data in transit to keep it secure from prying eyes
▪ Provides confidentiality of data
▪ Example:
• TLS to secure data between your PC and website
o Examples at Layer 6
▪ HTML, XML, PHP, JavaScript, …
▪ ASCII, EBCDIC, UNICODE, …
▪ GIF, JPG, TIF, SVG, PNG, …
▪ MPG, MOV, …
▪ TLS, SSL, …
• Layer 7 (Application)
o Application Layer (Layer 7)
▪ Provides application level services
• Not Microsoft Word or Notepad
▪ Layer where the users communicate with the computer
▪ Functions:
• Application services
• Service advertisement
o Application Services
▪ Application services unite communicating components from more than
one network application
▪ Examples:
• File transfers and file sharing
• E-mail
• Remote access
• Network management activities
https://www.DionTraining.com 19
CompTIA Network+ (Study Notes)
• Client/server processes
o Service Advertisement
▪ Some applications send out announcements
▪ States the services they offer on the network
▪ Some centrally register with the Active Directory server instead
▪ Example:
• Printers
• File servers
o Examples at Layer 7
▪ E-mail (POP3, IMAP, SMTP)
▪ Web Browsing (HTTP, HTTPS)
▪ Domain Name Service (DNS)
▪ File Transfer Protocol (FTP, FTPS)
▪ Remote Access (TELNET, SSH)
▪ Simple Network Management Protocol (SNMP)
https://www.DionTraining.com 20
CompTIA Network+ (Study Notes)
TCP/IP Model
• TCP/IP Model
o TCP/IP Model
▪ Also known as TCP/IP stack or the DoD Model
▪ Alternative to the OSI Model
▪ More relevant model for network designers since it’s based on TCP/IP
▪ Only a 4-layer model
o OSI Model to TCP/IP Model
https://www.DionTraining.com 21
CompTIA Network+ (Study Notes)
• RTP
o Application (Layer 4)
▪ Defines TCP/IP application protocols
▪ Defines how programs interface with the transport layer service
▪ Layer with which the user interacts
▪ Examples:
• HTTP, TELNET, FTP, SNMP, DNS, SMTP, SSL, TLS, …
• Data Transfer Over Networks
o Ports
▪ Port numbers can be 0 to 65,536
▪ “Well-known” & Reserved Ports
• Ports 0 to 1024
▪ Ephemeral Ports
• Short-lived transport port that is automatically selected from a
predefined range
• Ports 1025 to 65,536
o Data Transfer
o IPv4 Packets
▪ Source Address
• IP of sender
▪ Destination Address
• IP of receiver
▪ IP Flags
• Allows packet fragmentation
▪ Protocol
• Is this packet using TCP or UDP?
https://www.DionTraining.com 22
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 23
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 24
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 25
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 26
CompTIA Network+ (Study Notes)
o Ports to Remember
https://www.DionTraining.com 27
CompTIA Network+ (Study Notes)
o Coaxial Cables
▪ RG-6
• Commonly used by local cable companies to connect individual
homes
▪ RG-59
• Typically used to carry composite video between two nearby
devices
• Example:
o TV to the cable box
o Coaxial Connectors
▪ BNC
• Termed Bayonet Neill-Concelman or British Naval Connector
https://www.DionTraining.com 28
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 29
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 30
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 31
CompTIA Network+ (Study Notes)
o Specialized SC Connectors
https://www.DionTraining.com 32
CompTIA Network+ (Study Notes)
• Transceivers
o Copper vs Fiber Optic Cables
▪ Fiber-Optic Advantages
• Higher bandwidth
• Longer distances
• Immune to EMI
• Better security
▪ Copper Advantages
• Less expensive
• Easy to install
• Inexpensive tools
o Media Converters
▪ Convert media from one format to another
▪ Layer 1 device
• Physical conversion of signal only
▪ Examples:
• Ethernet to Fiber Optic
• Fiber Optic to Ethernet
• Coaxial to Fiber
• Fiber to Coaxial
o Transceivers
▪ Device that sends and receives data
▪ Bidirectional
• Devices take turns communicating
• Known as half-duplex
▪ Duplex
• Devices can both communicate at the same time (full duplex)
▪ GBIC
• Standard, hot-pluggable gigabit Ethernet transceiver (copper or
fiber)
▪ Small Form-factor Pluggable
(SFP)
• Compact, hot-pluggable optical module transceiver
• Support up to 4.25 Gbps
• Known as Mini-GBIC
▪ SFP+
• Enhanced SFP
• Support up to 16 Gbps
▪ Quad Small Form-factor Pluggable (QSFP)
• Compact, hot-pluggable optical module transceiver
https://www.DionTraining.com 33
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 34
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 35
CompTIA Network+ (Study Notes)
Ethernet Fundamentals
• Ethernet Fundamentals
o Ethernet Fundamentals
▪ In early computer networks, there were many different network
technologies competing for a portion of the market share
▪ Ethernet, Token Ring, Fiber Distributed Data Interface (FDDI), and others
fought for dominance
▪ Currently, Ethernet is dominant for Layer 1
▪ Due to Ethernet’s popularity, it is important to understand the
fundamentals of Ethernet
o Origins of Ethernet
▪ Was first run over coax cables (10Base5, 10Base2)
▪ Ethernet has changed to using twisted pair cables
▪ 10BASE-T is Unshielded Twisted Pair
• Maximum speed: 10 Mbps
• Maximum distance: 100 meters
o How should devices access the network?
▪ Deterministic
• Very organized and orderly
• Need an electronic token to transmit
• For example, Token Ring networks
▪ Contention-based
• Very chaotic
• Transmit (almost) whenever you want
• For example, Ethernet networks
o Carrier Sense Multiple Access/ Collision Detect (CSMA/CD)
▪ Ethernet devices transmit based on a principle called carrier sense
multiple access/collision detect (CSMA/CD)
▪ Carrier sense
• Listen to the wire, verify it is not busy
▪ Multiple access
• All devices have access at any time
▪ Collision detect
• If two devices transmit at the same time, a collision occurs
• Back off, wait a random time, and try again
https://www.DionTraining.com 36
CompTIA Network+ (Study Notes)
o Example of CSMA/CD
o Collision Domains
▪ Comprised of all devices on a shared Ethernet segment (everything on
same cable or hub)
▪ Devices operate at half-duplex when connected to a hub (Layer 1 device)
▪ Devices must listen before they transmit to avoid collisions when
operating as CSMA/CD
o Collision Domains with Switches
▪ Ethernet switches increase scalability of the network by creating multiple
collision domains
▪ Each port on a switch is a collision domain, no chance of collisions, and
increases speed
▪ Switches can operate in full-duplex mode
https://www.DionTraining.com 37
CompTIA Network+ (Study Notes)
o Speed Limitations
▪ Bandwidth is the measure of how many bits the network can transmit in
1-second (bps)
▪ Type of cable determines the bandwidth capacity of the network
o Distance Limitations
https://www.DionTraining.com 38
CompTIA Network+ (Study Notes)
o Hub
▪ Layer 1 device used to connect multiple network devices/workstations
▪ Known as multiport repeaters
▪ Three basic types of Ethernet hubs:
• Passive hub
o Repeats signal with no amplification
• Active hub
o Repeats signal with amplification
• Smart hub
o Active hub with enhanced features like SNMP
o Collision Domains
▪ Hubs (layer 1) were used to connect multiple network segments together
▪ Each LAN segment becomes a separate collision domain
o Bridges
▪ Bridges analyze source MAC addresses in frames entering the bridge and
populate an internal MAC address table
▪ Make intelligent forwarding decisions based on destination MAC address
in the frames
https://www.DionTraining.com 39
CompTIA Network+ (Study Notes)
o Switch
▪ Layer 2 device used to connect multiple network segments together
▪ Essentially a multiport bridge
▪ Switches learn MAC addresses and make forwarding decisions based on
them
▪ Switches analyze source MAC addresses in frames entering the switch
and populate an internal MAC address table based on them
o Layer 2 Switch
▪ Each port on a switch represents an individual collision domain
▪ All ports belong to the same broadcast domain
https://www.DionTraining.com 40
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 41
CompTIA Network+ (Study Notes)
o Router
▪ Layer 3 device used to connect multiple networks together
▪ Make forwarding decisions based on logical network address information
• Such as using IP addresses (IPv4 or IPv6)
https://www.DionTraining.com 42
CompTIA Network+ (Study Notes)
▪ Routers are typically more feature rich and support a broader range of
interface types than multilayer switches
▪ Each port is a separate collision domain
▪ Each port is a separate broadcast domain
o Layer 3 Switch
▪ Layer 3 device used to connect multiple network segments together
▪ Can make Layer 3 routing decisions and interconnect entire networks
(like a router), not just network segments (like a switch)
https://www.DionTraining.com 43
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 44
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 45
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 46
CompTIA Network+ (Study Notes)
o First-Hop Redundancy
▪ Hot Standby Router Protocol (HSRP) uses virtual IP and MAC addresses to
provide a “active router” and a “standby router”
• HSRP is a Cisco-proprietary protocol
• If Active is offline, then standby answers
o Other First-Hop Redundancy Protocols
▪ Gateway Load Balancing Protocol (GLBP)
• Cisco-proprietary protocol
▪ Virtual Router Redundancy Protocol (VRRP)
• Open-source protocol
▪ Common Address Redundancy Protocol (CARP)
• Open-source protocol
o MAC Filtering
▪ Permits or denies traffic based on a device’s MAC address to improve
security
o Traffic Filtering
▪ Multilayer switches may permit or deny traffic based on IP addresses or
application ports
https://www.DionTraining.com 47
CompTIA Network+ (Study Notes)
o Without STP…
▪ MAC Address table corruption can occur
o Broadcast Storms
▪ If broadcast frame received by both switches, they can forward frame to
each other
https://www.DionTraining.com 48
CompTIA Network+ (Study Notes)
▪ Designated Port
• Every network segment has a designated port
• Port closest to the root bridge in terms of cost
https://www.DionTraining.com 49
CompTIA Network+ (Study Notes)
o Port States
▪ Non-designated ports do not forward traffic during normal operation, but
do receive bridge protocol data units (BPDUs)
▪ If a link in the topology goes down, the
non-designated port detects the failure and determines whether it needs
to transition to a forwarding state
▪ To get to the forwarding state, though, it has to transition through four
states
▪ Blocking
• BPDUs are received but they are not forwarded
• Used at beginning and on redundant links
▪ Listening
• Populates MAC address table
• Does not forward frames
▪ Learning
• Processes BPDUs
• Switch determines its role in the spanning tree
▪ Forwarding
• Forwards frames for operations
▪ Root and Non-designated port are blocking
▪ Designated ports are forwarding
https://www.DionTraining.com 50
CompTIA Network+ (Study Notes)
o Link Costs
▪ Associated with the speed of a link
▪ Lower the link’s speed, the higher the cost
▪ Long STP is being adopted due to higher link speeds over 10 Gbps
▪ Values range from 2,000,000 for 10-Mbps Ethernet to as little as 2 for 10
Tbps
https://www.DionTraining.com 51
CompTIA Network+ (Study Notes)
o Using VLANs
▪ Same switches but switch ports can be in different VLANs
o VLAN Trunking (802.1q)
▪ Multiple VLANs transmitted over the same physical cable
▪ VLANs are each tagged with 4-byte identifier
• Tag Protocol Identifier (TPI)
• Tag Control Identifier (TCI)
▪ One VLAN is left untagged
• Called the Native VLAN
• Specialized Network Devices
o Specialized Network Devices
▪ Many other types of network devices besides routers, switches, servers,
and workstations
▪ Others devices serve specific functions to improve usability, performance,
and security
▪ Devices include
• VPN concentrators
• Firewalls
• DNS servers
• DHCP servers
• Proxy servers
• Content engines and switches
o VPN Concentrator
▪ Virtual private network (VPN) creates a secure, virtual tunnel network
over an untrusted network, like the Internet
▪ One of the devices that can terminate VPN tunnels is a VPN concentrator,
although firewalls can also perform this function
o Firewalls
▪ Network security appliance at your boundary
▪ Firewalls can be software or hardware
▪ Stateful firewalls
• Allows traffic that originates from inside the network and go out
to the Internet
• Blocks traffic originated from the Internet from getting into the
network
https://www.DionTraining.com 52
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 53
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 54
CompTIA Network+ (Study Notes)
o Proxy Server
▪ Device that makes a request to external network on behalf of a client
▪ Used for security to perform content filtering and logging
▪ Workstation clients are configured to forward their packets to a proxy
server
o Content Engine
▪ Dedicated appliances that perform the caching functions of a proxy
server
▪ Are more efficient than a proxy server
▪ Also called Caching Engines
https://www.DionTraining.com 55
CompTIA Network+ (Study Notes)
o Content Switches
▪ Distributes incoming requests across the various servers in the server
farm
▪ Also known as Load Balancers
https://www.DionTraining.com 56
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 57
CompTIA Network+ (Study Notes)
o Virtual Desktops
▪ User’s desktop computer is run in browser
▪ Used from web, laptop, tablet, or phone
▪ Easier to secure and upgrade for the admins
https://www.DionTraining.com 58
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 59
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 60
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 61
CompTIA Network+ (Study Notes)
Wireless Networks
• Wireless Networking (WLAN)
o Wireless Networks (WLANs)
▪ Allows users to roam within a coverage area
▪ Popularity has increased exponentially
▪ Convenient to use and expand network access throughout a room, floor,
or building
▪ IEEE 802.11 is the most common type
▪ Other wireless options exist (used for PAN)
• Bluetooth
• Infrared (IR)
• Near-Field Communications (NFC)
• Ant+
• Z-Wave
o Ad Hoc
▪ Wireless devices communicate
directly with each other
without the need for a
centralized access point
▪ Peer-to-Peer connections
o Infrastructure
▪ Wireless devices communicate
with other wireless or wired
devices through a wireless
router or access point
▪ Traditional WiFi in Home and
Office networks
https://www.DionTraining.com 62
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 63
CompTIA Network+ (Study Notes)
o Mesh Topology
▪ May not use a centralized control
▪ Range of combined wireless defines network
▪ Uses WiFi, Microwave, Cellular, and more
o AP Placement
▪ Careful planning is required to
prevent the APs from interfering
with one another and still
maintaining the desired
coverage area in ESS
▪ Coverage should overlap
between APs to allow
uninterrupted roaming from one
cell to another but can’t use
overlapping frequencies
https://www.DionTraining.com 64
CompTIA Network+ (Study Notes)
o AP Placement (5 Ghz)
▪ Identical channels should be separated by at least two cells instead of
one
o Site Surveys
▪ Wireless survey to determine coverage areas
▪ Produces a heat map with coverage
https://www.DionTraining.com 65
CompTIA Network+ (Study Notes)
o Unidirectional Antenna
• Wireless Frequencies
o Spread Spectrum Wireless Transmissions
▪ Direct-Sequence Spread Spectrum (DSSS)
▪ Frequency-Hopping Spread Spectrum (FHSS)
▪ Orthogonal Frequency-Division Multiplexing (OFDM)
▪ Only DSS and OFDM are commonly utilized in today’s WLANs
o Direct-Sequence Spread Spectrum (DSSS)
https://www.DionTraining.com 66
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 67
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 68
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 69
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 70
CompTIA Network+ (Study Notes)
o Geofencing
▪ GPS or RFID defines real-world boundaries
▪ Barriers can be active or passive
▪ Device can send alerts if it leaves area
▪ Network authentication can use it to determine access
o Disable SSID Broadcast
▪ Configures an AP to not broadcast the name of the wireless LAN
▪ Problem:
• Knowledgeable users can still easily find the SSID using wireless
sniffing tools
o Rogue Access Point
▪ Malicious users set up an AP to lure legitimate users to connect to the AP
▪ Malicious users can then capture all the packets (data) going through the
rogue access point
https://www.DionTraining.com 71
CompTIA Network+ (Study Notes)
IP Addressing
• IPv4 Addressing
o Internet Protocol Version 4 (IPv4) Addressing
▪ Written in dotted-decimal notation
• 10.1.2.3
• 172.21.243.67
▪ Each IPv4 address is divided into 4 separate numbers and divided by dots
▪ Each of these division are call octets due to having 8 bits assigned
▪ 32-bits in length
o IPv4 Addressing
▪ IPv4 address is divided into network and host portions
▪ Subnet mask defines the network portion
• Network portion if a binary 1
• Host portion if binary 0
o Classes of IP Addresses
▪ Default subnet mask assigned by first octet
• Classful Masks if using default subnet mask
▪ Defines the Class of IP Address
Notice that 127 is skipped between Class A and Class B. It is a reserved block for the loopback address (127.0.0.1)
o Routable IPs
▪ Publicly routable IP addresses are globally managed by ICANN
• Internet Corporation for Assigned Names and Numbers
o ARIN, LACNIC, AFNIC, APNIC, and RIPE NCC
▪ Public IP’s must be purchased before use through your Internet Service
Provider
https://www.DionTraining.com 72
CompTIA Network+ (Study Notes)
o Private IPs
▪ Private IP’s can be used by anyone
▪ Not routable outside your local area network
▪ Network Address Translation (NAT) allows for routing of private IPs
through a public IP
o Specialized IPs
▪ Loopback addresses (127.x.x.x range)
• Refers to the device itself and used for testing
• Most commonly used as 127.0.0.1
▪ Automatic Private IP Addresses (APIPA)
• Dynamically assigned by OS when DHCP server is unavailable and
address not assigned manually
• Range of 169.254.x.x
https://www.DionTraining.com 73
CompTIA Network+ (Study Notes)
▪ Multicast
• Data travels from a single source device to multiple (but specific)
destination devices
▪ Broadcast
• Data travels from a single source device to all devices on a
destination network
• Assigning IP Addresses
o Assigning IP Addresses
▪ Static
• Simple
• Time-consuming
• Prone to human errors
• Impractical for large networks
▪ Dynamic
• Quicker
• Easier
https://www.DionTraining.com 74
CompTIA Network+ (Study Notes)
• Less confusing
• Simplistic for large networks
o Components of an IP Address
▪ Information assigned from static or dynamic
• IP Address
• Subnet Mask
• Default Gateway
• Server addresses
o DNS
▪ Converts domain names to IP address
o WINS (optional)
▪ Converts NetBIOS computer name into an IP
address
o Dynamic Host Control Protocol (DHCP)
Configuration
▪ Based on the older Bootstrap Protocol
(BOOTP for short)
• Required static database of IP
and MAC to assign
▪ DHCP service assigns an IP from an
assignable pool (scope)
▪ IP Address Management is a piece of
software used to manage the IP’s
being assigned
o Dynamic Host Control Protocol (DHCP)
▪ Provides clients with
• IP
• Subnet mask
• Default gateway
• DNS server
• WINS server
• Other variables needed for VoIP
▪ Each IP is leased for a given amount of time and given back to the pool
when lease expires (TTL)
https://www.DionTraining.com 75
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 76
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 77
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 78
CompTIA Network+ (Study Notes)
• Subnetting
o Subnetting
▪ Default classful subnet masks are rarely the optimal choice for a subnet
size
▪ Subnets can be modified using subnet masks to create networks that are
better scoped
▪ Creating a subnet involves borrowing bits from the original host portion
and adding them to the network portion
o Purpose of Subnets
▪ More efficient use of IP addresses than classful default
▪ Enables separation of networks for security
▪ Enables bandwidth control
https://www.DionTraining.com 79
CompTIA Network+ (Study Notes)
o Subnet Masks
https://www.DionTraining.com 80
CompTIA Network+ (Study Notes)
o Listing Subnets
https://www.DionTraining.com 81
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 82
CompTIA Network+ (Study Notes)
• Subnetting Practice
https://www.DionTraining.com 83
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 84
CompTIA Network+ (Study Notes)
• IPv6 Addresses
o Internet Protocol Version 6 (IPv6)
▪ We’ve essentially ran out of IPv4 addresses due to proliferation of
networked devices
▪ IPv6 addressing provides enough IP addresses for generations to come
▪ Enough IPv6 addresses for every person on the planet (5 x 10 28)
https://www.DionTraining.com 85
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 86
CompTIA Network+ (Study Notes)
o Multicast
▪ Data travels from a single source device to multiple (but specific)
destination devices
o Anycast
▪ Designed to let one host initiate the efficient updating of router tables for
a group of hosts
▪ IPv6 can determine which gateway host is closest and sends the packets
to that host as though it were a unicast communication
▪ That host can anycast to another host in the group until all routing tables
are updated
▪ Data travels from a single source device to the device nearest to multiple
(but specific) destination devices
https://www.DionTraining.com 87
CompTIA Network+ (Study Notes)
Routing
• Routing Fundamentals
o Routing Fundamentals
▪ Traffic is routed to flow between subnets
▪ Each subnet is its own broadcast domain
▪ Routers are the layer 3 devices that separate broadcast domains, but
multilayer switches are also used
https://www.DionTraining.com 88
CompTIA Network+ (Study Notes)
• Routing Tables
o Routing Decisions
▪ Layer 3 to Layer 2 Mapping
• Router’s use ARP caches to map an IP address to a given MAC
address
▪ Make packet-forwarding decisions based upon their internal routing
tables
o Routing Tables
▪ Table kept by the router to help determine which route entry is the best
fit for the network
▪ A route entry with the longest prefix is the most specific network
▪ 10.1.1.0/24 more specific than 10.0.0.0/8
https://www.DionTraining.com 89
CompTIA Network+ (Study Notes)
o Static Routes
https://www.DionTraining.com 90
CompTIA Network+ (Study Notes)
o Routing Loops
https://www.DionTraining.com 91
CompTIA Network+ (Study Notes)
• Routing Protocols
o Internal and Exterior Routing Protocols
▪ Interior Gateway Protocols (IGP)
• Operate within an autonomous system
▪ Exterior Gateway Protocols (EGP)
• Operated between autonomous systems
https://www.DionTraining.com 92
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 93
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 94
CompTIA Network+ (Study Notes)
o Metrics
▪ If a routing protocol knows multiple paths to reach a network, how does
it choose its path?
• Metrics are the values assigned to a route
• Lower metrics are preferred over higher metrics
▪ Metrics calculated differently for each protocol (RIP, OSPF, IS-IS, EIGRP,
and BGP)
• Hop count
• Bandwidth
• Reliability
• Delay
• Other metrics
o Routing Protocol Summary
https://www.DionTraining.com 95
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 96
CompTIA Network+ (Study Notes)
• Multicast Routing
o Multicast Routing
▪ Multicast sender sends traffic to a Class D IP Address, known as a
multicast group
▪ Goal
• Send the traffic only to the devices that want it
▪ Two primary protocols
• Internet Group Management Protocol (IGMP)
• Protocol Independent Multicast (PIM)
o Internet Group Management Protocol (IGMP)
▪ Used by clients and routers to let routers known which interfaces have
multicast receivers
▪ Used by clients to join a multicast group
▪ Versions
• IGMPv1
o Clients requests joining the group and is asked every 60
seconds if it wants to remain in the group
• IGMPv2
o Client can send a leave message to exit multicast group
• IGMPv3
o Client can request multicast from only specific server
o Called source-specific multicast (SSM)
o Allows multiple video streams to single multicast
https://www.DionTraining.com 97
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 98
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 99
CompTIA Network+ (Study Notes)
o Circuit-Switched Connection
▪ Connection is brought up only when needed, like making a phone call
▪ On-demand bandwidth can provide cost savings for customers who only
need periodic connectivity to a remote site
o Packet-Switched Connection
▪ Always on like a dedicated leased line, but multiple customers share the
bandwidth
▪ SLAs used to guarantee a certain quality
(5mbps at least 80% of the time)
▪ Virtual circuits are represented as dashed lines
https://www.DionTraining.com 100
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 101
CompTIA Network+ (Study Notes)
o Metro Ethernet
▪ Service providers are beginning to offer Ethernet interfaces to their
customers
▪ Less expensive and more common than specialized serial ports used in a
CSU/DSU
▪ Technology used by service provider is hidden from customer and they
only need to connect their network’s router to a Smart Jack
o Point-to-Point Protocol (PPP)
▪ Commonly used Layer 2 protocol on dedicated leased lines to
simultaneously transmits multiple Layer 3 protocols (IP, IPX)
▪ Each Layer 3 control protocol runs an instance of PPP’s Link Control
Protocol (LCP)
• Multilink interface
o Allows multiple physical connections to be bonded
together into a logical interface
• Looped link detection
o Layer 2 loop can be detected and prevented
• Error detection
o Frames containing errors can be detected and discarded
• Authentication
https://www.DionTraining.com 102
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 103
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 104
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 105
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 106
CompTIA Network+ (Study Notes)
Network Security
• CIA Triad
o Network Security Fundamentals
▪ Networks are increasingly dependent on interconnecting with other
networks
▪ Risks exist not just on the untrusted Internet, but also inside our own
organization’s networks and must be minimized or eliminated
▪ Understanding the various threats facing our networks is important in
order to best defend the network against the onslaught of cyber-attacks
they are constantly facing
o Network Security Goals
▪ Commonly called the CIA Triad
• Confidentiality
• Integrity
• Availability
o Confidentiality
▪ Keeping the data private and safe
• Encryption
• Authentication to access resources
▪ Encryption ensures that data can only be read (decoded) by the intended
recipient
• Symmetric encryption
• Asymmetric encryption
o Symmetric Encryption (Confidentiality)
▪ Both sender and receiver use the same key
▪ DES (Data Encryption Standard)
• Developed in the mid-1970s
• 56-bit key
• Used by SNMPv3
• Considered weak today
▪ 3DES (Triple DES)
• Uses three 56-bit keys (168-bit total)
• Encrypt, decrypt, encrypt
▪ AES (Advanced Encryption Standard)
• Preferred symmetric encryption standard
• Used by WPA2
• Available in 128-bit, 192-bit, and 256-bit keys
https://www.DionTraining.com 107
CompTIA Network+ (Study Notes)
▪ Sender and receiver use the same key to encrypt and decrypt the
messages
o Integrity
▪ Ensures data has not been modified in transit
▪ Verifies the source that traffic originates from
▪ Integrity violations
• Defacing a corporate web page
https://www.DionTraining.com 108
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 109
CompTIA Network+ (Study Notes)
▪ Causes data to flow through the attacker’s computer where they can
intercept or manipulate the data
https://www.DionTraining.com 110
CompTIA Network+ (Study Notes)
o Session Hijacking
▪ Attacker guesses the session ID for a web session, enabling them to take
over the already authorized session of the client
o Botnets
▪ Software robot that lies on a compromised computer
▪ Collection of computers (called zombies) can be controlled by a remote
server to perform various attacks/functions for the criminals
• Network Security Attacks (Part 2)
o Attacks on Availability
▪ Attack vary widely from consuming server resources to physically
damaging the system
• Denial of service (DoS)
• Distributed Denial of Service (DDoS)
• TCP SYN flood
• Buffer overflow
• ICMP attacks (Smurf)
• UDP attacks (Fraggle)
• Ping of Death
• Electrical disturbances
• Physical environment attacks
o Denial of Service
▪ Continually floods the victim system with requests for services and
causes the system to run out of memory and crash
https://www.DionTraining.com 111
CompTIA Network+ (Study Notes)
o Electrical Disturbance
▪ Launched by interrupting or interfering with electrical service available to
a system
▪ Uninterruptable power supply (UPS), line conditioners, and backup
generator can help to combat these threats
▪ Examples
• Power spikes
• Electrical surges
• Power faults
• Blackouts
• Power sag
• Brownout
https://www.DionTraining.com 112
CompTIA Network+ (Study Notes)
o Physical Environment
▪ Computing equipment can be damaged by influencing the physical
environment
• Temperature
o Attacker disturbs the HVAC to overheat your systems
• Humidity
o Create a high level of moisture/humidity
• Gas
o Inject gas into an environment that could ignite
▪ Threats generally mitigated through physical restrictions, access
credentials, and visual monitoring
• Network Security Attacks (Part 3)
o Other Attacks to Consider
▪ Insider Threats
▪ Phishing
▪ Ransomware
▪ Logic Bombs
▪ Deauthentication
▪ VLAN Hopping
o Insider Threats
▪ Employees or other trusted insiders who use their network access to
harm the company
o Logic Bomb
▪ Specific type of malware that is tied to a time or logical event
o Phishing
▪ Attackers send email to get a user to click link
o Ransomware
▪ Attackers gain control of your files, encrypt them, and hold them for a
ransom
o Deauthentication
▪ Attacker sends a deauthentication frame a victim to disconnect them
from the network
▪ Often used in wireless hacking attacks
o VLAN Hopping
▪ Attacker physically connects to a different switch port to access a
different VLAN
▪ Manually assigning switch ports and using NAC can help prevent this
• Protecting the Network
o Protecting the Network
▪ To successfully defend a network attacks use
https://www.DionTraining.com 113
CompTIA Network+ (Study Notes)
• Physical controls
• User training
• Patching
• Vulnerability scanners
• Honey pots and Honey nets
• Remote-access security
• Security policies
• Incident response
o Physical Controls
▪ Reduces unauthorized access
▪ Mantraps
▪ Keypads
▪ Locked facilities
▪ Authenticated access
• Badges
• Biometrics
• Key fobs
• Passwords/Pins
o User Training
▪ Users present one of the greatest vulnerabilities to the network
▪ Training should include
• Social engineering awareness
• Virus transmission dangers
• Password security
• E-mail security
• Physical security
o Vulnerability Scanners
▪ Periodically test the network to verify that network security components
are behaving as expected and to detect known vulnerabilities
▪ Vulnerability scanners are applications that conduct these tests
▪ Examples
• Nessus
• Zenmap
• Nmap
o Patching
▪ Designed to correct a known bug or fix a known vulnerability in programs
and apps
▪ Should be implemented as they become available
▪ Updates add new features, but patches fix known vulnerabilities
https://www.DionTraining.com 114
CompTIA Network+ (Study Notes)
• Security Policies
o Security Policy
▪ Lack of a security policy, or lack of enforcement of an existing policy, is a
major reason for security breaches
▪ Security policies serve multiple purposes
• Protecting an organization’s assets
• Making employees aware of their obligations
• Identifying specific security solutions
• Acting as a baseline for ongoing security monitoring
▪ Acceptable Use Policy (AUP) is a common component of a corporate
security policy
▪ Security policies contain a myriad of other complementary policies
▪ Larger organizations have complex policies
https://www.DionTraining.com 115
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 116
CompTIA Network+ (Study Notes)
▪ How are you planning to dispose of your hard drives and devices when
they aren’t useful?
o Licensing Restrictions and Export Controls
▪ All software needs to have proper licensing, including any virtual
machines
▪ Some items are restricted from being exported to certain regions of the
world (cryptography)
• If your organization crosses international borders, check with your
legal and compliance teams to ensure you aren’t breaking any
laws
o Incident Response
▪ How will you react to a security violation?
▪ Prosecuting computer crimes can be difficult
▪ Successful prosecution relies on
• Means
o Did suspect have technical skills to perform the attack?
• Motive
o Why would they perform the attack?
• Opportunity
o Do they have the time and access?
• Multifactor Authentication
o Multifactor Authentication
▪ Something you know
▪ Something you have
▪ Something you are
▪ Something you do
▪ Somewhere you are
o Something You Know (Knowledge Factor)
▪ Usernames
▪ Passwords
▪ PINs
▪ Answers to personal questions
o Weaknesses of Passwords
▪ Not changing the default credentials
▪ Using common passwords
▪ Weak and short passwords
o Something You Have (Possession Factor)
▪ Smartcard
• Stores digital certificates on the card which are accessed once a
valid PIN is provided
https://www.DionTraining.com 117
CompTIA Network+ (Study Notes)
▪ Key fobs
▪ RFID tags
o Something You Are (Inherence Factor)
▪ Fingerprints
▪ Retina scans
▪ Voice prints
o Something You Do (Action Factor)
▪ How you sign your name
▪ How you draw a particular pattern
▪ How you say a certain passphrase
o Somewhere You Are (Location Factor)
▪ Geotagging
▪ Geofencing
• Firewalls
o Firewalls
▪ Uses a set of rules defining the types of traffic permitted or denied
through the device
▪ Can be either software or hardware
▪ Also, can perform Network Address Translation (NAT) or Port Address
Translation (PAT)
o Packet-Filtering Firewalls
▪ Permits or denies traffic based on packet header
• Source IP address/port number
• Destination IP address/port number
▪ Looks at each packet individually
o Stateful Firewalls
▪ Inspects traffic as part of a session
▪ Recognizes whether traffic originated from inside or outside the LAN
o NextGen Firewalls (NGFW)
▪ Third generation firewalls that conduct deep packet inspection and
packet filtering
▪ Operates at higher levels of the OSI model than traditional stateful
firewalls
▪ Web Application Firewalls are a good example of these, as they inspect
HTTP traffic
o Access Control List (ACL)
▪ Set of rules typically applied to router interfaces that permit or deny
certain traffic
▪ ACL filtering criteria includes:
• Source IP, Port, or MAC
https://www.DionTraining.com 118
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 119
CompTIA Network+ (Study Notes)
▪ Monitors all traffic, sends alerts, and drops or blocks the offending traffic
o Detection Methods
▪ Signature-based detection
• Signature contains strings of bytes (a pattern) that triggers
detection
▪ Policy-based detection
• Relies on specific declaration of the security policy
• Example: No Telnet allowed
▪ Anomaly-based detection
• Statistical anomaly
o Watches traffic patterns to build baseline
• Non-statistical anomaly
o Administrator defines the patterns/baseline
o HIDS/NIDS and HIPS/NIPS
▪ Network-based (NIDS/NIPS)
• Network device to protect entire network
▪ Host-based (HIDS/HIPS)
• Software-based and installed on servers/clients
▪ Network and Host-based can work together for more complete
protection
• NIPS might prevent a DoS attack whereas a HIPS solution could
focus on the protection of applications on a host from malware
and other attacks
https://www.DionTraining.com 120
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 121
CompTIA Network+ (Study Notes)
▪ Can be used for secure VPN if combined with additional protocols for
encryption services
o VPN Types: L2F
▪ Layer 2 Forwarding (L2F) was developed by Cisco to provide for tunneling
of PPP
▪ Lacks native security features, like L2TP
o VPN Types: PPTP
▪ Point-to-Point Tunneling Protocol (PPTP) is an older protocol that
supports dial-up networks
▪ Lacks native security features, but Windows added some features in their
implementation
• IP Security (IPSec)
o IP Security (IPSec)
▪ VPNs most commonly use IPsec to provide protections for their traffic
over the internet
o IKE Modes
▪ IPsec uses the Internet Key Exchange (IKE) to create a secure tunnel
• IKE uses encryption between authenticated peers
https://www.DionTraining.com 122
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 123
CompTIA Network+ (Study Notes)
Network Availability
• High Availability Networks
o High Availability
▪ Availability is measured by uptime
▪ Five nines of availability (99.999%)
▪ Maximum of 5 minutes of downtime per year
▪ Availability
• Concerned with being up and operational
▪ Reliability
• Concerned with not dropping packets
▪ Mean Time to Repair (MTTR)
• Measures the average time it takes to repair a network device
when it breaks
▪ Mean Time Between Failures (MTBF)
• Measures the average time between failures of a device
o Redundant Network with Single Points of Failure
▪ Link Redundancy (Multiple connections between devices)
• Internal Hardware Redundancy (Power supplies and NICs)
o Redundant Network with Now Single Points of Failure
▪ Link Redundancy (Multiple connections between devices)
• Redundancy of Components (Switches and Routers)
o Hardware Redundancy
▪ Takes many forms
▪ Devices with two network interface cards (NICs), hard drives, or internal
power supplies
▪ Often found in strategic network devices
• Routers, Switches, Firewalls, and Servers
• Not often found in clients due to costs and administrative
overhead involved in management
▪ Active-Active
• Multiple NICs are active at the same time
• NICs have their own MAC address
• Makes troubleshooting more complex
▪ Active-Standby
• One NIC is active at a time
• Client appears to have a single MAC address
o Layer 3 Redundancy
▪ Clients are configured with a default gateway (router)
https://www.DionTraining.com 124
CompTIA Network+ (Study Notes)
• If the default gateway goes down, they cannot leave the subnet
• Layer 3 Redundancy occurs with virtual gateways
▪ Layer 3 Redundancy Protocols
• Hot Standby Router Protocol
• Common Address Redundancy Protocol
• Virtual Router Redundancy Protocol
• Gateway Load Balancing Protocol
• Link Aggregation Control Protocol
o Hot Standby Router Protocol (HSRP)
▪ Proprietary first-hop redundancy by Cisco
▪ Allows for active router and standby router
▪ Creates virtual router as the default gateway
o Common Address Redundancy Protocol (CARP)
▪ Open-standard variant of HSRP
▪ Allows for active router and standby router
▪ Creates virtual router as the default gateway
o Virtual Router Redundancy Protocol (VRRP)
▪ IETP open-standard variant of HSRP
▪ Allows for active router and standby router
▪ Creates virtual router as the default gateway
o Gateway Load Balancing Protocol (GLBP)
▪ Proprietary first-hop redundancy by Cisco
▪ Focuses on load balancing over redundancy
▪ Allows for active router and standby router
▪ Creates virtual router as the default gateway
o Link Aggregation Control Protocol (LACP)
▪ Achieves redundancy by having multiple links between devices
▪ Load balancing occurs over multiple links
▪ Multiple links appear as single logical link
o Content Engine
▪ Dedicated appliances that perform the caching functions of a proxy
server
▪ Are more efficient than a proxy server
▪ Also called Caching Engines
o Content Switches
▪ Distributes incoming requests across the various servers in the server
farm
▪ Also known as Load Balancers
• Designing Redundant Networks
o Design Considerations
https://www.DionTraining.com 125
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 126
CompTIA Network+ (Study Notes)
o Hot Sites
▪ Building, equipment, and data is available
▪ Software and hardware are configured
▪ Basically, people can just walk into the new facility and get to work
▪ Downtime is minimal with nearly identical service levels maintained
o Backup and Recovery
▪ Full
• Complete backup is the safest and most comprehensive; Time
consuming and costly
▪ Incremental
• Backup only data changed since last backup
▪ Differential
• Only backups data since the last full backup
▪ Snapshots
• Read-only copy of data frozen in time (VMs)
• Quality of Service (QoS)
o Need for Quality of Service (QoS)
▪ Networks carry data, voice, and video content
▪ Convergence of media on the network requires high availability to ensure
proper delivery
▪ Optimizing the network to efficiently utilize the bandwidth to deliver
useful solutions to network users is crucial to success and cost savings
o Quality of Service (QoS)
▪ Enables strategic optimization of network performance for different
types of traffic
• Identifies types of traffic needing priority
• Determines how much bandwidth required
• Efficiently uses WAN link’s bandwidth
• Identifies types of traffic to drop during network congestion
▪ For example:
• Voice (VoIP) and Video should have higher priority levels (less
latency)
o Categories of QoS
▪ Delay
• Time a packet travels from source to destination
• Measured in milliseconds (ms)
▪ Jitter
• Uneven arrival of packets
• Especially harmful in VoIP
▪ Drops
https://www.DionTraining.com 127
CompTIA Network+ (Study Notes)
• QoS Categorization
o Purpose of QoS
▪ To categorize traffic, apply a policy to those traffic categories, and
prioritize them in accordance with a QoS policy
o Categorization of Traffic
▪ Determine network performance requirements for various traffic types
(Voice, Video, Data)
▪ Categorize traffic into specific categories:
• Low delay
o Voice
o Streaming Video
• Low priority
o Web browsing
o Non-mission critical data
▪ Document your QoS policy and make it available to your users
https://www.DionTraining.com 128
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 129
CompTIA Network+ (Study Notes)
o Marking of Traffic
▪ Alters bits within a frame, cell, or packet indicates handling of traffic
▪ Network tools make decisions based on markings
o Congestion Management
▪ When a device receives traffic faster than it can be transmitted, it buffers
the extra traffic until bandwidth becomes available
• Called queuing
▪ Queuing algorithm empties the packets in specified sequence and
amount
▪ Queuing algorithms types
• Weighted fair queuing
• Low-latency queuing
• Weighted round-robin
o Congestion Avoidance
▪ Newly arriving packets would be discarded if the device’s output queue
fills to capacity
▪ Random Early Detection (RED) is used to prevent this from occurring
• As the queue fills, the possibility of a discard increases until it
reaches 100%
• If at 100%, all traffic of that type is dropped
• RED instead drops packets from selected queues based on
defined limits
▪ If TCP traffic, it will be retransmitted
▪ If UDP, it will simply be dropped
o Policing and Shaping
▪ Policing
• Typically discards packets that exceed a configured rate limit
(speed limit)
• Dropped packets result in retransmissions
• Recommended for higher-speed interfaces
▪ Shaping
• Buffers (delays) traffic exceeding configured rate
• Recommended for slower-speed interfaces
o Link Efficiency: Compression
▪ Packet payload is compressed to conserve bandwidth
▪ VoIP payload can be reduced by 50%
• Payload size from 40 bytes to 20 bytes
▪ VoIP header can be reduced by 90-95%
• Uses RTP header compression (cRTP)
• Header size goes from 40 bytes to 2 to 4 bytes
https://www.DionTraining.com 130
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 131
CompTIA Network+ (Study Notes)
Network Management
• SNMP
o Simple Network Management Protocol (SNMP)
▪ SNMP manager sends/receives messages to managed devices (routers,
switches, servers)
• SET sends information
• GET requests information
• TRAP receives unsolicited information from managed devices
o SNMP Versions
▪ SNMP v1
▪ SNMP v2
▪ SNMP v3
o SNMP v1 and v2
▪ Use community strings to gain access to a device
▪ Default community strings of public (read-only) or private (read-write)
devices are considered a security risk
o SNMP v3
▪ SNMPv3 addressed the weakness of community strings with three
enhancements
• Hashes message before transmitting (integrity)
• Validates source of message (authentication)
• DES-56 to provides confidentiality and privacy (encryption)
▪ SNMPv3 also groups SNMP components as entities to increase security
• Network Logging
o Syslog
▪ Routers, switches, and servers can send their log information to a
common syslog server
https://www.DionTraining.com 132
CompTIA Network+ (Study Notes)
o Syslog Structure
o Logs
▪ Operating systems running on network clients and servers can also
produce logs
https://www.DionTraining.com 133
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 134
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 135
CompTIA Network+ (Study Notes)
• Baselining
• Cable management
• Change management
• Network documentation
o Asset Management
▪ Formalized system of tracking network components and managing the
component’s lifecycle
• Prepare
o Budget for the items and gather requirements
• Plan
o Determine what components to acquire
• Design
o Determine the best configuration for the devices
• Implement
o Purchase, install, and configure the devices
• Operate
o Maintain operations and support on a daily basis
• Optimize
o Improve the network design through new devices
o Create a Baseline
▪ Collection of data under normal operating conditions
▪ Useful during comparison when troubleshooting network issues
▪ How do you know if your network is running normally if you don’t know
what normal is?
o Cable Management
▪ Process of documenting the network’s existing cable infrastructure
• Diagrams
• Cable labeling
• Locations of punch-down blocks
• Source cable locations
• Destination cable locations
▪ Using standard naming conventions are considered a best practice
• HR_D_RM102_0012
• IT_L_RM205_0004
o Change Management
▪ Coordinated system to account for upgrades, installs, and network
outages
▪ Simple router or switch upgrades may cause unwanted downtime. They
must be pre-coordinated
https://www.DionTraining.com 136
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 137
CompTIA Network+ (Study Notes)
Troubleshooting
• Troubleshooting Methodology
o Troubleshooting Methodology
▪ Troubleshooting occurs through a three-step process
o Problem Report
▪ Issues are reported either by the end user, by administrators, or by
automated systems
o Problem Diagnosis
▪ Majority of a troubleshooter’s efforts are spent diagnosing the problem
o Problem Resolution
▪ Occurs once the problem is fixed
▪ Notate it in your trouble ticket system
▪ Verify user is happy with the resolution
o Why Use A Structured Approach to Troubleshooting?
▪ Using a structured approach saves time and is repeatable
▪ Prevents the technician from “hunting and pecking” for the solution
▪ Many approaches that could be used but for the Network+ exam you
must use CompTIA’s methodology
https://www.DionTraining.com 138
CompTIA Network+ (Study Notes)
• Troubleshooting (Layer 1)
o Network Troubleshooting
▪ Resolving network issues is one of the main roles of a network
administrator
▪ Network Issue Categories
• Physical Layer
• Data Link Layer
• Network Layer
• Wireless Network
o Physical Layer
▪ If the physical layer isn’t working, none of the other layers will either!
▪ Common Issues:
• Bad cables or connectors
• Cable placement
• Distance limitations exceeded
• Splitting pairs in a cable
• EMI interference/Cross talk
• Transposed Tx/Rx
o Bad Cables or Connectors (Physical Layer)
▪ Faulty cables or connectors
▪ Wrong category of cable for the purpose
o Cable Placement (Physical Layer)
▪ Too close to high voltage cables, generators, motors or radio transmitters
o Distance Limits Exceeded (Physical Layer)
▪ Exceeding the Ethernet distance limitations can degrade the transmission
▪ Remember, always be less than 100 meters for copper cabling (CAT 5, 5e,
6, 6a, 7)
https://www.DionTraining.com 139
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 140
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 141
CompTIA Network+ (Study Notes)
o Problem #2
https://www.DionTraining.com 142
CompTIA Network+ (Study Notes)
o Problem #3
o Problem #4
https://www.DionTraining.com 143
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 144
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 145
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 146
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 147
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 148
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 149
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 150
CompTIA Network+ (Study Notes)
https://www.DionTraining.com 151