Network+ Notes
Network+ Notes
TEST DETAILS
Physical Media:
● RG-8 - thicknet; 10Base5; solid copper
● RG-58 A/U – thinnet; 10Base2; stranded copper
● RG-59 – cable television (low cost/short distance)
● RG-6 – cable TV, cable modems (longer distance and some power implementations)
● RG-62 – ARCnet (obsolete)
Wiring Standards – 568A and 568B
straight-through; crossover; rolled
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)- a media access control method,
used with ethernet networking, that helps devices share the bandwidth evenly without having two
devices transmit at the same time on the network medium; this protocol is disabled when full duplex is
enabled on devices capable of running full duplex
Wiring Media Data Transfer Distance Additional Notes
Standard Rate
non-plenum-rated shielding (i.e. PVC) is a fire hazard; Teflon is a plenum-rated type of shielding
Internet Protocol
● Telnet (23)
● FTP (20, 21)
● Secure FTP (SFTP) (22)
● Trivial File Transfer Protocol (TFTP) (69)
● SMTP (25) – sends emails only
● Post Office Protocol (POP(3)) (110) – receives emails only
● Internet Message Access Protocol v. 4 (IMAP) (143)
● RDP (3389)
● Transport Layer Security (TLS)/Secure Sockets Layer (SSL) (995/465) – cryptographic protocols
that facilitate enabling secure online data-transfer activities like web browsing, IM’ing, Internet
faxing, etc.
● Session Initiation Protocol (SIP) (VoIP) (5060/5061)
● Real-time Transport Protocol (RTP) (VoIP) (5004/5005)
● Media Gateway Control Protocol (MGCP) (multimedia) (2427/2727)
● H.323 (video) (1720)
● Simple Network Management Protocol (SNMP) (161)
● LDAPS (636)
● SSH (22)
● HTTP (80)
● HTTPS (443)
● Network Time Protocol (NTP) (123)
● Lightweight Directory Access Protocol (LDAP) (389)
● DNS (53)
● Server Message Block (SMB) (445)
● NetBIOS (137-139)
● DHCP/Bootstrap Protocol (BootP) (67/68)
Ports that use UDP: SNMPv1/2 (161); TFTP (69); DNS (53); BootP/DHCP (67, 68)
ICMP – used to send messages such as: destination unreachable, hops, ping and traceroute info, buffer
full, etc.
ARP/Reverse ARP
Networking Devices
DHCP Servers:
DHCP scope- the pool of available IP addresses that can be dynamically dispersed to host devices
IP address management (IPAM)- monitors and reports on IP address shortages
DHCP lease- the time that is allotted for a host device to use an IP address; the lease time is typically 23
hours by default, but the time is typically renewed automatically hours before the lease expires; if the
lease on a connected host is about to expire (or does expire) it could be a sign that the DHCP server is
down
DHCP Reservation- permanent IP address assignment from a DHCP server
DHCP Options- additional DHCP configuration settings that are passed onto DHCP clients on a network;
can include configuration info such as the default gateway IP address, or DNS server IP address
Automatic Private IP Address (APIPA)- (169.254.x.x) (No DHCP server present, or the host is having
issues connecting to the server); allows local subnet communication only
A DHCP relay agent is a service that captures a BOOTP or DHCP broadcast and forwards it through the
router as a unicast transmission to the DHCP server on another subnet.
DNS Servers:
Domain Name Service Server- a server that resolves IP address into domain names
hostname- typically the name of a device that has a specific IP address; on the Internet, it is part of what
is known as a fully qualified domain name (FQDN)
fully qualified domain name (FQDN)- consists of a hostname and a domain name
name resolution- the process of finding the IP address for any given hostname; can be performed using
HOSTS files (meaning you statically type in all names and IP addresses on each and every host), sending
a request broadcast on the local network, DNS, and Microsoft’s Windows Internet Naming Services
(WINS); domains are arranged in a hierarchical tree structure
.com= commercial; .org= non-profit; .int= international organization; .net= network organization
Host (A) (A-record)- resolves hostnames to IP addresses
AAAA record- the IPv6 equivalent of an A-record
pointer record (PTR)- resolve IP address into hostnames; used when you want to retrieve the MAC
address of a device when you know its IP address; exists in the reverse lookup zone (or table) in the DNS
server and are used when an IP address is known but not a name
mail exchanger records (MX)- records typically found on DNS servers; MX records are used to translate
mail records; it points to the mail exchanger for a particular host, a feature that provides a higher
probability that email will arrive at its intended destination; the records are listed in ordered of the
record, with a priority code that indicates the order in which they should be accessed by the other mail-
delivery systems; if the first-priority mail exchanger doesn’t respond in a given amount of time, the mail-
delivery system tries the second on, and so on; can only be created manually
canonical name record (CNAME)- alias record; allows hosts to have more than one name (p. 148); can
only be created manually
SRV record- a resource record that is used to identify computers that host specific services; they are
used to locate domain controllers for AD
NS record- used to delegate a subdomain to a set of name servers
TXT record- used to provide the ability to associate arbitrary text with a host or other name, such as
human readable information about a server, network, data center, or other accounting information
Sender Policy Framework (SPF)- a method of fighting spam, it is a TXT record that is part of a domain’s
DNS zone file; the TXT record specifies a list of authorized host names/IP addresses that mail can
originate from for a given domain name
Domain Keys Identified Mail (DKIM)- an email authentication method designed to detect email
spoofing; it allows the receiver to check that an email claimed to have come from a specific domain was
indeed authorized by the owner of that domain; it requires the addition of public keys into a DNS zone;
the key is either inserted directly into a zone as a TXT record or it will be a CNAME pointing to the key in
your provider’s DNS; unlike SPF, you can maintain many DKIM records for various sending sources
Dynamic DNS- works in concert with DHCP, hosts register their names with the DNS server as they
receive their IP address configuration from the DHCP server; some older OSs are not capable of self-
registration (such as Windows NT), but the DHCP server can even be configured to perform registration
on behalf of these clients with the DNS server
proxy server- a type of server that handles its client-machine requests by forwarding them onto other
servers while allowing granular control over the traffic between the local LAN and the Internet; when it
receives a request, the proxy will then connect to the specific server that can fulfill the request for the
client that wants it; sometimes the proxy modifies the client’s request or a server’s response to it- or
even handles the client’s request itself; it will actually cache, or “remember,” the specific server that
would have normally been contacted for the request in case it’s needed another time, which speeds up
the networks’ function, thereby optimizing its performance; proxy servers can also limit the availability
of the types of sites that users on a LAN have access to, which is a benefit for an administrator of the
network if users are constantly connected to non-work sites, consuming all the WAN bandwidth
Access VPNs are used to provide tunneling services to individual users through common subscriber lines
such as cable, dial-up, or ISDN.
Intranet VPNs are used to connect different sections of a corporate network.
Extranet VPNs connect networks that belong to different companies for the purposes of sharing
resources.
SSL VPNs are just a form of VPNs that operate through a web browser, and do not require the
installation of a separate client.
Port forwarding (also referred to as port mapping) enables a permanent translation entry that maps a
protocol port on a gateway to an IP address and protocol port on a private LAN.
PAT is a subset of dynamic NAT functionality that maps either one or more unregistered addresses to a
single registered address using multiple ports.
Authoritative Name Servers (ANSs) differ from a default DNS server because they possess an actual copy
of the records for a zone, rather than caching a lookup
IP Addressing
Dotted decimal example of an IP address: 172.16.30.56
binary of that same IP address: 10101100.00010000.00011110.00111000
hexadecimal of that address: AC.10.1E.38
Class A: network.host.host.host
Class B: network.network.host.host
Class C: network.network.network.host
Class D: multicast
Class E: research
● Class A Range: 1.0.0.1 - 126.255.255.254
● Class B Range: 128.1.0.0 - 191.255.255.254
● Class C Range: 192.0.1.1 - 233.255.254.254
● Class D Range: 224.0.0.0 - 239.255.255.255
● Class E Range: 240.0.0.0 - 254.255.255.255
Network address of all 0’s: 0.0.0.0 – broadcast within a network
Network address of all 1’s: 255.255.255.255 – broadcast to all networks
Host address of all 0’s – interpreted to mean “network address” or any host on a specified network
Host of all 1’s – interpreted to mean “all hosts” on a specified network
127.0.0.1 – reserved for loopback tests – *ping this address on a host PC if the workstation is having
issues connecting to the network
IPv6 addressing: global prefix| subnet | interface ID
Example: 2001:0db8:3c4d:0012:0000:0000:1234:56ab
Extended unique identifier (EUI)-64- allows a host to automatically assign itself a unique 64-bit IPv6
interface identifier without the need for manual configuration or DHCP
256 128 64 32 16 8 4 2
Subnet 0 128
CIDR value Mask #of Bits activated Block Size #of Subnets and Hosts
/25 128-mask 1 bit on (1000000) 128 2 subnets, each with 126 hosts
255.0.0.0 /8 00000000 0
Routing
EGP
IGP Protocol:BGP
Hybrid
Protocols: EIGRP/BGP
Routing Description
Protocol (by
class)
Distance Finds the best path to a remote network by judging distance (hops) This includes
Vector RIP, RIPv2, and IGRP
Routing Sends the routing table to all active interfaces every 30 seconds. Hop count is the only
Information determinant to determine the best way to route to a remote network; has a max hop
Protocol count of 15 hops, due to routing loop issues; uses classful routing only (all devices on
(RIP) the network must be in the same subnet mask for each specific address class);
broadcast based; no VLSM network support; no authentication; no support for
discontiguous networks; uses the Bellman-Ford algorithm; uses a flat network (non-
hierarchical)
RIPv2 Allows for classless routing; uses the same timers and loop-avoidance schemes as
RIPv1; also has a 15-hop limit; uses multicast 224.0.0.9; supports VLSM networks and
discontiguous networks
Link State A classless protocol that maintains two additional tables aside from the routing
table: the neighbor table (maintained through the use of hello packets that are
exchanged by all routers to determine which other routers are available to
exchange routing data with; all routers that can share routing data are stored in this
table), and the topology table (built and sustained through the use of link state
advertisements or packets (LSAs or LSPs) and includes a listing for every destination
network plus every neighbor (route) through which it can be reached; essentially,
it’s a map of the entire internetwork). With all this data compiled, the routing
protocol runs the Shortest Path First (SPF) algorithm to compare it all and
determine the best paths to each of the destination networks.
OSPF An open-standard (multi-vendor deployable) routing protocol that works by using the
Dijkstra algorithm. First, a shortest-path tree is constructed, then the routing table is
populated with the resulting best paths. It converges quickly (not as fast as EIGRP),
and supports multiple, equal-cost routes to the same destination. It supports IPv4 and
IPv6, but separate databases and routing tables must be maintained. It has an
unlimited hop count, supports VLSM/CIDR, highly scalable, minimizes routing update
traffic, and uses a loopback (logical) interface. OSPF uses bandwidth as the path
metric rather than hops, and uses a hierarchical network (using areas). The areas
created separate the larger internetwork into smaller internetworks. It can also
connect multiple AS’s, using a router called an autonomous system boarder router
(ASBR).
Intermediate A link state routing protocol, meaning it operates by reliably flooding topology
State-to- information throughout a network of routers. Each router then independently builds
Intermediate a picture of the network’s topology, just as they do with OSPF. Packets or datagrams
State (IS-IS) are forwarded based on the best topological path through the network to the
destination. Unlike OSPF, IS-IS uses Connectionless Network Service (CLNS) to provide
connectionless delivery of data packets between routers, and it also doesn’t require
an area 0 like OSPF does. OSPF uses IP to communicate between routers instead. An
advantage of CLNS is that it can easily send information about multiple routed
protocols (IPv4 & IPv6). It’s also converges quickly, and supports VLSM. It is preferred
over OSPF by ISP’s because of its ability to run IPv4 and IPv6 without creating a
separate database for each protocol, making it more efficient for larger networks.
Hybrid Routing protocols that use a combination of elements from the distance vector and
link state routing protocol classes.
EIGRP A classless, enhanced distance vector; EIGRP uses the concept of an AS to describe
the set of contiguous routers that run the same routing protocol and share routing
information, but unlike IGRP, EIGRP includes the subnet mask in its route updates. It
sends traditional vector distance vector updates, but it has link state characteristics,
too: it synchronizes routing tables between neighbors at startup, then sends specific
updates only when topology changes occur, making EIGRP suitable for very large
networks; it also supports IPv6, CIDR/VLSM, discontiguous networks; communication
via Reliable Transport Protocol (RTP), and best path selection via Diffusing Update
Algorithm (DUAL). EIGRP also maintains additional tables instead of just the routing
table (like distance vectors). The tables are: neighbor table, topology table, and
routing table.
BGP (EGP & The core routing protocol of the Internet. It’s an EGP, but can also be used within
Hybrid) AS’s. It’s also known as a hybrid because it is considered a path vector protocol
instead of a distance vector. ISPs use this protocol. It is used to bridge AS’s. BGP tells
about any/all networks reachable at the end of the path, and dives detailed
information on the BGP AS numbers hop by hop (called an AS path) required to reach
a specific destination network. BGP does not broadcast its entire routing table like
RIP; it updates more like OSPF. The routing table with BGP is called Routing
Information Base (RIB). It also gives a history of how the networks at the end of the
path were introduced into BGP in the first place, known as the origin code attribute.
First Hop Redundancy protocols (FHRPs) – work by giving you a way to configure more than one
physical router to appear as if they were only a single logical one.
Hot Standby Router Protocol (HSRP) – a Cisco proprietary protocol that provides a redundant gateway
for hosts on a local subnet. It allows for the configuration of two or more routers into a standby group
that shares an IP address and MAC address; uses an active router, a standby router, a virtual router, and
any other routers attached to a subnet; uses a virtual MAC address; timers: hello timer, active timer, and
a standby timer
Virtual Router Redundancy Protocol (VRRP) – also provides a redundant gateway for hosts on a local
subnet; open-standard
Variable length subnet masks (VLSMs) – allows classless routing, meaning that the routing protocol
sends subnet-mask information with route updates
Autonomous System (AS) – a collection of networks or subnets that are in the same administrative
domain; i.e. administrative domain within a company’s network. IGP operates within an AS, while EGP
operates outside or between more than one AS.
Administrative distance (AD) – used to rate the trustworthiness of routing information received on one
router from its neighboring router. It’s an integer from 0 to 255, where 0 equals the most trusted route,
and 255 essentially means “no traffic is allowed to be passed via this route”
Route Source Default AD
Connected interface 0
Static route 1
External BGP 20
Internal EIGRP 90
IGRP 100
OSPF 110
ISIS 115
RIP 120
Distribution routers- designed to collect data from end-user locations and redistribute them to an
enterprise location such as a company’s headquarters
Shortest Path Bridging (SPB) combines an Ethernet data path with an IS-IS link state control protocol
running between Shortest Path bridges. It is a replacement for STP that simplifies the creation and
configuration of networks, while enabling multipath routing.
Wireless Networking
IEEE Frequency Data Notes
Committee Transfer rate
Wired Equivalent Privacy (WEP) A key (typically static) of 40-128 bits, using the
RC4 algorithm
Remote Authentication Dial-in User Service Provides authorization, centralized access, and
(RADIUS) (802.11x) accounting supervision; once RADIUS has
authenticated a user, it allows us to specify the
type of rights a user or workstation has (AAA)
Temporal Key Integrity Protocol (TKIP) (802.11i) Upgrades the WEP key to 128-bit encryption,
(WPA) Wi-fi Protected Access (WPA) or WPA2 each packet sent has a unique key by placing a
Pre-shared key 48-bit packet serial number on each packet; the
base key also changes; 802.11i (WPA2) uses AES-
CCMP encryption (Advanced Encryption
Standard-Counter Mode CBC-MAC Protocol),
allowing confidentiality (encryption) and data
integrity
Synchronous serial- a serial communication protocol in which data is sent in a continuous stream at a
constant rate; it requires the clocks used in transmitting and receiving devices are synchronized so the
receiver can sample the signal at the same time intervals used by the transmitter; no start or stop bits
are requires
Asynchronous serial- the data stream contains synchronization information in the form of start and stop
signals, before and after each unit of transmission
T-Series Connections: digital connections that you can lease from the telephone company; they can use
copper pairs (like regular phone lines), or they can be brought in as part of a backbone (which is called a
trunk line); they use time-division multiplexing (TDM) to divide the bandwidth into channels of equal bit
rate
T1 1.544Mbps 24
T1C 3.152Mbps
T2 6.312Mbps
T3 44.736Mbps 672
T4 274.176Mbps
E-Series connections: the European equivalent to T-Series connection. One T3 is 28 T1’s, one E3 is 16
E1’s; E1 uses 32 64Kbps channels (32 DS0s)
E1 2.048Mbps
E3 34.368Mbps
J1 1.544Mbps
J3 32.064
T1 Connection- uses Digital Signal 1 (DS1) bit patterns to transmit packets; aggregates 24 discrete,
64Kbps channels that use DS0, which refers to the time slots within a channel; every channel can carry
either voice or data
T3 Connection- uses DS3, which is generally delivered over fiber-optic cables; typically used by large
multinational companies and next-tier ISPs
SONET: Synchronous Optical Network- the standard for synchronous data transmission on optical fiber
in the US (the international equivalent is Synchronous Digital Hierarchy (SDH)); defines a base data rate
of 51.84Mbps, and multiples of this rate are known as optical carrier (OC) levels
Common optical carrier levels (OC-x):
OC-1 51.84Mbps
OC-3 155.52Mbps
OC-12 622.08Mbps
OC-48 2.488Gbps
OC-192 9.953Gbps
Channel Service Unit/Data service unit (CSU/DSU)- a Layer 1 device that connects the serial ports on
your router to the provider’s network and connects directly to the demarcation point; these devices can
be external, or they can be internal cards on the router; the CSU/DSU provides clocking of the line to the
CPE (typically a router); and provides important options, like voltage regulation
Demarcation point- a demarc is the precise spot where the service provider’s or local exchange carrier’s
responsibility ends, and the CPE begins; it’s generally a device in a telecommunications closet owned
and installed by the telecommunications company (telco); it is your responsibility to cable (called
extended demarc) from this box to the CPE, which is usually a connection to a CSU/DSU or ISDN
interface
Local Loop- a cable consisting of a pair of copper wires called the local loop connects the demark to the
closest switching office (central office or CO)
Toll Network- a trunk line inside a WAN provider’s network; it’s a collection of switches and facilities
owned by the ISP
Multiplexing- a method by which multiple analog or digital signals are combined into one signal over a
shared medium
Wavelength Division Multiplexing (WDM)- a technology that multiplexes several optical carriers on a
single optical fiber by using different wavelengths (the use of different wavelengths of the light
spectrum is somewhat similar to using different frequencies in a radio wave)
Dense Wavelength Division Multiplexing (DWDM)- multiplexes within a specific band (1550 nm),
allowing for the use of erbium-doped fiber amplifiers (EDFAs) that boost signal; this allows for upgrading
the bit rate of a single strand line by simply replacing equipment at either end of the line. The system
consists of: a DWDM terminal multiplexer, and intermediate line repeater (every 80-100 km),
intermediate terminal multiplexer (remote amplification site), and a DWDM terminal de-multiplexer; fits
40-plus channels into one line of transmission; measured/defined in frequencies
Coarse Wavelength Division Multiplexing (CWDM)- uses larger chunks of the light spectrum, and is
defined by wavelengths, whereas DWDM is defined by frequencies and fits 40-plus channels into the
same frequency range used by just 2 CWDM channels; CWDM is useful because it can match the basic
capabilities of DWDM at a lower capacity at a significant discount
Passive Optical Network (PON)- also called fiber to the premises, PON is a point-to-multipoint
technology with a single fiber strand used for multiple premises (typically 16-28); unpowered optical
splitters are used in the process and are the reason for using the term passive; the system consists of an
optical line termination (OLT) at the telco’s office and a number of optical network units (ONUs) near
end users; these systems typically have downlink speeds of 155Mbps to 655Mbps and uplink bursts to
155Mbps
digital subscriber line (DSL) technology- a physical layer transmission technology like dial-up, cable, or
wireless; deployed in the last mile (basically the same as a local loop and defines the physical connection
from the customer to the first aggregation device of the provider network) of a local telephone network
or local loop
digital subscriber line access multiplexer (DSLAM)- a device located at the provider’s CO that
concentrates connections from multiple DSL subscribers
xDSL- a family of technologies that have become popular for data transmission over phone lines because
it uses regular PSTN phone wires to transmit digital signals; it’s extremely inexpensive; the x refers to
different DSL types; xDSLs use high-frequency signals, whereas regular phone calls use low-frequency
signals over the same lines; communicating via xDSL requires an interface to a PC. All xDSL
configurations require a DSL modem (an endpoint) and a NIC
High Bit-Rate Digital Subscriber Line (HDSL)- the first DSL technology to use a higher-frequency
spectrum of copper twisted-pair cables; it was typically used to interconnect local-exchange carrier
systems and to carry high-speed corporate data links and voice channels using T1 lines; it was developed
as a better technology for high-speed, synchronous circuits
Symmetric (same upload and download speed) Digital Subscriber Line (SDSL)- provides T1/E1 types
speeds symmetrically for both uploading and downloading data. But doesn’t allow low-frequency phone
calls on the same line as asymmetric digital DSL (ADSL) does; typically used by small to medium-sized
business that don’t require the higher performance of a leased line for connecting to a server
Very High Bit-Rate Digital Subscriber Line (VDSL)- provides faster data transmission over single, flat,
untwisted or twisted copper wire pairs; it is capable of supporting high-bandwidth applications like
HDTV and telephone services like VoIP and general Internet access over a single connection; it’s
deployed over existing wiring using POTS and lower-speed DSL connections; VDSL2 utilize bandwidths of
up to 30MHz to provide data rates exceeding 100Mbps both upstream and downstream; the maximum
bit rate achieved at a range of about 300 meters
Asymmetric digital subscriber line (ADSL)- has become the most popular xDSL because it focuses on
providing reasonably fast upstream transmission speeds (768Kbps) and very fast downstream
transmission speeds of up to 9Mbps (ADSL2+ can get up to 20Mbps); ADSL works on a single phone line
without losing voice call capability due to a splitter that enables the use of multiple frequencies on a
POTS line
Cable Modems- refers to being able to provide voice and data, plus analog and digital video; typically
provides a max of 20Mbps (sometimes sold at a theoretical rate of 50Mbps); the connection and band
width is shared with other subscribers; the connections typically are shared with 2,046 to 4,094 hosts
per cable network connection (the IP address for cable connections is typically in the /20 or /21 subnet
mask of a Class B address); Cable Internet access requires the installation of a cable television
connection and a cable modem to provide users with high-speed Internet access. Cable is a contention-
based medium, which means that bandwidth is impacted by the number of nodes within the group. If a
lot of people are using the Internet at the same time, speed is usually affected.
Headend- the place where all cable signals are received, processed, and formatted; the signals are then
transmitted over the distribution network from the headend
Distribution Network- relatively small service areas that usually range from 100 to 2,000 customers;
typically composed of a mixed, fiber-coaxial, or hybrid fiber-coaxial (HFC) architecture, with optical fiber
substituting for the distribution network’s trunk portion; the fiber forms both the connection from the
headend and an optical node that changes light to radio frequency (RF) signals that are then distributed
through a coaxial cable throughout the specific service area (i.e. a SOHO)
Data over Cable Service Interface Specifications (DOCSIS)- provides the interface requirements for a
data-over-cable system, including that of high-speed data transfer to a existing cable TV system; all cable
modems and similar devices have to measure up to this standard
Metro Ethernet- a MAN that’s based on Ethernet standards and can connect a customer to a larger
network and the Internet; if available, businesses can use Metro Ethernet to connect their offices
together, MPLS-based Metro Ethernet networks use MPLS in the ISP by providing an Ethernet or fiber
cable to the customer as a connection; from the customer, it leaves the Ethernet cable, jumps onto
MPLS, and then Ethernet again on the remote side
Integrated Services Digital Network (ISDN)- a digital, point-to-point, dial-up WAN technology capable of
maximum transmission speeds of about 2Mbps (primary rate interface (PRI)), although speeds of
128Kbps (basic rate interface(BRI)) are more the reality within a SOHO environment; uses the same UTP
wiring as POTS, yet it can transmit data at much higher speeds, but instead of carrying an analog voice
signal, ISDN carries digital signals; a terminal adapter (TA) is required; it has two types of channels, the
data is carried on Bearer Channels (B channels) which can carry 64Kbps of data. A BRI ISDN line has 2 B
channels, and a PRI ISDN has 23. Via TDM, one channel can be used for voice, while another can be used
for data transmission; the other type of channel in ISDN is also multiplexed onto only one copper pair,
it’s used for call setup and link management and is known as the signaling channel, D channel, or Delta
channel. It only has 16Kbps of bandwidth for BRI and 64Kbps in PRI. To maximize throughput, the two B
channels are often combined into one data connection for a total bandwidth of 128Kbps, known as
Bandwidth on Demand Interoperability Group (BONDING) or inverse multiplexing. It’s outdated and
obsolete to DSL or Cable, and is more expensive than POTS
Frame Relay- a technology in which variable-length packets are transmitted by switching; packet-
switching involves breaking messages into chunks at the sending device
Bandwidth specifications for Frame Relay:
Access rate- the maximum speed at which the Frame Relay interface can transmit
Committed Information Rate (CIR)- the maximum bandwidth of data guaranteed to be delivered; in
reality, it’s the average amount that the service provider will allow you to transmit, based upon what
you purchased
Frame Relay (continued)- if the Access rate and the CIR are the same, the Frame Relay connection is
pretty much just like a leased line; Frame Relay uses virtual circuit as opposed to the actual circuits that
leased lines use, these virtual circuits are what link together the thousands of devices connected to the
provider’s “cloud”; Frame relay is a WAN protocol that functions at the Physical and Data Link layers
(Layers 1 and 2) of the OSI model. It is a packet-switched technology that allows transmission of data
over a shared network medium and bandwidth using virtual circuits. As virtual circuits consume
bandwidth only when they transport data, each device can use more bandwidth and transmit data at
higher speeds. Frame relay provides reliable communication lines and efficient error-handling
mechanisms that discard erroneous data frames. Frame relay uses traffic shaping and congestion
management techniques, with upstream routers (configured as frame relay switches) matching the
speed of the next hop, and even discarding lower priority traffic, if necessary. Because of its “bursty”
nature, frame relay was not originally suited for real-time voice or video, although later developments
sought to remedy this. Frame relay can still be found in some networks, but has largely been replaced by
MPLS VPNs.
Point-to-Point Protocol- a data link layer protocol that can be used over either asynchronous serial (dial-
up) or synchronous serial (ISDN) media; it relies on Link Control Protocol (LCP) to build and maintain
data-link connections; network Control Protocol (NCP) enables multiple network layer protocols (routed
protocols) to be used on a point-to-point connection; the basic purpose of PPP is to transport layer 3
packets across a Data Link layer point-to-point link, and it’s nonproprietary; PPP protocol stack is
specified at the Physical and Data Link layers only. NCP is used to allow communication of multiple
Network layer protocols by identifying and encapsulating the protocols across a PPP data link
PPP Protocol Stack elements:
EIA/TIA-232-C, V.24, V.35, and ISDN: a physical layer international standard for serial communication
HDLC: a method for encapsulating datagrams over serial links
LCP: a method of establishing, configuring, maintaining, and terminating the point-to-point connection;
also provides authentication, compression, error detection, multilink. And PPP callback
NCP: a method of establishing and configuring different Network layer protocols for transport across the
PPP link; it’s designed to allow the simultaneous use of multiple Network layer protocols; two examples
are internet protocol control protocol (IPCP) and Cisco Discovery Protocol Control Protocol (CDPCP)
Asynchronous Transfer Mode (ATM)- designed to be a high-speed communications protocol that
doesn’t depend on any specific LAN topology. It uses a high-speed cell-switching technology that can
handle data as well as real-time voice and video. This protocol breaks up transmitted data into 53-byte
cells (a cell is analogous to a packet or frame, except that an ATM cell is always fixed in length and is
relatively small and fast, whereas a frame’s length can vary); ATM switches cells through an ATM
network by setting up a virtual connection between the source and destination nodes; the cells may go
through multiple switching points before ultimately arriving at their final destinations; like Frame Relay,
ATM is a connection-oriented service, in contrast to most data link protocols; data rates are scalable and
start at 1.5Mbps, with speeds of 25, 51, 100, 155.52Mbps and higher.
Multiprotocol label switching (MPLS)- a data-carrying mechanism that emulates some properties of a
circuit-switched network over a packet-switched network; it’s a switching mechanism that imposes
labels (numbers) to packets and then uses them to forward the packets; the labels usually correspond to
a path to layer 3 destination addresses, which is on par with IP destination-based routing; MPLS was
designed to support the forwarding of protocols other than TCP/IP; in larger networks, the result of
MPLS labeling is that only the edge routers perform a routing lookup, all the core routers forward
packets based on the labels, which makes forwarding the packets through the service provider network
faster (this is a big reason for most companies replacing their Frame Relay networks with MPLS ones);
you can use ethernet with MPLS to connect to a WAN, called Ethernet over MPLS, or EoMPLS
Global System for Mobile Communications (GSM)- a standard developed by the European
Telecommunications Standards Institute (ETSI); it’s the default global standard for mobile
communications and enjoys over 90 percent market share; 2G is available in over 219 countries; 1G was
a voice-only analog network; 2G marked the switch to digital, and allowed for voice and text; 4G allows
for high-speed voice and data
Code division multiple access (CDMA)- a channel access method that’s used by various radio
communication technologies; CDMA offers multiple access, where several transmitters can send
information simultaneously over a single communication channel, allowing several users to share a band
of frequencies; to make this work without a bunch of interference between users, CDMA relies upon
spread-spectrum technology and a special coding scheme in which each transmitter is assigned a unique
code; takes the entire allocated frequency range for a given service and multiplexes information for all
users across the spectrum range at the same time
Time division multiple access (TDMA)- divides each cellular channel into three time slots in order to
increase the amount of data than can be carried
Evolved High Speed Packet Access (HSPA+)- considered a 3.5 generation technology; it includes an all-IP
architecture, which is one of 4G’s requirements; has downlink speeds of 3Mbps to 4Mbps and uplink
speeds of 1Mbps to 2Mbps
World Wide Interoperability for Microwave Access (WiMAX)- considered a true 4G technology, and it’s
based on the IEEE 802.16 standard; it supports both fixed, tower-to-tower applications and mobile
applications; it was originally designed as a last-mile technology to deliver Internet to areas where
implementing landlines wasn’t possible as an alternative to DSL and cable; it’s not compatible with 2G
and 3G; it’s also pricey and requires lots of power; it also lags behind LTE in speed; it has downlink
speeds of 5Mbps to 6Mbps, and uplink speeds of 2Mbps to 3Mbps
Long Term Evolution (LTE)- the most promising of the emerging 4G technologies; it uses an all-IP-based
core, offers the highest data rates, and is compatible with 3G and WiMAX; has the best indoor coverage
while maintaining high data rates all the way to the edge of the coverage cell; it can also accommodate
more devices in a given area; it has downlink speeds of 7Mbps to 12Mbps, and has downlinks speeds of
3Mbps to 5Mbps; LTE is a radio technology for wireless broadband access. It offers data rates about 100
times faster than 3G networks, a downlink rate that exceeds 100 Mbps, and an uplink rate of more than
50 Mbps. LTE is backwards compatible with GSM and HSPA. LTE is a radio technology, and does not
transmit over satellites or fiber optic cabling.
Internet of Things (IoT):
Advanced and Adaptive Networking Technology (ANT+)- part of the PAN, it is a wireless protocol for
monitoring sensor data such as a person’s heart rate or a bicycle’s tire pressure, as well as the control of
systems like indoor lighting or a TV set; it’s designed for collection and transfer of sensor data and the
integration of remote control systems; it’s based on the ANT protocol, and it is designed and maintained
by the ANT+ Alliance, which is owned by Garmin; the nodes in the network can act as transmitters,
receivers, or transceivers to route traffic to other nodes; they can also determine when to transmit
based on the activity of neighboring nodes; it uses the 2.4 GHz frequency (same as Bluetooth), but the
data transfer rate is slower; it’s designed for low bit-rate and low power sensor networks, and it works
at short distances (typically less than 5 ft.); Bluetooth, on the other hand, was designed for relatively
high bit-rate, higher battery consumption applications such as those for streaming sound
Z-Wave- a wireless communication technology that is used in security systems and also business and
home automation; it is often used in locks, security systems, lighting, heating, and cooling home
appliances; Z-wave communications use low-poer radio signals in the 900 MHz range, separated from
Wi-Fi; the system supports automatic discovery of up to 230 devices per controller, and multiple
controllers can also communicate with one another and pass commands to support additional devices; it
is optimized for low latency, with data rates of up to 100KBps
Troubleshooting Tools
*entering the /? Switch after a command gives information on all the switches available for that
command*
ipconfig (ifconfig in Unix)- displays the current TCP/IP configuration on a given workstation including the
IP address, DNS configuration, WINS configuration, and default gateway; /all can display much more info
including the DHCP lease times, DNS addresses, MAC addresses about each interface; /renew renews
the IP configuration and is valuable in getting updated IP configuration info if you change networks as it
will connect you to a different DHCP sever that’s available; /release will release your IP configuration
information given from a DHCP server, sometimes necessary if you try to renew the workstation’s IP
configuration after changing network locations, but it doesn’t update after using the /renew switch
ping- -t for continuous ping, -a resolve IP address to host name
arp- -a displays the workstation’s ARP table; -g is the same as -a; useful for resolving duplicate IP
addresses; you should not see IP addresses in the ARP table for a given interface that aren’t members of
the same IP subnet as the interface;
nslookup (dig in Unix)- allows you to query a name server and quickly find out which name resolves to
which IP address
HOSTS table- similar to DNS, except its entries are static for each and every host and server
mtr (pathping)- mtr, or my traceroute, is a computer program that combines the functions of the
tracerout and ping utilities in a single network diagnostic tool; it also adds round-trip time and packet
loss to the output; mtr probes routers on the route path by limiting the number of hops individual
packets are allowed to travers and listening to news of their termination; only installed on Unix or Linux
PCs, 3rd party apps are required to run this program on a Windows PC; Windows version of mtr is
pathping
route print- the biggest reason for manipulating the routing table on a Windows server is to create a
firewall; this command displays the routing table on a host device, and its switches allow one to
manually add, modify, and delete route
nbtstat- NetBIOS statistics; allows one to track NetBIOS over TCP/IP statistics, display the details of
incoming and outgoing NetBIOS over TCP/IP connections, and resolve NetBIOS names; proprietary to
Windows machines; the switches are listed below (the lowercase switches deal with NetBIOS names of
hosts and the uppercase ones deal with the TCP/IP addresses of hosts):
-a switch- will give one a remote machine’s NetBIOS name table consisting of a list of every NetBIOS
name the machine from which you’ve deployed the switch knows of
-A switch- works the same as the -a switch, but the host’s IP address is entered with the command
instead of its NetBIOS name
-c switch- displays the local NetBIOS name cache on the workstation it’s running on
-n switch- gives the local NetBIOS name table on a Windows device
-r switch- tells exactly how many NetBIOS names have been resolved to TCP/IP addresses; likely the
switch to be used most with this command; comes in handy when you want to determine how a
workstation is resolving NetBIOS names and whether WINS is configured correctly, when WINS isn’t
configured correctly or not being used, the resolved/registered by name server fields will always be zero
-R switch- used to purge the NetBIOS name table cache and reload the LMHOSTS file into memory; ideal
for a situation where you have a bad name in the NetBIOS name cache, nut the right name is in the
LMHOSTS file instead (the LMHOSTS file contains NetBIOS names of stations and their associated IP
addresses)
-S switch- displays the NetBIOS sessions table that lists all NetBIOS sessions to and from the host from
which you issued the command; displays both workstation and server sessions, but lists remote
addresses by IP address only
-s switch- produces the same output as nbtstsat -S except that it will also attempt to resolve remote-
host IP addresses into hostnames
netstat- good for looking at the inbound and outbound TCP/IP connections on a machine, can also bbe
used to view packet statistics like how many packets have been sent and received, the number of errors,
and so on;
-a switch- displays all connections and listening ports
-e switch- displays ethernet statistics; can be combined with the -s switch
-r switch- displays the current route table for a workstation
- s switch- displays a variety of TCP, UDP, IP, and ICMP protocol statistic
-p switch- a modifier that’s usually used wit the -s switch to specify which protocol statistics to list in the
output (IP, TCP, UDP, or ICMP): i.e: netstat -s -p ICMP or netstat -s -p IPV6
-n switch- a modifier for the other switches; when used with them, it reverses the natural tendency of
netstat to used names instead of network addresses
ftp command-
telnet utility- telnet a virtual terminal protocol utility that allows you to make connections to remote
devices, gather information, and run programs; in today’s Windows environments, Telnet is a basic
command-line tool for testing TCP connections; you can Telnet to any TCP port to see if it’s responding-
something that’s especially useful when checking SMTP and HTTP ports; SSH should be used instead of
Telnet
Software and Hardware Troubleshooting
Baseline- the standard level of performance of a certain device or to the normal operating capacity for a
whole network
SNMP- used to gather information from and send settings to devices that are SNMP compatible; gathers
data by polling the devices on the network from a management station at fixed or random intervals;
uses UDP to transfer messages back and forth between the management system and the agents running
on the managed devices; inside the packets
SNMP has three versions
SNMPv1- supports plaintext authentication with community strings and uses only UDP
SNMPv2c- Supports plaintext authentication with MD5 or SHA with no encryption, but provides GET
BULK, which is a way to gather many types of information at once and minimize the number of GET
requests. It offers a more detailed error message reporting method, but it’s not more secure than v1. It
uses UDP even though it can be configured to use TCP.
SNMPv3- Supports strong authentication with MD5 or SHA, providing confidentiality (encryption) and
data integrity of messages via DES or DES-256 encryption between agents and managers. GET BULK is a
supported feature of SNMPv3, and this version also uses TCP
syslog- a syslog server stores messages from you and can time-stamp and sequence log messages, it’s
the best way to see what’s going on with a company’s network at a particular time; reading system
messages from a switch’s or a router’s internal buffer is the most popular and efficient method of seeing
what going on with the network at a particular time; syslog allows one to display, store, and search
messages
Security information and event management (SIEM)- a term for software products and services
combining security information management (SIM) (used to describe long-term storage, analysis, and
reporting of log data) and security event management (SEM) (SEM is typically used to describe the
management that deals with real-time monitoring and correlation of events, notifications, and console
views); SIEM technology provides real-time analysis of security alerts generated by network hardware
and applications; can be a software solution or a hardware appliance, or even sold as managed services;
SIEM can collect useful data about data aggregation, correlation, alerting, dashboards, compliance,
retention, and forensic analysis
looking glass sites- looking glass (LG) servers can be accessed remotely to view routing information; they
are servers on the internet that run Looking Glass software that is available to the public; the servers are
essentially read-only portals to the router belonging to the organizations running them; this essentially
just provides a ping or traceroute from a remote location for you
loopback plug- a loopback test is a diagnostic procedure in which a signal is transmitted and returned to
the sending device after passing through all or a portion of a network or circuit, the returned signal is
compared with the transmitted signal to evaluate the integrity of the equipment or transmission path; a
computer needs a loopback plug that is inserted into a port in order to perform a loopback test; they are
made for both ethernet and fiber applications
wire-map tester- a device that transmits signals through each wire in a copper twisted-pair cable to
determine if it’s connected to the correct pin at the other end; it’s the most basic test for twisted-pair
cables because the eight separate wire connections involved in each cable run are a common source of
installation errors; they detect transposed wires, opens (broken or unconnected wires), and shorts
(wires or pins improperly connected to each other); it essentially consists of a remote unit that you
attach to the far end of a connection and a battery-operated, handheld main unit that displays the
results
continuity test (line tester)- even simpler and less expensive that a wire-map tester; it’s designed to
check a copper cable connection for basic installation problems like opens, shorts, or crossed pairs
protocol analyzer- analyzes protocols and can actually help you troubleshoot problems, unlike packet
sniffers, which just provide information for you to decipher by looking at all traffic on a network
segment; protocol analyzers can help detect and identify malware, help troubleshoot hard-to-solve
problems, help gather information such as baseline traffic patterns and network-utilization metrics, help
identify unused protocols so that they can be removed from the network, provide a traffic generator for
penetration testing, and even possible work with an IDS
certifiers (certification testers)- used to determine whether your network meets specific International
Organization for Standardization (ISO) or Telecommunication Industry Association (TIA) standards (cat
5e, 6, or 7); it’s a combination cable tester and network analyzer; they will typically test the performance
and response times of network resources like web, file, email, and even DNS and DHCP servers
time-domain reflectometer (TDR)- a tool that finds and describes faults in metallic cables like twisted
pair and coaxial cables; for optical fiber, an optical TDR (OTDR) is needed; it works similar to radar, it
transmits a short rise time pulse along the conductor, and if it turns out to be a uniform impedance and
properly terminated, the entire transmitted pulse is absorbed in the far-end termination; no signal is
reflected back to the TDR; any impedance interruptions will cause some of the incident signal to be sent
back toward the source, indicating an issue; it can be used to verify speed and condition of the cable,
how long it takes to send a signal down a cable and how long it takes to come back, cable impedance
characteristics, splice and connector locations and their associated loss amounts, and estimated cable
lengths; it’s measured in time
OTDR- works like a TDR; works by putting out a series of optical pulses into the specific fiber you want to
test; from the same end that sent these impulses, it collects and measures the light that is scattered and
reflected along the length of the fiber; it then records the change in the amount of refraction at various
points; it gives info on the fiber’s estimated length, the overall attenuation, including splice and mated-
connector losses, and the location faults, such as breaks
toner probe (tone generator)- a simple copper cable tester that is be used to trace a wire in the wall; it
is a two-piece unit that’s basically a tone generator and probe; it consists of one part that is connected
to a cable with a standard jack, or an individual wire with alligator clips that transmit a signal over the
cable or wire, and another part that a pen-like probe that emits an audible tone when it touches the
other end of a cable, wire, or even its insulating sheath
butt set- a portable telephone that allows you to test analog wet or dry lines and is used to monitor
those lines (often used by telco guys on the telephone poles; another tool that will take the place of a
butt set is a hound (a device that is nothing more than an inductively coupled amplifier with a small
speaker in a handheld tool; it’s used to monitor the audio on a given line to verify that you have the
right pair before connecting it and it’s typically used with a toner probe)
punch-down tool- used to terminate twisted-pair cable; it punches down the wire into some kind of
insulation displacement connector (IDC); IDCs make contact by cutting through, or displacing, the
insulation around a single conductor inside a twisted-pair cable
Network Troubleshooting
SSS checklist- check to ensure login procedures and rights, look for link lights and collision lights, check
all power switches, cords, and adapters, look for user errors
Copper Cabling issues: incorrect termination/bad wiring/bad connector, crosstalk (signal bleed
between two adjacent wires that are carrying a current), near-end/fare-end crosstalk (crosstalk that
relates to the EMI bled from a wire to adjoining wires where the current originates; this point has the
strongest potential to create crosstalk issues because the crosstalk signal itself degrades as it moves
down the wire), attenuation/DB loss/distance limitation (much worse for copper than optical fiber),
collisions, shorts ( happens when the current flows through a different path within a circuit than it’s
supposed to; usually caused by some type of physical fault in the cable), open impendence mismatch
(echo), interference/cable placement (EMI and RFI-radio interference occur when signals interfere with
the normal operation of electronic circuits, this can occur due to lighting, TVs, two-way radios, cell
phones, and radio transmitters), split pairs (a wring error where two connections that are supposed to
be connected using the two wires of a twisted pair are instead connected using two wires from different
pairs), Tx/Rx reverse (pertains to how the wire is set up when connecting a PC to a switch, which
requires that the pins on the PC end use 1 and 2 to transmit, and 3 and 6 for receiving a digital signal,
which must be reversed on a switch)
Fiber cable issues: SFP (small form-factor pluggable- a compact, hot-pluggable transceiver used to
interface a network device motherboard for a switch, router, media converter, etc. to a fiber optic or
copper cable; smaller than the GBIC and )/GBIC (gigabit interface converter; obsolete to the SFP) cable
mismatch; bad SFP/GBIC (cable or transceiver); wavelength mismatch (occurs when two different fiber
transmitters at each end of the cable are using either a longer or shorter wavelength; they must match
on both sides); fiber type mismatch (can cause wavelength issues, massive attenuation, and Db loss);
dirty connectors; connector mismatch; bend radius limitations; distance limitations
Wireless issues: interference; device saturation/bandwidth saturation; simultaneous wired/wireless
connections; configurations (incorrect encryption; incorrect, overlapping, or mismatched channels;
incorrect frequency/incompatibilities; essid mismatch; wireless standard mismatch; untested
updates); distance/signal strength/power levels; latency; bounce; incorrect antenna or switch
placement; environmental factors
Troubleshooting steps:
Probable causes to network issues: port speed (pertains to the rated speed of the NIC and the device a
workstation is connected to), port duplex mismatch (full, auto, or half duplex; in environments where
hubs are not used, running full duplex on capable devices is fine; if switches are present, collisions will
result because CSMA/CD protocol is disable when running full duplex), mismatched MTU (maximum
transmission unit- the largest size packet that Is allowed across a segment; typically 1,500 bytes) (can
cause issues between routers if there is a mismatch in the configurations, resulting in a link failing to
pass traffic due to communication issues; interface is the command entered on a router to display MTU
configuration), incorrect VLAN (occurs when a port on a switch is assigned to the wrong VLAN),
incorrect IP address/duplicate IP address, wrong gateway, wrong DNS, wrong subnet mask, incorrect
interface/interface misconfiguration
Issues that likely require escalation: switching loops, missing routes, routing loops, routing problems
MTU black hole, bad modules, proxy ARP, broadcast storms, NIC teaming misconfiguration (NIC
teaming, aka load balancing/failover (LBFO) allows multiple network interfaces to be placed into a team
for the purposes of bandwidth aggregation and/or traffic failover to prevent connectivity loss in the
event of a network component failure), power failures/ power anomalies
Table with answers to where the following equipment should be positioned in the network for
maximum performance and security: firewall, patch server, MDF, IDF, public web server
Device Position
ANSWERS BELOW
With crossover cabling for 10BaseT and 100BaseTX cables (i.e. T-568A to T-568B), the 1st and 2nd pins
are crossed with the 3rd and 6th pin
With 1000Base TX, crossover cabling requires that the 1st and 2nd pins are crossed with the 3rd and 6th
pins, and the 4th and 5th pins are crossed with the 7th and 8th pins
A rolled/rollover cable switches all pins in inverse order when crossing (i.e. the 1st pin is crossed with the
8th pin; the 2nd pin is crossed over with the 7th pin; and so forth)
802.1d STP
802.1w RSTP
802.3af PoE
802.3at PoE+ (provides higher wattage throughput than PoE)
When writing out my cheat sheet at the start of the exam, include the powers of two table, the IEEE
standards list, the IP class ranges, the switch functions for CLI commands, and the OSI layers along
with brief descriptions of what takes place at each layer for reference throughout the exam.