CompTIA N10-006 Network - Basic - Darril Gibson
CompTIA N10-006 Network - Basic - Darril Gibson
CompTIA N10-006 Network - Basic - Darril Gibson
By Darril Gibson
Dedication
To my wife, who even after more than 24 years of marriage continues to remind me
how wonderful life can be if you’re in a loving relationship. Thanks for sharing your life
with me.
Acknowledgments
A single person cannot do books of this size and depth on their own and I’m grateful
for the many people who helped me put this book together. First, thanks to my wife. She
has provided me immeasurable support throughout this project. Thanks also to my dogs
that help me remember to get up and go for walks regularly. I also appreciate all the efforts
by Jaena Nerona, an awesome assistant that helped me so much through this project.
The book has several pictures and graphics in it. In a couple of instances, I found the
perfect picture on the Internet and asked for permission to use it. I’m grateful for the
permission I’ve received from the following companies:
Thank you to Agilent Technologies for permission to use the picture of
their cable certifier.
Thank you to Fluke Corporation for permission to use the picture of their
toner probe.
About the Author
Darril Gibson is an accomplished author and professional trainer. He
has authored or coauthored more than 40 books and contributed as a technical
editor for many more. He holds many current IT certifications, including:
CompTIA A+, Network+, Security+, CASP, (ISC)2 SSCP, and CISSP.
He is the CEO of YCDA, LLC (short for You Can Do Anything) and
actively writes, teaches, and consults on a wide variety of IT topics, including
CompTIA A+, Network+, and Security+. Darril is active on the Internet:
Posts blog articles at http://blogs.getcertifiedgetahead.com
Tweets daily tips for CompTIA certifications at
http://twitter.com/darrilgibson
Posts daily practice test questions on the Get Certified Get
Ahead Facebook page
(https://www.facebook.com/GetCertifiedGetAhead)
Sends out periodic updates on the Get Certified Get Ahead
Newsletter (http://eepurl.com/g44Of)
Darril lives in Virginia Beach with his wife and two dogs. Whenever
possible, they escape to a small cabin in the country on over twenty acres of
land that continue to provide peace, tranquility, and balance. You can contact
him here: http://gcgapremium.com/contact-us/.
Table of Contents
Dedication
Acknowledgments
About the Author
Table of Contents
Introduction
About the Exam
Question Types
Number of Questions and Duration
Exam Format
Passing Score
Beta Questions
Exam Prerequisites
Exam Test Provider
Voucher Code for 10 Percent Off
Book Format
Remember This
CompTIA Network+ Objectives
1.0 Network Architecture
2.0 Network Operations
3.0 Network Security
4.0 Troubleshooting
5.0 Industry Standards, Practices, and Network Theory
CompTIA Network+ Assessment Exam
Chapter 1 Understanding Basic Networking Components
Understanding Common Network Components
Hub
Switch
Router
Modem
Access Point
Firewall
Simplified Diagrams
Network Segments and Domains
Duplex Connections and Collisions
Comparing PANs, LANs, WANs, and More
PAN
Bluetooth Wireless
NFC
IR
LAN
WLAN
CAN
MAN
WAN
VPN
Identifying Network Topologies
Star
Ring
Mesh
Bus
Hybrid
Point-to-Point vs. Point to Multipoint
Peer-to-Peer vs Client-Server
Workgroups vs. Domains
Planning and Implementing a Basic Network
List of Requirements and Devices
Wired/Wireless Considerations
Environmental and Equipment Limitations
Security considerations
Compatibility Requirements
Understanding Numbering Systems
Decimal
Binary
Bits vs Bytes
Digit Grouping
Hexadecimal
Upper Case or Lower Case Hexadecimal
Octal
Try This
Staying Safe
Electrical Safety
Equipment Grounding
ESD
Installation Safety
MSDS
Fire Suppression
HVAC
Emergency Procedures
Try This Conversion Answers
Chapter 1 Exam Topic Review
Unicast, Multicast, and Broadcast
Common Network Components
PANs, LANs, WANs, and More
Network Topologies
Basic Networks
Numbering Systems
Safety Issues
Chapter 1 Practice Questions
Sample Network+ Practice Test Questions
Bonus CompTIA Network+ Flashcards
Flashcards for Network Architecture
Flashcards for Network Operations
Flashcards for Network Security
Flashcards for Troubleshooting
Flashcards for Industry Standards, Practices, and Network Theory
Appendix A—Acronym List
Numeric–Topics in Acronym List
A–Topics in Acronym List
B–Topics in Acronym List
C–Topics in Acronym List
D–Topics in Acronym List
E–Topics in Acronym List
F–Topics in Acronym List
G–Topics in Acronym List
H–Topics in Acronym List
I–Topics in Acronym List
K–Topics in Acronym List
L–Topics in Acronym List
M–Topics in Acronym List
N–Topics in Acronym List
O–Topics in Acronym List
P–Topics in Acronym List
Q–Topics in Acronym List
R–Topics in Acronym List
S–Topics in Acronym List
T–Topics in Acronym List
U–Topics in Acronym List
V–Topics in Acronym List
W–Topics in Acronym List
X–Topics in Acronym List
Z–Topics in Acronym List
Errata
Voucher Code for 10 Percent Off
After the Network+ Exam
Introduction
Congratulations on your purchase of this Kindle short. This book is part
of the Get Certified, Get Ahead Kindle Short series that are focused on key
topics in the Network+ exam. This Kindle Short provides an introduction and
overview of key networking topics, and also covers the CompTIA
troubleshooting model. If you’re preparing for the Network+ exam and want
to ensure you’re ready to correctly answer questions related to these topics,
you have exactly what you need.
I recently wrote the CompTIA Network+ N10-006 Practice Test
Questions (Get Certified Get Ahead) book and released it as a Kindle version.
It includes 300 practice test questions with in-depth explanations to help you
pass the Network+ exam the first time you take it. It also includes 200
flashcards to help reinforce some key testable material.
While I’ve received some great feedback on the book, I’ve also
received many requests to write a full Network+ book similar to the popular
CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide. Due to
a variety of reasons, I wasn’t able do the Network+ study guide right away
but I’m now focused on it. I’m trying something new with this book and
releasing chapters of it as they’re completed with the goal of helping people
review some key topics based on what they need.
This Kindle short follows the same style of the CompTIA Security+:
Get Certified Get Ahead: SY0-401 Study Guide, it’s just shorter. It starts
with a pre-test with questions related to the Network+ objectives. Next, a full
chapter covers the objectives identified at the beginning of the chapter. Last,
you’ll find a post-test with questions related to these objectives. This Kindle
short also includes some bonus questions.
Objectives covered in this Kindle short are:
1.1 Explain the functions and applications of various network devices.
Router
Switch
Firewall
Access point (wireless/wired)
Hub
Analog modem
1.8 Given a scenario, implement and configure the appropriate addressing schema.
Multicast
Unicast
Broadcast
Broadcast domains vs collision domains
Question Types
Expect many of the questions on the exam to be straightforward. For
example, what’s 5 X 5? Either you know the answer is 25 or you don’t. The
exam questions test your knowledge of the material, not necessarily your
ability to dissect the question so that you can figure out what the question is
really trying to ask.
I’m not saying the knowledge is simplistic, only that the questions often
are worded so that you can easily understand what they are asking.
As a comparative example, Microsoft certification questions can be
quite complex. Microsoft questions often aren’t just testing your knowledge
of the topic but your ability to analyze the material and logically come to the
right conclusion.
Here are two examples of questions—the first shows how Microsoft
may word the question on a Microsoft certification exam, and the second
shows how CompTIA may word it for the CompTIA Network+ exam.
Microsoft. You are driving a bus from Chicago to Atlanta at 55
mph with twenty-two passengers. The bus is painted blue. At
the same time, a train is traveling from Miami to Atlanta at 40
mph. The train has a yellow caboose. What color are the bus
driver’s eyes?
CompTIA Network+. What color are your eyes?
Notice the first question adds a lot of superfluous information. Two
pieces are critical to answering the first question. It starts by saying, “You are
driving a bus…” and then ends by asking, “What color are the bus driver’s
eyes?” You’re required to put the two together and weed through the
irrelevant information to come to the correct answer.
The second question is straightforward. “What color are your eyes?”
There’s very little analysis required. Either you know it or you don’t. This is
what you can expect from most of the CompTIA Network+ questions.
CompTIA has begun a trend of adding multiple-choice questions that
are more complex and these are often in the Network+ exam. However,
because you only have about a minute for each question, don’t expect to see
them very often. The Network+ exam is not intended to be a reading
comprehension exam.
As a more realistic example, consider the following one-sentence
question.
“What port does HTTPS use?”
In this case, you’d need to know that Hypertext Transfer Protocol
Secure (HTTPS) uses port 443.
Compare this to the following question. It asks for the same level of
knowledge, but requires a deeper level of comprehension.
“Lisa is configuring a firewall and she needs to ensure that the firewall
allows outgoing secure web traffic. What port should she open on the firewall
to meet this need?”
In this case, you’d need to know that a web server uses HTTPS for
secure web traffic, and HTTPS uses port 443. You would need to allow
outgoing traffic to the Internet on port 443.
You may also see questions that use phrases such as “BEST choice,”
“BEST description,” “MOST likely,” “FIRST,” or “LAST.” In these
examples, don’t be surprised if you see two answers that could answer the
question, while only one is the best choice. For example, which one of the
following numbers is between 1 and 10 and is the highest: 1, 8, 14, 23.
Clearly 1 and 8 are within 1 and 10, while 14 and 23 are outside this range.
However, only 8 is both within 1 and 10 and the highest.
Here is a network related question that shows this:
Question: Which layer(s) of the OSI model do wireless protocols
operate on?
A. Physical
B. Physical and Data Link
C. Data Link
D. Data Link and Network
There are actually three correct answers but only one is most correct.
Wireless protocols operate on the both the Physical and Data Link layers. If
you chose A or C, you’d be technically correct because they do operate on
the Physical layer (answer A) and on the Data Link layer (answer C).
However, you would get the question wrong since B is most correct. When
you see key words like best, most, or highest, be careful not to jump on the
first answer. There may be a more correct answer.
Multiple Choice
Most questions are multiple-choice types where you choose one answer
or multiple answers. When you need to choose multiple answers, the question
will direct you to choose two, choose three, or choose all that apply.
Performance-Based Questions
You can expect as many between three and ten non-multiple choice
questions. CompTIA refers to these as performance-based questions and
instead of picking from a multiple-choice answer, you’re often required to
perform a task. CompTIAs goal is to provide more accurate testing to verify
people have a fully understanding of a topic. I’ve written a couple of blogs on
this including this one directly related to Network+ performance-based
questions (http://blogs.getcertifiedgetahead.com/network-performance-based-
questions/). I’ve also created a demo here:
http://gcgapremium.com/performance-based-question-demo/
Some of the different types of questions you can expect are:
Identify. In this type of question, you might be asked a
question but instead of having a list of multiple-choice answers,
you have a group of pictures. For example, consider this
question: “What tool would you use to identify an open or short
in a cable?” You would need to know that a cable tester easily
identifies shorts and opens has a setting to easily identify shorts
and opens, and you’d need to identify a picture of the cable
tester. While a multimeter can also identify opens and shorts, it
isn’t the best choice to identify opens and shorts in a cable.
Matching. Matching type questions might require you to
identify words with pictures. For example, the words might be
“Fiber connectors” and “Coaxial connectors” combined with
pictures of various connectors. You’d be required to identify the
pictures of fiber connectors by sight and the pictures of coaxial
connectors by sight. Here’s a demo I created for a Security+
practice test question: http://gcgapremium.com/performance-
based-question-demo/.
Simulation. In a simulation, you’re expected to perform an
action as if you are operating in a realistic environment. For
example, most wireless routers are configured via a web page.
A simulation might require you to configure a wireless router
with specific settings using a simulated web page.
Drag and drop. In some questions, you might need to drag
items from one location on the screen to another location to
answer a question. For example, you might see an out-of-order
list of the seven items in CompTIAs troubleshooting model.
You would need to drag and drop these items in the correct
order.
Data Entry. Some performance-based questions might ask you
to analyze a scenario and then enter appropriate data. For
example, when configuring a wireless access point, you might
need to enter specific data into the access point. A related
question might ask you to configure an access point to work
with WPA2 Enterprise mode. The Configuring a Wireless
Router Lab available online (http://gcgapremium.com/labs/)
shows you the steps to do this. Similarly, I wrote a series of
blog articles on creating rules for routers and firewalls. The
second post showed an example of a performance-based
question and the last post provided the solution. You can read
the posts here:
ACLs and Security+.
http://blogs.getcertifiedgetahead.com/acls-and-security/
Firewall Rules and Security+.
http://blogs.getcertifiedgetahead.com/firewall-rules-and-
security/
Firewall Rules Solution.
http://blogs.getcertifiedgetahead.com/firewall-rules-solution/
Command prompt. CompTIA has provided several examples
of how a simulation can require a test taker to execute
commands at the command prompt. As one possible example,
you might tasked to identify the media access control (MAC)
address of a system by entering a command. You’d need to
know how to enter ipconfig /all, and be able to recognize that
the MAC address is the physical address.
It’s common for people to be nervous when thinking about these
performance-based questions. However, the majority of people that take the
test say that they really aren’t that difficult. As long as you understand the
concepts from the exam objectives, you won’t have any problem. I do
recommend you check out the blog though, and see if I’ve posted any
updates.
A question people often ask about these questions is if they get partial
credit. CompTIA has verified that you get partial credit for some questions.
However, other questions may not give you partial credit. Do the best you
can with each question.
Exam Format
You start at question 1 and go to the last question. During the process,
you can mark any questions you want to review when you’re done.
Additionally, you can view previous questions if desired. For example, if you
get to question 10 and then remember something that helps you answer
question 5, you can go back and redo question 5.
Passing Score
A score of 720 is required to pass. This is on a scale of 100 to 900. If
the exam is paid for and you don’t get a single question correct, you still get a
score of 100. If you get every testable question correct, you get a score of
900. This gives a range of 800 points so you’ll get an average of 8 points per
question, though some questions may be weighted higher than others.
If all questions are equal and you get 100 questions, then you need to
get 78 questions correct, or score 78 percent on the exam. 78 * 8 = 624 plus
the 100 points you start with will give you a score of 724.
However, CompTIA doesn’t say if all questions are scored equally or
whether harder questions are weighted and worth more. A score of 78 percent
is high so you shouldn’t underestimate the difficulty of this exam. However,
many people regularly pass it and you can pass it too. With this book, you
will be well prepared.
Beta Questions
You exam may have some beta questions. They aren’t graded but
instead are used to test the validity of the questions. If everyone gets a beta
question correct, it’s probably too easy. If everyone gets it incorrect, there’s
probably something wrong with the question. After enough people have
tested a beta question, it’s analyzed and may be added to the test bank or
rewritten and retested.
The good news is that CompTIA doesn’t grade the beta questions.
However, you don’t know what questions are beta and what questions are
valid, so you need to treat every question equally.
Exam Prerequisites
All that is required for you to take the exam is money. Other than that,
there are no enforced prerequisites.
However, to successfully pass the exam, you’re expected to have nine
to twelve months experience working with computers in a networking
environment. Also, it’s recommended you have the A+ certification or
equivalent knowledge. If you have more than that, the exam materials will
likely come easier to you. If you have less, the exam may be more difficult.
Book Format
This Kindle short has the following sections:
Introduction. This section. It describes the exam and the rest of
the book.
Assessment questions. Practice test questions you can use to
assess your readiness of the Networking+ objectives covered in
this Kindle ebook. These questions are specially formatted for
the Kindle so that you can see the question on one screen, and
then the correct answer and explanation on the following
screen. The goal is to allow you to focus on only the question
without seeing the answer. After picking your answer, go to the
next Kindle screen to see if you’re correct.
Chapter content. A full chapter covering the objectives
mentioned previously. It includes practice test questions at the
end of the chapter with in-depth explanations.
Post-test. Practice test questions you can use to test your
readiness of the Network+ objectives. These questions are
formatted for the Kindle just like the pre-test questions.
Remember This
Throughout the book, you’ll see “Remember This” notes that highlight
important information you should remember to successfully pass the exam.
The surrounding content provides the additional information needed to fully
understand these key points, and the text boxes summarize the important
points.
These “Remember This” sections will look like this:
Remember This
I strongly encourage you to repeat the information in the
text boxes to yourself as often as possible. The more you
repeat the information, the more likely you are to remember
it when you take the exam.
A tried-and-true method of repeating key information is to take notes
when you’re first studying the material and then rewrite the notes later. This
will expose you to the material a minimum of three times.
Another method that students have told me has been successful for
them is to use an MP3 player. Many MP3 players can record. Start your MP3
recorder and read the information in each text box and the information in the
Exam Topic Review section of the chapter. Save the MP3 file and regularly
listen to it. This allows you to reaffirm the important information in your own
voice.
You can play it while exercising, walking, or just about any time when
it’s not dangerous to listen to any MP3 file. You can even burn the MP3 files
to a CD and play them back from a CD player.
If the MP3 method is successful for you, you can also record and listen
to exam questions. Read the question, only the correct answer, and the first
sentence or two of the explanation in each practice question.
If you don’t have time to create your own MP3 recordings, check out
the companion website (GetCertifiedGetAhead.com) for this book. As I get
closer to completing this book, I plan on adding some MP3 recordings there
that you can download and use.
»Get Certified »Get Ahead
CompTIA Network+ Objectives
While this Kindle short only covers some of the Network+ objectives,
I’ve listed them all here for your convenience. The exam includes five
separate domains as follows:
1.0 Network Architecture 22% of exam
2.0 Network Operations 20% of exam
3.0 Network Security 18% of exam
4.0 Troubleshooting 24% of exam
5.0 Industry Standards, Practices, and Network Theory 16% of
exam
1.2 Compare and contrast the use of networking services and applications.
VPN:
Site to site/host to site/host to host
Protocols
IPsec
GRE
SSL VPN
PTP/PPTP
TACACS/RADIUS
RAS
Web services
Unified voice services
Network controllers
1.5 Install and properly terminate various cable types and connectors using
appropriate tools.
Copper connectors
RJ-11
RJ-45
RJ-48C
DB-9/RS-232
DB-25
UTP coupler
BNC coupler
BNC
F-connector
110 block
66 block
Copper cables
Shielded vs unshielded
CAT3, CAT5, CAT5e, CAT6, CAT6a
PVC vs plenum
RG-59
RG-6
Straight-through vs crossover vs rollover
Fiber connectors
ST
SC
LC
MTRJ
FC
Fiber coupler
Fiber cables
Single mode
Multimode
APC vs UPC
Media converters
Single mode fiber to Ethernet
Multimode fiber to Ethernet
Fiber to coaxial
Single mode to multimode fiber
Tools
Cable crimpers
Punch down tool
Wire strippers
Snips
OTDR
Cable certifier
1.8 Given a scenario, implement and configure the appropriate addressing schema.
IPv6
Auto-configuration
EUI 64
DHCP6
Link local
Address structure
Address compression
Tunneling 6to4, 4to6
Teredo, miredo
IPv4
Address structure
Subnetting
APIPA
Classful A, B, C, D
Classless
Private vs public
NAT/PAT
MAC addressing
Multicast
Unicast
Broadcast
Broadcast domains vs collision domains
1.11 Compare and contrast technologies that support cloud and virtualization.
Virtualization
Virtual switches
Virtual routers
Virtual firewall
Virtual vs physical NICs
Software defined networking
Storage area network
iSCSI
Jumbo frame
Fibre Channel
Network attached storage
Cloud concepts
Public IaaS, SaaS, PaaS
Private IaaS, SaaS, PaaS
Hybrid IaaS, SaaS, PaaS
Community IaaS, SaaS, PaaS
2.2 Given a scenario, analyze metrics and reports from monitoring and tracking
performance tools.
Baseline
Bottleneck
Log management
Graphing
Utilization
Bandwidth
Storage
Network device CPU
Network device memory
Wireless channel utilization
Link status
Interface monitoring
Errors
Utilization
Discards
Packet drops
Interface resets
Speed and duplex
2.7 Install and configure wireless LAN infrastructure and implement the appropriate
technologies in support of wireless capable devices.
Small office/home office wireless router
Wireless access points
Device density
Roaming
Wireless controllers
VLAN pooling
LWAPP
Wireless bridge
Site surveys
Heat maps
Frequencies
2.4 Ghz
5.0 Ghz
Channels
Goodput
Connection types
802.11a-ht
802.11g-ht
Antenna placement
Antenna types
Omnidirectional
Unidirectional
MIMO/MUMIMO
Signal strength
Coverage
Differences between device antennas
SSID broadcast
Topologies
Adhoc
Mesh
Infrastructure
Mobile devices
Cell phones
Laptops
Tablets
Gaming devices
Media devices
4.0 Troubleshooting
4.1 Given a scenario, implement the following network troubleshooting methodology.
Identify the problem
Gather information
Duplicate the problem, if possible
Question users
Identify symptoms
Determine if anything has changed
Approach multiple problems individually
Establish a theory of probable cause
Question the obvious
Consider multiple approaches
Top-to-bottom/bottom-to-top OSI model
Divide and conquer
Test the theory to determine cause
Once theory is confirmed, determine next steps to resolve problem
If theory is not confirmed, re-establish new theory or escalate
Establish a plan of action to resolve the problem and identify potential effects
Implement the solution or escalate as necessary
Verify full system functionality and if applicable implement preventative
measures
Document findings, actions, and outcomes
4.2 Given a scenario, analyze and interpret the output of troubleshooting tools.
Command line tools
Ipconfig
Netstat
Ifconfig
ping/ping6/ping -6
tracert/tracert -6/traceroute6/traceroute -6
nbtstat
nslookup
arp
mac address lookup table
pathping
Line testers
Certifiers
Multimeter
Cable tester
Light meter
Toner probe
Speed test sites
Looking glass sites
WiFi analyzer
Protocol analyzer
4.4 Given a scenario, troubleshoot and resolve common copper cable issues.
Shorts
Opens
Incorrect termination (mismatched standards)
Straight-through
Crossover
Cross-talk
Near end
Far end
EMI/RFI
Distance limitations
Attenuation/Db loss
Bad connector
Bad wiring
Split pairs
Tx/Rx reverse
Cable placemen
Bad SFP/GBIC - cable or transceiver
4.5 Given a scenario, troubleshoot and resolve common fiber cable issues.
Attenuation/Db loss
SFP/GBIC - cable mismatch
Bad SFP/GBIC - cable or transceiver
Wavelength mismatch
Fiber type mismatch
Dirty connectors
Connector mismatch
Bend radius limitations
Distance limitations
5.7 Given a scenario, install and configure equipment in the appropriate location
using best practices.
Intermediate distribution frame
Main distribution frame
Cable management
Patch panels
Power management
Power converters
Circuits
UPS
Inverters
Power redundancy
Device placement
Air flow
Cable trays
Rack systems
Server rail racks
Two-post rack
Four-post racks
Free-standing racks
Labeling
Port labeling
System labeling
Circuit labeling
Naming conventions
Patch panel labeling
Rack monitoring
Rack security
5.10 Given a scenario, configure and apply the appropriate ports and protocols.
20,21 FTP
161 SNMP
22 SSH
23 Telnet
53 DNS
67,68 DHCP
69 TFTP
445 SMB
3389 RDP
CompTIA Network+ Assessment
Exam
Use the practice test questions in this mini assessment exam to test your knowledge
of the topics covered in this Kindle Short. Remember, this Kindle Short does not cover all
objectives within the Network+ exam. If you’d like some additional practice test questions
for the full exam, check out the CompTIA Network+ N10-006 Practice Test Questions (Get
Certified Get Ahead) [Kindle Edition].
A proxy server reduces bandwidth by storing copies of web site pages in cache and then
serving these cached pages to other users. It does not use an ACL.
A load balancer can balance traffic among multiple servers. It does not use an ACL.
A virtual private network (VPN) concentrator supports multiple VPN connections but it
doesn’t use an ACL.
2. You manage a network that has multiple computers connected via a single
Ethernet switch. What topology does this network use?
A. Ring
B. Mesh
C. Bus
D. Star
2. Answer: D is correct. A network that connects devices via a central switch is using a star
topology. The centralized switch has point-to-point connections to each of the devices
connected to the switch.
In a ring topology, computers are connected in a circle. They may connect to a central
device known as a multistation access unit (MSAU) but not an Ethernet switch.
In a mesh network, computers will have multiple connections to each other, rather than to a
single switch.
A bus configuration has devices connected directly to each other.
3. A network is configured with a topology that forces devices to wait before
communicating on the network. What type of network topology is this?
A. Ring
B. Mesh
C. Bus
D. Star
3. Answer: A is correct. A token ring network is configured as a circle or a ring and clients
can only send traffic when they have a logical token.
In a mesh network, computers will have multiple connections to each other, but the
topology doesn’t use a token or force devices to wait before communicating.
A bus configuration has devices connected directly to each other. It does use collision
detection forcing devices to wait after detecting a collision, but not before communicating
the first time.
A network that connects devices via a central switch is using a star topology and it doesn’t
use a token or force devices to wait.
4. Which of the following network topologies has a central device that is a
potential single point of failure?
A. FDDI
B. Mesh
C. Bus
D. Star
4. Answer: D is correct. A network that connects devices via a central switch is using a star
topology and the switch is a potential single point of failure. If the switch fails, all devices
connected to the switch lose network connectivity.
A Fiber Distributed Data Interface (FDDI) network uses two rings, with each ring
transmitting data in the opposite direction providing redundancy for the network.
A mesh network will have multiple connections to each other, providing several layers of
redundancy.
A bus configuration has devices connected directly to each other, not to a central device.
5. How many broadcast domains and collision domains are on a basic 12-port
switch using half-duplex mode?
A. 12 collision domains and 12 broadcast domains
B. 12 collision domains and 1 broadcast domain
C. 1 collision domain and 12 broadcast domains
D. 1 collision domain and 1 broadcast domain
5. B is correct. The switch creates 12 collision domains and 1 broadcast
domain.
A switch creates a single broadcast domain, not separate broadcast domains
so any answer with 12 broadcast domains is incorrect.
A switch creates separate collision domains for each port, not a single
collision domain for the entire switch.
6. How do computers on a peer-to-peer network pass information between
each other?
A. From one client to another
B. Through a centralized server
C. Through a router
D. Through a firewall
6. A is correct. Computers in peer-to-peer network pass information to each
other from one client (or one computer) to another.
Computers in a client-server topology receive information from a centralized
server.
Routers and firewalls are not directly related to a peer-to-peer network.
7. You are planning a small network for a business owner and need to
identify the best location for a server. Which of the following should you
consider first?
A. Equipment limitations
B. List of requirements
C. Environment limitations
D. Compatibility requirements
7. Answer: C is correct. The environment limitations are a primary consideration when
identifying the location of equipment in a network.
The equipment limitations effect the operation of the network, but won’t drive the where
they are located.
One of the first steps when creating a network is to create a list of requirements.
These requirements might help determine the best location, but the environment limitations
are more important when identifying the best location.
Based on the requirements, you may not need to run much cable. For example, if a wireless
network is acceptable, very little cable will be needed.
One of the common challenges with any complex technical topic is grasping both
the big picture and the relevant details. As an example, you’ll need to know in-depth details
of the Dynamic Host Configuration Protocol (DHCP) and how it works. While you’re
perfectly capable of learning those details, they won’t have much meaning if you don’t
have an understanding of typical network concepts. However, if you have a good
understanding of basic networking concepts, it becomes much easier to drill into the
details.
You can compare this to a jigsaw puzzle. It’s easier to do the border first and then
connect the pieces together from the border into the center. With this in mind, think of this
chapter like the jigsaw border. It provides you with an overall idea of many networking
concepts including the common devices, types of networks, and topologies. The primary
purpose is to help you get an idea of the big picture so that future chapters will make sense
as you start to drill into the details of various topics.
This chapter also covers numbering systems and basic safety topics listed in the
CompTIA objectives.
Understanding Common Network
Components
Networks connect computing devices together so that users can share
resources such as data and devices. For example, a simple network can have
two computers and a printer. Users on the network can access shared files
and folders on each of the computers, and print documents through the
networked printer.
Before networks were widespread, users shared files by copying them
to a disk and carrying them to other computers – humorously referred to as
“sneakernet.” People used their shoes (such as tennis shoes or “sneakers”) to
transfer the data.
The most common type of device on a network is a desktop personal
computer (PC). However, networks include many other types of devices such
as servers, printers, laptop computers, smartphones, and tablets. You’ll often
see a computing device on a network generically referred to as a client, host,
or node.
Network devices such as hubs or switches connect these clients together
within a network. Routers connect multiple networks together to create larger
and larger networks. The Internet appears as a single huge network but in
reality, it is a massive network of networks connected with routers around the
world.
If you’re pursuing the Network+ certification, it’s expected that you
have a basic understanding of clients or hosts on a network. With this in
mind, I won’t delve into the details of how a PC, laptop computer, or printer
operates internally. However, you will learn the details of how these
computing devices connect with network devices and communicate over a
network.
The following sections introduce some common networking devices
such as switches and routers. Future chapters cover these devices in much
more detail.
Before introducing these network devices, it’s useful to understand
three different methods that clients use to transmit data. They are:
Unicast. You can think of this as one-to-one traffic. One
computer sends data to one other computer on the network.
Broadcast. You can think of this as one-to-all traffic. One
computer sends data to all other computers on the network.
Multicast. You can think of this as one-to-many traffic. One
computer sends data to multiple computers on the network, but
not all of them.
Remember This
Unicast traffic goes from one computer to one computer.
Broadcast traffic goes from one computer to all other
computers on the network. Multicast traffic allows a single
computer to address multiple computers on a network
simultaneously without addressing all of them.
Hub
A hub has multiple physical ports used to provide basic connectivity to
multiple hosts. Hubs commonly have between four and thirty-two physical
ports. In an Ethernet network, the hub has multiple RJ-45 ports. Twisted pair
cables plug into the RJ-45 port on one end and plug into a client’s network
interface card (NIC) on the other end.
Most hubs are active, meaning they have power and will amplify the
output to a predefined level. In this sense, they are similar to a repeater. A
basic repeater accepts one input, amplifies it to a predefined level, and has
one output. This is useful if you need to extend a cable farther than normal.
Active hubs have multiple ports and are sometimes called multiport repeaters.
Hubs do not have any intelligence or analytical capabilities so they
cannot determine if the transmissions are unicast, broadcast, or multicast.
Whatever goes in one port goes out other ports. As an example, Figure 1-1
shows four computers connected to a hub. When one computer sends data
through one port, the hub transmits the data to each of the other ports on the
hub.
Figure 1-1: Hub
Most organizations have replaced hubs with switches. Switches have
more intelligence and provide better performance than hubs.
Remember This
Hubs forward all traffic to each of the hub ports. This
includes unicast, multicast, and broadcast traffic.
Switch
Switches connect devices in a network similar to how hubs connect devices. The
primary difference is that switches have more intelligence and make decisions on what
traffic to send to each port. Switches make these decisions based on the media access
control (MAC) address assigned to each connected device.
A MAC address is a 48-bit address assigned to a client’s NIC and it is typically
displayed as six pairs of hexadecimal characters like this 1A-2B-3C-4D-5E-6F or
this1A:2B:3C:4D:5E:6F. Valid hexadecimal characters are the numbers 0-9 and the letters
A-F. Four bits represent each character. For example, 0001 represents 1 in hexadecimal and
1110 represents E in hexadecimal. If you need to review decimal, hexadecimal, and binary
topics, check out the section later in this chapter.
You might hear that MAC addresses are unique and are permanently assigned to a
NIC. This isn’t exactly correct.
MAC addresses are theoretically unique. You are not likely to see any
two identical MAC addresses assigned to different NICs, but it is possible.
MAC addresses can be changed. MACs are typically burned into the NIC
making them semi-permanent. However, you can change the MAC address
for the NIC through the operating system or a software tool.
When devices transmit data from one device to another, they include their MAC
address as the source MAC address and the other device’s MAC address as the destination
MAC address. A switch typically doesn’t know which MAC addresses are associated with
each physical port when it is first powered up. However, over time, it tracks the traffic and
eventually learns the MAC addresses associated with each of its ports.
As an example, consider Figure 1-2. It shows four computers connected to a basic
switch with four ports, and a Port-MAC table created within the switch’s memory. When
the switch first turns on, the Port-MAC table is empty. However, when computer A
transmits data, the switch captures the MAC address, associates it with port 1, and enters it
into the Port-MAC table. At this point, it doesn’t know the MAC addresses for other
computers. Over time, the other computers transmit data with their MAC address and the
switch populates the Port-MAC table with the captured data.
Bluetooth Wireless
Bluetooth is a short-range wireless system and Bluetooth devices include
smartphones, personal digital assistants (PDAs), and other computer devices. As an
example, the Apple Watch uses Bluetooth to communicate with a user’s iPhone. The range
of Bluetooth was originally designed for about three meters (about 10 feet), but the range is
often farther, and ultimately extends beyond a person’s personal space.
NFC
Near field communication (NFC) is a group of standards used on mobile devices that
allow them to communicate with other mobile devices when they are close to them. For
example, in some cases, you can share information with a friend just by touching your
smartphone with hers, or by placing your smartphone in close proximity to hers. Many
credit card readers support payments using NFC technologies. For example, you can make
a purchase in some establishments just by placing your phone close to the credit reader.
IR
Infrared (IR) uses an infrared light and is commonly used in devices such as TV
remotes. It can be used with a PAN, but this isn’t as common because it requires a clear
line of sight between the two devices. If the path is blocked by something as simple as a
single piece of paper, it blocks the communication.
Remember This
A personal area network (PAN) is a network of devices
around a single person. A common protocol used with
PANs is Bluetooth.
LAN
A local area network (LAN) is a network of devices within a single location. It can
include just a single switch used to connect the devices and a single router used to connect
the network to the Internet. Large organizations might have dozens of switches and routers,
but the key is that all the devices are in the same location.
WLAN
A wireless local area network (WLAN) connects devices without the need for
cables. It is easy to set up and can quickly connect several computers at a lower cost than it
takes to create a wired network. A significant challenge with wireless networks is security.
Wireless security has improved over the years, but wireless networks are still susceptible to
vulnerabilities and many users just don’t understand how to lock down a wireless network
adequately.
Many organizations set up hotspots for their customers. For example, a coffee shop
might set up a WLAN as a hotspot allowing customers to easily connect to the Internet
while sipping a cappuccino or latte. Hotspots rarely use any security, but instead are open
wireless network providing easy access for customers.
The “Managing Wireless Networks” chapter covers WLANs in much more depth
including basic security mechanisms.
CAN
A campus area network (CAN) is a network that connects multiple buildings in a
small geographical area, such as a university campus. Similarly, many technology
companies in Silicon Valley own several buildings spread across a small geographical area.
Even though they aren’t educational institutions, people commonly refer to the area as a
campus.
Figure 1-9 compares a LAN with a CAN. On the left is a single local area network
with some personal computers and a server. While not shown in the diagram, this network
would have at least one switch, at least one router, a firewall, and Internet connectivity.
The CAN shows similar LANs in several buildings within a university campus connected
together. The buildings might be connected together with physical cables such as
underground fiber runs, or they could be connected with other methods such as microwave
links. While not shown, the CAN would have Internet access, protected with at least one
firewall.
Remember This
A campus area network (CAN) is a network connecting
multiple buildings, but in a limited area. A metropolitan
area network (MAN) is similar to a CAN, but includes
networks spread across city or larger metropolitan area.
WAN
A wide area network (WAN) is a group of two or more networks spread across a
large geographical area. There isn’t a specific distance that identifies a network as a WAN,
but generally it indicates that two or more networks are in separate cities. For example, an
organization can have a network in Virginia Beach, VA and a second network in New
York, NY. They can then connect the two networks creating a WAN.
It’s rare for an organization to run their own cables for a WAN. For example, a
company with offices in Virginia Beach and New York would not dig trenches between the
two cities to lay the cable. Instead, they lease bandwidth from existing lines owned by
telecommunications companies.
VPN
A virtual private area network (VPN) is a connection to a private network over a
public network such as the Internet. There are two primary types of VPNs. They are:
Host-to-gateway or host-to-site VPN. A single user (using a host
computer) accesses the organization’s site with a VPN connection. The
user is able to access the internal network from a remote location so you’ll
often hear this referred to as remote access. The user must initiate this
connection.
Gateway-to-gateway or site-to-site VPN. A VPN connects a LAN in one
location with a LAN in another location. This is typically transparent to
users in the network. Unlike a host-to-gateway VPN, users in a gateway-to-
gateway VPN do not need to initiate the connection. It is either always
connected, or in some cases, enabled on demand.
Figure 1-10 shows a host-to-gateway VPN. The user first connects to the Internet.
This could be from a home computer, a wireless access point while traveling, or anywhere
else the user has Internet access. Next, the user connects to the VPN server over the
Internet. The VPN server challenges the user to authenticate and after the user enters the
correct credentials, such as a valid username and password, the user has access to the
internal network. This network shows an internal email server and file server. Users that
connect to the VPN, have access to these servers just as if they connected from within the
private network. A primary difference is that the VPN connection will be slower because it
is going over the Internet.
Remember This
One of the first things you’ll need to do when planning a
basic network is to create a list of requirements and
constraints. You should complete this list prior to making
any purchases.
For a basic wired network, you would typically use the following devices:
Switch. The switch provides connectivity for all the devices in the
network.
Router. The router connects the basic network to the Internet.
Firewall. The firewall provides a layer of protection for the internal
network. For small networks, you will often use a device that functions as
both a router and a firewall.
Internet access device. This might be a DSL or cable modem or another
device depending on the ISP requirements.
Cables for wired connections. This includes cables from desktop PCs to a
switch, a switch to a router, and a router to the Internet connection such as
a cable modem. These are typically twisted pair cables with RJ-45
connectors.
NICs. While most computers have built-in NICs, you’ll need to ensure
they meet the equipment requirements of the network. For example, if a
desktop PC has a slower NIC, you might need to replace it with a newer,
faster NIC.
Remember This
A basic wired network needs at least one switch and cables
to connect each device to the switch. If the basic network
will connect to the Internet, you’ll also need at least one
router, a cable to connect the switch to the router, and a
cable to connect the router to the ISP device.
Wired/Wireless Considerations
A wireless network is less expensive than a wired network because you don’t need
to purchase and run cables to all the devices. A basic access point functions like a switch
eliminating the need for a switch in many networks. An access point with routing
capabilities (a wireless router) includes the capabilities of a switch, a router, and a firewall
eliminating the need for additional hardware. In other words, you can purchase a wireless
router and the only other device you’ll need is an Internet access device such as a modem.
For a basic wireless network, your device list might look like this:
Wireless router. Most wireless routers include RJ-45 ports so you can
plug in wired devices, if necessary.
Wireless NICs. Most devices include wireless NICs, but you can purchase
wireless adapters for any PCs that don’t have wireless capabilities.
Wireless USB adapters are widely available and they provide any PC with
wireless capabilities through an available USB port.
Internet access device. This device is dependent on the ISP and might be a
DSL modem or a cable modem.
Cables. You’ll still need a cable to connect the wireless router to the
Internet access device and any wired devices that need to plug into the
wireless router.
Remember This
A wireless network typically uses a wireless router instead
of a switch and a router and only requires cables for
devices that cannot connect wirelessly. You also need a
cable to connect the router to the Internet, using the device
specified by the ISP such as a DSL or cable modem.
If your network requires cables, you’ll need to ensure the cable length is within the
required standards. While there are many different types of cables, most basic networks use
twisted pair cable and the maximum length of most twisted pair cables is 100 meters (about
328 feet). The signal degrades as it passes through the cable and if the cable is too long, the
signal is unusable. While you can use repeaters to amplify the signal, the best bet is to
ensure the cables are within the required length.
Environmental and Equipment
Limitations
Two limitations you’ll need to address in a basic network are environmental
limitations and equipment limitations. A significant environmental limitation is
interference. Most interference issues affect wireless networks, but some can also affect a
wired network. Common interference issues are:
Radio frequency interference (RFI). RFI comes from other electronic
devices that transmit signals over the air using the same frequency. This
includes devices such as cordless telephones, baby monitors, home alarm
systems, Bluetooth devices, or another wireless network. RFI primarily
affects wireless networks and a future chapter covers some of the methods
you can use to avoid or compensate for RFI problems.
Electromagnetic interference (EMI). EMI comes from electrical devices
such as microwave ovens, light fixtures, and refrigerators. In general, you
shouldn’t place network devices or cables near these devices to avoid EMI
problems. When running cables between devices, you should keep the
cables away from fluorescent lights and power lines.
Physical objects. Wireless networks transmit radio frequency signals over
the air and many physical objects interfere with these signals. This includes
walls, floors, and trees. These objects don’t completely block the wireless
signals, but they do reduce the signal strength and reduced signal strength
results in slower connections.
Weather events. If the wireless signal has to pass through an outside area,
weather events such as rain, fog, and electrical storms can interfere with
signals. This won’t affect devices within the same building, but might
affect signals going to another building such as a detached garage.
Utilities. You also need to ensure the equipment has adequate power,
heating, ventilation, and air conditioning.
You should also consider the equipment limitations when planning a basic network.
For example, cables, NICs, switches, routers, and access points all have maximum
bandwidth capabilities. If you want systems within the network to be able to transfer data at
a rate of 1 gigabit per second (1 Gbps), you need to ensure that all of the equipment
supports this speed.
You’ll find that the capabilities of switches and routers extend well beyond the basic
capabilities introduced in this chapter. When using them in large organizations, you’ll need
to be concerned with several different features of these devices, and their limitations.
However, for a basic network, the primary equipment limitation you need to worry about is
the maximum bandwidth of each device.
Remember This
Environment limitations are a primary consideration when
identifying the location of equipment in a network. Ideally,
you’ll be able to avoid interference and have adequate
power and air conditioning.
Security considerations
As a rule, you want to ensure that unauthorized users cannot access a network so
you’d implement appropriate security precautions. Future chapters will explain how this is
done, but as an introduction, you can implement media access control (MAC) address
filtering, control traffic with a firewall, use strong authentication mechanisms, and strong
wireless protocols and security mechanisms.
Securing a wireless network is more challenging than securing a wired network, but
it is possible and you’ll learn what to do in the “Managing Wireless Networks” chapter.
Due to the security concerns, some business owners might decide to use wired connections
whenever possible even though it adds to the costs.
Compatibility Requirements
In addition to checking for the environmental and equipment limitations, you’ll need
to ensure that network equipment is compatible with other network equipment. As a simple
example, you’d need to ensure that you can connect each of the devices together. Most
wired networks use twisted pair cable with RJ-45 connectors so you’d need to ensure that
the NICs, switches, and routers all have RJ-45 ports.
Slower devices will normally still work with a faster device, but at a slower speed.
For example, if you’re using a 1 Gbps switch and a 100 Mbps NIC, the connection between
the NIC and the switch will use 100 Mbps.
Most devices can automatically negotiate between using half-duplex and full-duplex
connections based on the capabilities of both connections. However, if the devices use a
manual configuration, you need to ensure that both devices are configured with the same
modes. If a NIC is using half-duplex and a switch is using full-duplex, the connection
won’t work.
When adding wireless devices to your network, you need to ensure they support
compatible protocols such as 802.11n or 802.11ac. Additionally, you should ensure they
support the wireless security mechanism you’re using. The “Managing Wireless Networks”
chapter covers these standards in greater depth.
Understanding Numbering Systems
You need to have a basic knowledge of numbering systems. This includes decimal,
binary, hexadecimal, and octal. While this is basic knowledge, it is still important. If you
haven't used these numbering systems in a while, they might be a little foggy.
Decimal
When reviewing many topics, it's worth reviewing what you know and then
connecting it to new topics. In this case, you should have a good understanding of decimal.
Decimal numbers use a base of ten and include the numbers 0 to 9. Because it's a base of
10, the next number after 9 is 10.
This shouldn’t be a surprise to anyone reading this book. However, it’s important to
understand the underlying details of base 10.
The position of each number within base 10 has a different value such as 1, 10, 100,
1000, and so on. For example, consider the number 2,478. It has four numbers (2, 4, 7, and
8) but these numbers have significantly different values based on their place.
2 is in the thousands place so it has a value of 2,000 (2 × 1000)
4 is in the hundreds place so it has a value of 400 (4 × 100)
7 is in the tens place so it has a value of 70 (7 × 10)
8 is in the ones place so it has a value of 8 (8 × 1)
I've had students in the classroom try to make this difficult, but it doesn't need to be.
Imagine I offered you the choice of receiving $2,478 or $8,742. Which would you choose?
If you're like most people, you recognize the first number is over $2,000 but the
second number is over $8,000. Clearly, you would take the $8,000. The math behind it is
that the 8 is in the thousands place so it represents 8 thousand dollars.
Table 1.1 shows the underlying details using the base 10 number 2,478.
A B C D
Base 10 10^3 10^2 10^1 10^0
Place Value 1,000 100 10 1
Decimal Number 2 4 7 8
Decimal Values 2,000 400 70 8
4
8
b
e
See if you can convert the following octal numbers to three binary bits:
0
2
6
7
You can check your answers at end of chapter.
Staying Safe
When working on computers and networks, it’s important to pay
attention to safety. Successful technicians remember that computing devices
are just things that can be replaced, but people cannot be replaced. In other
words, it’s always important to value people over things when working on
computers and networks.
The following sections cover common safety precautions mentioned
in the Network+ objectives.
Electrical Safety
As a general guideline, you should never open and work on
computers or networking devices without first removing power. This includes
turning the device off and unplugging it.
The exception is if you are measuring voltages. Obviously, the system
needs to be powered on to measure voltages. However, it’s important to be
careful any time a device is open. This is to protect you as the technician and
to prevent accidental damage to the device.
When working inside a powered on device, it’s important to remove
or cover all your jewelry. If a metal watchband or ring touches some
components, it can easily destroy the device. Depending on the device, it can
also give you a memorable shock.
Some technicians don’t want to remove rings, such as wedding rings.
Covering them with tape while working on the device avoids any problems.
Equipment Grounding
In electronics, ground refers to a path to Earth. Buildings commonly
have a spike hammered into the ground with a copper cable attached to it.
This copper cable is attached to the electrical ground connection throughout
the building.
Electrical equipment (including computing and networking devices)
includes circuitry that will automatically redirect any dangerous voltages to
ground to prevent shocks. As an example, if a device develops a fault that can
put 115 volts AC onto the case of the equipment potentially shocking anyone
that touches it, the circuitry instead sends this voltage to ground.
While it’s rare for a device to develop such a fault, all it takes is once.
If the voltage has enough current, it can kill a person.
With this in mind, it’s important for technicians to keep ground
connections connected. Disconnecting the ground connections can allow
dangerous voltages to bypass safety circuits.
ESD
Electrostatic discharge (ESD) refers to the discharge of static
electricity. It can damage electronic components so technicians take steps to
prevent ESD damage. You’ve probably experienced a static discharge at
some point in your life. The most common way is after walking across a
carpeted floor and touching a door knob. The static builds up on you, and
when you touch the doorknob, it discharges.
The shock you felt might have been unpleasant, but it wasn’t harmful.
If you felt it, at least 3,000 volts were discharged from your hand to the door
knob. If you actually saw the spark when it discharged, it was at least 8,000
volts. The good news is these voltages won’t kill or hurt people, mostly
because static discharge has very little current.
In contrast, as little as 250 volts can damage electronic components
inside computing and networking devices. You won’t see it. You won’t feel
it. However, the damage is real.
A primary method of preventing ESD is by controlling humidity. If
humidity is too low, it allows static to build up quickly. If you live in a colder
area, you’ll notice that static is more common in the colder months because
heating systems remove humidity from the air. In contrast, when the humidity
is higher, the static charges dissipate naturally. Ideally, humidity should be
around 50 percent. Static can build up on carpets easier than other floor
surfaces so computing devices should not be placed on carpets.
Technicians prevent ESD damage with ESD wrist straps, antistatic
bags, and ESD mats. These help prevent the buildup of static by ensuring the
technician and the equipment are at the same ground potential. Even without
these ESD tools, if you touch the computer case before working on any
components, it will harmlessly discharge built-up static onto the case. If you
remove any circuit cards, don’t touch the components or the pins. Instead,
hold the outside edges or the plastic handles.
Installation Safety
Installation safety refers to some miscellaneous topics beyond
electrical safety or ESD.
Lifting equipment. When lifting equipment, it’s best to lift with your
legs, not your back. In other words, instead of bending down to pick up heavy
equipment, you should squat by bending your knees to pick it up. There
aren’t any firm guidelines on safe weight limitations. However, many
standards recommend that individuals do not try to lift equipment more than
70 pounds without help.
Rack installation. Servers and networking devices are commonly
mounted in racks about the size of refrigerator. When mounting the
equipment, it’s often best to do so with two people. One person can hold the
equipment, while the other person screws the device into rack
Placement. When mounting devices within racks, another concern is
ensuring there is enough room for airflow between the devices. In some
situations, instead of mounting devices directly on top of each other, it’s
necessary to mount them so that there are gaps between them. This helps
prevent equipment damage from overheating.
Tool safety. It’s also important to follow general safety practices
when working with tools. The practices vary from one tool to another, but are
outlined in the tools documentation.
MSDS
Material Safety Data Sheets (MSDSs) are available for most products
that have a potential to cause harm to people or equipment. This includes
materials such as cleaning solutions, paints, and chemicals. The MSDS
identifies important safety facts about the material such as its contents and
characteristics.
A primary element of the MSDS is first aid steps to take if the product
causes an adverse reaction to either people or equipment. For example, you
may use cleaning products that clean computer screens or keyboards. If any
of these products is causing an adverse reaction to either people or the
equipment, you can refer to the MSDS sheet for information on the product
and additional steps to take after the exposure.
Remember This
An MSDS includes important safety information about
potentially hazardous products. If a product causes an
adverse reaction, the MSDS will include first aid
information to minimize the effects.
Fire Suppression
You can fight fires with individual fire extinguishers, with fixed systems, or both.
Most organizations included fixed systems to control fires and place portable fire
extinguishers in different areas around the organization. A fixed system can detect a fire
and automatically activate to extinguish the fire. Individuals use portable fire extinguishers
to suppress small fires.
The different components of a fire are heat, oxygen, fuel, and a chain reaction
creating the fire. Fire suppression methods attempt to remove or disrupt one of these
elements to extinguish a fire. You can extinguish a fire using one of these methods:
Remove the heat. Fire extinguishers commonly use chemical agents or water to
remove the heat. However, you should never use water on an electrical fire.
Remove the oxygen. Many methods use a gas, such as carbon dioxide (CO2) to
displace the oxygen. This is a common method of fighting electrical fires because
CO2 and similar gasses are harmless to electrical equipment. However, when used
in server rooms or data centers, they threaten the lives of employees so additional
precautions are needed to ensure personnel exit before activating the fire
suppression system.
Remove the fuel. Fire-suppression methods don’t typically fight a fire this way,
but the fire will go out after all burnable material is gone.
Disrupt the chain reaction. Some chemicals can disrupt the chain reaction of
fires to stop them.
Remember This
Fire suppression systems attempt to detect and extinguish
fires. Systems that remove or displace all the oxygen in the
room can potentially threaten the lives of personnel in the
room, so should be considered with caution.
HVAC
Heating, ventilation, and air conditioning (HVAC) systems enhance the availability of
systems. Computing and networking devices can’t handle drastic changes in temperatures,
especially hot temperatures. If devices overheat, the chips can actually burn themselves
out. HVAC systems also control humidity to help prevent ESD damage.
The cooling capacity of HVAC systems is measured as tonnage. This has nothing to
do with weight, but instead refers to cooling capacity. One ton of cooling equals 12,000
British thermal units per hour (Btu/hour), and typical home HVAC systems are three-ton
units. Higher-tonnage HVAC systems can cool larger areas or areas with equipment
generating more heat.
The amount of air conditioning needed to cool a massive data center is much greater
than you need to cool your home, primarily because of all the heat generated by the
equipment. If your home air conditioner fails in the middle of summer, you may be a little
uncomfortable for a while, but if the data center HVAC system fails, it can result in loss of
availability and a substantial loss of money.
As mentioned previously, it’s common to mount computing and networking devices
in installation racks (sometimes called bays or cabinets). These racks usually have locking
doors in the front and rear for physical security. The doors have perforations allowing cold
air to come in the front, passing over and through the devices to keep them cool. Slightly
warmer air exits out the rear. Additionally, a server room has raised flooring with air
conditioning pumping through the space under the raised floor.
Emergency Procedures
Another element of safety is being aware of existing emergency
procedures where you work. The following text summarizes some common
emergency procedures
Emergency alert system. A common emergency alert system is a fire
alarm. Fire alarms can go off automatically, or be set off manually.
Additionally, some organizations have other alerts or alarms for specific
situations. For example, some data centers use fire suppression systems that
remove or displace oxygen in the data center. While this effectively fights the
fire, it can also be harmful to humans if they stay in the data center. Many of
these have unique-sounding alarms that go off before the fire suppression
system activates. This gives employees time to exit the area.
Fire escape plan. A fire escape plan identifies the best path to take to
exit the building. Many organizations post the fire escape plan near the exit
door. This gives employees
Safety/emergency exits. Some exits are not used during normal
activity, but instead give personnel another exit in case of an emergency.
These are typically alarmed and the alarms go off anytime someone opens the
exit. This discourages people from opening them except for during an
emergency.
Building layout. Employees should know the layout of a building so
that they can identify the best path to take in case of an emergency. As an
example, personnel should stairs instead of elevators during a fire, so they
should know where the stairs are, even if they don’t use them regularly.
Fail open/fail close. During emergencies, exit doors should allow
personnel to open them so that they can exit. Understanding this, if power
fails, the doors should fail in an open (or unlocked) state allowing personnel
to exit. In contrast, organizations may want to ensure that entrance doors to
secure areas fail in a closed state. This way, if the building loses power,
unauthorized people would not be able to enter the secure areas. Some exit
doors include a manual method of opening the door from the inside when
power goes out (providing a fail open state), while still preventing someone
from opening the door from the outside when power goes out (providing a
fail close state).
Try This Conversion Answers
The following decimal numbers converted to four binary bits are:
1 is 0001
3 is 0011
5 is 0101
9 is 1001
The following hexadecimal numbers converted to four binary bits are:
4 is 0100
8 is 1000
b is 1011
e is 1110
See if you can convert the following octal numbers to three binary bits:
0 is 000
2 is 010
6 is 110
7 is 111
Chapter 1 Exam Topic Review
When preparing for the exam, ensure you understand these key concepts from this
chapter.
Unicast, Multicast, and Broadcast
Unicast transmissions are one-to-one. A device sends a unicast
transmission from one device to one other device.
Broadcast transmissions are one-to-all. A device addresses a
broadcast transmission from one device to all other devices on a
network. Hubs and switches pass broadcast transmissions but
routers do not pass most broadcast transmissions.
Multicast transmissions are one-to-many. A device addresses a
multicast transmission from one device to several other devices.
This allows a single computer to address multiple devices with
a single multicast address without addressing all of them as a
broadcast transmission does.
Common Network Components
Network clients or hosts include desktop personal computers, servers,
printers, laptop computers, smartphones, and tablets.
Switches or hubs connect network devices together in a single network.
Twisted pair cables such as CAT5e or CAT6 run between network clients
and a switch or hub.
Routers connect networks together creating larger routed networks.
Firewalls protect a network from unauthorized users. They provide a layer
of protection from Internet threats and are typically located at a network’s
border between the private network and the Internet.
Routers and firewalls use access control lists (ACLs) to define network
access. An ACL is a group of rules.
Modems provide access to the Internet through an ISP. Two popular
modem types are cable modems and digital subscriber line (DSL) modems.
The order of network connectivity for a computer to the Internet is:
Computer -> Switch -> Router -> Firewall -> ISP -> Internet.
Switches forward broadcast traffic to all other ports but are selective with
other traffic. Routers block broadcast traffic.
Some important points to remember related to collision domains and
broadcast domains are:
Hubs pass all traffic.
Devices connected to a hub are in a single collision domain and a
single broadcast domain.
Switches segment unicast traffic and pass broadcast traffic.
Switches create a single broadcast domain and create separate
collision domains for each port on the switch.
Routers do not pass broadcast transmissions.
Routers create separate broadcast domains.
Half-duplex mode uses a single connection to send and receive data, but it
cannot send and receive data at the same time.
Full duplex mode uses a single connection with separate lines for sending
and receiving. A system can send and receive data at the same time with a
full duplex mode connection.
Most interfaces support auto-negotiation and configure themselves to use
the fastest mode and speed. Connections fail if one device is manually set
to half duplex and the other device is manually set to full duplex.
PANs, LANs, WANs, and More
A personal area network (PAN) is a network of devices around a single
person. Bluetooth is the primary protocol used with a PAN.
A local area network (LAN) is a network of devices within a single
location.
A wireless local area network (WLAN) connects devices without the need
for cables.
A campus area network (CAN) is a network that connects multiple
buildings in a small geographical area, such as a university campus.
A metropolitan area network (MAN) is a group of networks spread across a
larger geographical area beyond the size of a campus.
A wide area network (WAN) is a group of two or more networks spread
across a large geographical area.
A virtual private area network (VPN) is a connection to a private network
over a public network such as the Internet.
Network Topologies
Most organizations use a star topology to connect computers into a
network. In a star topology, devices connect to a central device such as a
switch. The central device is a single point of failure for users connected to
the switch.
Ring topologies connect devices in a circle. Devices pass a token around
the ring and devices are only able to transmit data when they have the
token. This methodology forces devices to wait before communicating.
Fiber Distributed Data Interface (FDDI) is a type of ring network using
fiber optic cable and two rings. Each ring transmits data in the opposite
direction providing redundancy for the network.
Some Synchronous Optical Networking (SONET) protocols use ring
topologies.
Bus topologies connect devices together in a single line. The entire
network fails if both ends of the bus do not include terminators. A break
anywhere in the bus takes down the entire network. The break creates two
separate networks and each network has only one terminator.
Computers in a peer-to-peer (P2P) network share information with each
other. File sharing technologies such as BitTorrent use P2P networks.
Basic Networks
One of the first steps when planning a basic network is to create a list of
requirements.
A typical basic network uses a switch, a router, a firewall, a modem, and
cables.
The modem provides Internet access through an Internet service provider
(ISP).
A firewall provides a layer of protection for the basic network against
Internet threats. A router and a firewall are not needed if the basic network
is not connected to the Internet.
A wireless network typically uses a wireless router instead of a
switch and a router and only requires cables for devices that
cannot connect wirelessly.
Environment limitations are a primary consideration when
identifying the best location for networking devices. Ideally, you’ll
be able to avoid interference and have adequate power and air
conditioning.
Numbering Systems
Decimals have a base of ten and other numbering systems are
commonly converted to or from decimal.
Binary has a base of two, with valid numbers of 0 and 1 only.
Octal has a base of eight, with valid numbers of 0 through 7.
Octal numbers are represented with three bits. For example, 101
is equal to five octal.
Hexadecimal has a base of 16, with valid numbers of 0 through
9 and a through f. Hexadecimal numbers are represented with
four bits. For example, 1001 is equal to nine hexadecimal.
Safety Issues
Devices should be turned off and unplugged before opening
them.
Electrical grounds should not be disabled on networking
devices.
Electrostatic discharge (ESD) can damage equipment.
Technicians prevent ESD damage with ESD wrist straps,
antistatic bags, and ESD mats.
Material Safety Data Sheets (MSDSs) include important safety
information about potentially hazardous products. If a product
causes an adverse reaction, the MSDS will include first aid
information to minimize the effects.
Fire suppression systems attempt to detect and extinguish fires
before they get out of control. Some remove the oxygen from a
room, which can pose a risk to personnel in the room.
Heating, ventilation, and air conditioning (HVAC) systems
enhance the availability of systems by controlling temperature
and humidity.
Emergency procedures include alert systems, fire escape plans,
safety and emergency exits, and knowing the building layout.
Additionally, it’s important to consider safety when
determining if doors should fail in an open state or in a closed
state.
»Get Certified »Get Ahead
Chapter 1 Practice Questions
1. Which of the following transmission methods allows a single computer to
address data transmissions to multiple computers on a network without
addressing all the computers on the network?
A. Unicast
B. Multicast
C. Broadcast
D. Switch
1. B is correct. One computer can address multiple computers on a network
without addressing all the computers with multicast data transmissions.
One computer can address one other computer with unicast transmissions.
One computer can address all other computers on a network with broadcast
transmissions and it’s important to remember that most broadcast
transmissions are not passed by routers.
Switches connect computers win a network but a switch is not a transmission
method.
2. Of the following choices, what best defines network access?
A. Implicit deny
B. VPN
C. WAP
D. ACL
2. D is correct. An access control list (ACL) on a router or firewall is a group
of rules that defines network access.
An ACL often has an implicit deny rule at the end to effectively block all
traffic that hasn’t been defined in previous rules, but the implicit deny rule
doesn’t define network access.
A virtual private network (VPN) provides access to an internal private
network over a public network, and an ACL rule can allow or block VPN
access.
A wireless access point (WAP) provides wireless devices access to a wired
network. A WAP can include an ACL but the WAP doesn’t specifically
define network access.
3. You are configuring a basic network. Which of the following is the BEST
order of devices?
A. PC -> Switch -> Router -> Firewall -> ISP
B. PC -> Firewall -> -> Router -> Switch -> ISP
C. PC -> Router -> ISP -> Firewall -> Switch
D. Switch -> PC -> ISP -> Firewall -> Router
3. A is correct. The order of connectivity from a PC to the Internet is the PC,
a switch, a router, a firewall, and then an Internet service provider (ISP)
device such as modem.
PC -> Switch -> Router -> Firewall -> ISP
A basic network will typically have the firewall built into the router. A switch
connects computers in a network.
Routers connect networks, including basic networks, with the Internet.
While not part of this question, broadband networks include a modem and the
router/firewall connects to the modem before the ISP.
4. What is created by separate switch ports?
A. Collision domains
B. Broadcast domains
C. VLAN
D. ACL
4. A is correct. A switch creates separate collision domains between each port
and the device connected to the switch’s port.
All devices connected to a switch are in the same collision domain, so
separate switch ports do not create different collision domains.
You can create separate virtual local area networks (VLANs) with a switch,
but not all switches support VLANs so this isn’t the best answer
An access control list (ACL) is a group of rules used on a router or firewall to
define network access.
5. A company in Silicon Valley owns three buildings within walking distance
of each other and each of these buildings are connected via a single network
What is the best name for this network?
A. CAN
B. LAN
C. MAN
D. PAN
5. Answer: A is correct. A campus area network (CAN) is a network of multiple buildings,
but in a limited area.
A local area network (LAN) connects computers in a limited area such as within a home or
a single building.
A metropolitan area network (MAN) that spans a large area such as a city or a very large
campus. While three buildings might be described as a MAN, it is more accurate to call it a
CAN because it is only a few buildings and the same company owns the buildings.
A personal area network (PAN) is centered around a person.
6. Which of the following is a network topology?
A. Bust
B. Ethernet
C. Multicast
D. Star
6. D is correct. Star is a type of network topology. In a star topology, all
devices connect to each other via a central networking device such as a hub
or a switch.
A bus topology connects all devices in a line but “bust” is not a valid network
topology.
Ethernet is a type of technology not a topology.
Multicast is a type of data transmission that allows one device to send data to
multiple devices at a time without directly addressing each individually.
7. What type of network topology connects devices in a circle?
A. Bus
B. Mesh
C. Ring
D. Star
7. C is correct. The ring network (also known as a token ring network)
topology connects devices in a circle and passes a logical token around the
circle.
A bus topology connects devices in a line.
A mesh topology uses multiple connections instead of a single circle.
Devices connect into a star topology via a central device such as a switch.
8. Computers within a network are only able to transfer data when they have
access to a logical token. What type of topology does this describe?
A. Star
B. Ring
C. Bus
D. MPLS
8. Answer: B is correct. Ring topologies (often called token ring) use a logical token and
devices can only communicate when they have access to the token. A ring topology is
configured in a circle or ring.
Star topologies use a central device such as an Ethernet switch or a hub, which do not use
tokens.
Bus topologies do not use tokens. They are rarely used on networks because a failure in
one connection results in a failure for all devices on the bus.
Multiprotocol Label Switching (MPLS) does not use tokens. MPLS is a wide area network
(WAN) protocol that uses labels to identify addressing paths.
9. You are a network technician for a small company. Another technician
accidentally cut one of the cables effectively separating the network into two
networks. Of the following choices, what type of network topology is this?
A. Bus
B. Mesh
C. Ring
D. Star
9. A is correct. Of the given choices, the only type of topology that separates
a network into two networks is the bus topology. This cable break results in
all devices on the network losing connectivity because of the two networks
has only a single terminator.
A mesh network includes multiple redundant connections so a single break
would not affect the network.
In a ring network, the devices are connected in a circle so a single break
doesn’t create two networks.
Devices connect to a central device such as a hub or a switch in a star
network and a single break does not create two networks.
10. A business owner hired you to help her create a basic network. Of the
following choices, what would you do FIRST?
A. Purchase a switch and access point supported by the ISP
B. Identify the operating systems used within the network
C. Create a list of requirements and constraints
D. Upgrade computers within the network
10. C is correct. One of the first steps when creating any network, including a
basic network, is to identify the requirements and constraints.
You should not purchase equipment until you identify what equipment is
needed.
Most network devices are operating system independent so the type of
operating systems running on the computers might not be relevant, and
certainly isn’t as important as creating a list of requirements and constraints.
The computers probably don’t need to be upgraded but if they do, you would
identify this in your list of requirements and constraints.
11. You need to network six PCs together for a basic network. The business
owner does not want these devices to access the Internet. Which of the
following items do you need? (Select TWO.)
A. Switch
B. Router
C. Firewall
D. CAT6 cables
11. A and D are correct. You would connect the devices with cables (such as
CAT6 or CAT5e cables) and a switch.
The business owner doesn’t want the devices to access the Internet so a router
or a firewall isn’t needed.
12. You are helping a business owner set up a basic network and you have
the following equipment:
2 laptops with wired and wireless NICs
2 desktop PCs with wired and wireless NICs
2 Ethernet cables
1 wireless router with three physical ports
1 cable modem
The owner wants to connect as many systems as possible to the network and
the Internet using wired connections. The owner does not have a budget for
any more equipment. How should you configure the network?
A. Connect the wireless router to the modem with a cable. Connect
two computers to the router with a cable. Connect the two other
computers to the wireless router wirelessly.
B. Connect the modem to the wireless router with a cable. Connect
two computers to the modem with a cable. Connect the two other
computers to the modem wirelessly.
C. Connect the modem to the wireless router with a cable. Connect
one computer to the modem with a cable. Connect the three other
computers to the modem wirelessly.
D. Connect the wireless router to the modem with a cable. Connect
one computer to the router with a cable. Connect the three other
computers to the wireless router wirelessly.
12. D is correct. You would connect the wireless router to the modem with a
cable. Internet access is through the modem to an Internet service provider
(ISP) in a basic network. You would then connect one of the computers to the
wireless router with the second cable and connect the remaining computers to
the wireless router using wireless connections.
If you have only one computer, you could connect it directly to the modem
but in order to share the connection, you would need to connect the
computers to the wireless router.
You only have two cables, so you only have one more cable to connect a
computer to the router with a wired connection.
13. You are helping a business owner set up small office network. Employees
have ten laptops, each with Wi-Fi capabilities. The office has a DSL line.
What equipment needs to be purchased? (Choose TWO.)
A. ISP
B. Wireless router
C. Modem
D. DSL balancer
E. Ten cables for the ten computers
13. B and C are correct. You would need to have a modem (more
specifically, a digital subscriber line (DSL) modem) to connect to the DSL
line. Additionally, you would need to have a wireless router to connect the
ten laptops to the wireless router using wireless capabilities. You would then
connect the wireless router to the DSL modem.
A small business owner does not need to purchase an Internet service
provider (ISP), but would subscribe to Internet access through an ISP.
There is no such thing as a DSL balancer.
The ten wireless laptops connect wirelessly, so cables are not needed.
14. Your organization recently purchased another company. Several
administrators have inspected the server room at the new company and raised
safety concerns. Specifically they state that the server room has a system that
can remove all oxygen from the room and threaten the lives of anyone in the
room. What is the purpose of this system?
A. ESD prevention
B. Safety of personnel
C. Temperature control
D. Fire suppression
14. Answer: D is correct. This scenario describes a fire suppression system.
15. Answer: D is correct. The Material Safety Data Sheet (MSDS) for the cleaning agent
will provide the best information, such as first aid treatment.
1. Users in the network are frequently downloading videos, which has been
slowing down overall network performance. Management wants to reduce
the effect of streaming video on the performance of the network, but not
block video streaming completely. Which of the following would
administrators implement to define how much bandwidth video streaming
traffic can consume?
A. Traffic shaping
B. Proxy server
C. Content filter
D. Load balancer
1. Answer: A is correct. Traffic shaping can limit traffic on a network based
on specific protocols or types of traffic, such as limiting the amount of audio
or video streaming. It can also limit the traffic for specific users, or based on
other needs for an organization. It is often used as part of a quality of service
(QoS) solution.
B is incorrect. A proxy server can block access to sites that stream audio and
video using content-filtering techniques. However, it can only allow or block
the traffic, not allow a certain amount of bandwidth as traffic shaping does.
C is incorrect. A content filter can allow or block traffic based on the content,
but it doesn’t include the ability to shape the traffic by allowing a limited
amount of bandwidth for any type of traffic.
D is incorrect. A load balancer can balance the load for multiple devices, but
it cannot shape the traffic.
A is incorrect. Firewalls use an implicit deny philosophy where they block all
traffic except for traffic that has been explicitly allowed. An implicit deny
philosophy does not provide content filtering.
C is incorrect. An access control list (ACL) on a firewall identifies traffic that
is allowed or blocked based on IP addresses, ports, and protocols, but cannot
be used to block traffic based on keywords.
D is incorrect. A stateful inspection firewall can block or allow traffic based
on the state of a connection, but not based on keywords. For example, if a
packet has been allowed into a network, a stateful inspection firewall will
allow the returned traffic out of the firewall.
A is incorrect. Single sign-on (SSO) allows users to log on once and be able
to access multiple resources without logging on again. It is unrelated to
logging.
B is incorrect. A Remote Authentication Dial-In User Service (RADIUS)
provides a centralized authentication service, and it isn’t used to collect logs
from network devices.
C is incorrect. RADIUS is often used as an 802.1x server, and it can prevent
users from accessing a network until they log on. 802.1x does not collect logs
from network devices.
Objective: 3.6 Explain the purpose of various network access control models.
6. While troubleshooting an issue on a user’s computer, a technician
discovers several videos that are not work related and might be illegal. What
should the technician do?
A. Contact the police.
B. Create a forensic report.
C. Escalate the event.
D. Create a chain-of-custody document.
6. Answer: C is correct. The technician should escalate the incident based on
the organization’s policies. In most cases, the technician would escalate the
incident to a manager or supervisor.
A is incorrect. It is not appropriate for the technician to contact the police
unless there is some type of threat to people. Also, the technician doesn’t
know if the videos are illegal. Management might choose to call the police
later.
B is incorrect. Forensic experts would create a forensic report after
performing a forensic investigation. However, there is no indication an
investigation has been performed.
D is incorrect. The technician should create a chain-of-custody document if
evidence was collected, but no evidence was collected in this scenario.
A is incorrect. The first step is to identify the problem and this was done by
gathering information and identifying the symptoms.
C is incorrect. Before implementing the solution, a plan of action is
established to determine any potential effects.
D is incorrect. The last step of the CompTIA troubleshooting model is
documentation.
A is incorrect. The firewall provides some protection against attacks, but the
attackers would not use it to discover MAC addresses.
C is incorrect. Technicians use multimeters to take measurements such as
voltage measurements or continuity checks.
D is incorrect. An optical time domain reflectometer (OTDR) can identify the
location of a break in a fiber-optic cable.
A is incorrect. The Physical layer (Layer 1) sends data out as bits, but this
question is using IP and MAC addresses.
B is incorrect. The Transport layer (Layer 4) uses Transmission Control
Protocol (TCP) or User Datagram Protocol (UDP) ports to identify traffic, but
the scenario doesn’t mention ports.
C is incorrect. The Data Link layer (Layer 2) uses media access control
(MAC) addresses, but the scenario doesn’t indicate any problem with the
MAC addresses.
There are others, but these are two of the most popular ones.
Q. What protocol is typically used to secure web traffic between a user and
an e-commerce web site?
A. TLS
Use these flashcards and the practice test questions to test your
readiness. If the material isn’t familiar, go back to your primary study source
(or locate another one) to clarify the information.
Q. What port does SSH use?
A. TCP port 22
I strive to ensure the books I create are error free. However, no matter how much
effort we put in, some errors always sneak in. When I learn of an error, it’s simple for me
to fix it and upload the fix to the Kindle version.