Sample
Sample
Network+ N10-008
Exam Cram
Emmett Dulaney
CHAPTER 2:
Models, Ports, Protocols, and Network Services. . . . . . . . . . . . . . . . . . . . 41
The OSI Networking Model. . . . . . . . . . . . . . . . . . . . . . . . ....... 42
The OSI Seven-Layer Model.. . . . . . . . . . . . . . . . . . . ....... 42
Physical Layer (Layer 1). . . . . . . . . . . . . . . . . . . ....... 43
Data Link Layer (Layer 2). . . . . . . . . . . . . . . . . ....... 44
Network Layer (Layer 3). . . . . . . . . . . . . . . . . . ....... 44
Transport Layer (Layer 4). . . . . . . . . . . . . . . . . . ....... 45
Session Layer (Layer 5).. . . . . . . . . . . . . . . . . . . ....... 46
Presentation Layer (Layer 6). . . . . . . . . . . . . . . . ....... 46
Application Layer (Layer 7).. . . . . . . . . . . . . . . . ....... 47
OSI Model Summary. . . . . . . . . . . . . . . . . . . . . ....... 47
Comparing OSI to the Four-Layer TCP/IP Model.. . . . ....... 48
Identifying the OSI Layers at Which Various Network
Components Operate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Data Encapsulation/Decapsulation and OSI.. . . . . . . . . . . . . . . . 49
Ports and Protocols.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Connection-Oriented Protocols Versus Connectionless
Protocols. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... 54
Internet Protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... 54
Transmission Control Protocol. . . . . . . . . . . . . . . . . . ....... 55
How TCP Works.. . . . . . . . . . . . . . . . . . . . . . . ....... 56
User Datagram Protocol. . . . . . . . . . . . . . . . . . . . . . . ....... 56
Internet Control Message Protocol.. . . . . . . . . . . . . . . ....... 57
IPSec. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... 57
Generic Routing Encapsulation. . . . . . . . . . . . . . . . . . ....... 58
File Transfer Protocol. . . . . . . . . . . . . . . . . . . . . . . . . ....... 58
Secure Shell.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... 60
Secure File Transfer Protocol.. . . . . . . . . . . . . . . . . . . ....... 61
Telnet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... 61
Simple Mail Transfer Protocol. . . . . . . . . . . . . . . . . . . ....... 62
Domain Name System (DNS). . . . . . . . . . . . . . . . . . . ....... 62
Dynamic Host Configuration Protocol (DHCP). . . . . . ....... 62
Trivial File Transfer Protocol. . . . . . . . . . . . . . . . . . . . ....... 63
Hypertext Transfer Protocol. . . . . . . . . . . . . . . . . . . . ....... 64
CHAPTER 3:
Addressing, Routing, and Switching. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
IP Addressing.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
IPv4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
IP Address Classes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
CHAPTER 4:
Network Implementations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Common Networking Devices. . . . . . ........................ 152
Firewall.. . . . . . . . . . . . . . . . . ........................ 153
IDS/IPS. . . . . . . . . . . . . . . . . ........................ 154
Router. . . . . . . . . . . . . . . . . . ........................ 155
Switch. . . . . . . . . . . . . . . . . . ........................ 157
Hub and Switch Cabling.. ........................ 158
Multilayer Switch. . . . . . . . . . . ........................ 159
Hub. . . . . . . . . . . . . . . . . . . . ........................ 160
CHAPTER 5:
Cabling Solutions and Issues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
General Media Considerations. . . . . . . . . . . . . . . . . ............. 184
Broadband Versus Baseband Transmissions. . . . ............. 185
Simplex, Half-Duplex, and Full-Duplex Modes. ............. 185
Data Transmission Rates. . . . . . . . . . . . . . . . . ............. 186
Types of Network Media.. . . . . . . . . . . . . . . . ............. 186
Twisted-Pair Cabling (Copper). . . . . . . . ............. 187
Coaxial Cables.. . . . . . . . . . . . . . . . . . . ............. 190
CHAPTER 6:
Wireless Solutions and Issues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
Understanding Wireless Basics. . . . . . . . . . . . . . . . . . . . . . . . ...... 236
Wireless Channels and Frequencies. . . . . . . . . . . . . . . . ...... 236
Cellular Technology Access. . . . . . . . . . . . . . . . . . . . . . ...... 241
Speed, Distance, and Bandwidth.. . . . . . . . . . . . . . . . . . ...... 241
Channel Bonding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...... 242
MIMO/MU-MIMO/Directional/Omnidirectional. . . . . . ...... 243
Antenna Ratings. . . . . . . . . . . . . . . . . . . . . . . . . ...... 244
Antenna Coverage. . . . . . . . . . . . . . . . . . . . . . . . ...... 244
Establishing Communications Between Wireless Devices. ...... 246
Configuring the Wireless Connection. . . . . . . . . . . . . . . ...... 248
Troubleshooting Wireless Issues. . . . . . . . . . . . . . . . . . . . . . . ...... 257
Site Surveys. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...... 262
Factors Affecting Wireless Signals. . . . . . . . . . . . . . . . . ...... 262
CHAPTER 7:
Cloud Computing Concepts and Options. . . . . . . . . . . . . . . . . . . . . . . . . 269
Cloud Concepts. . . . . . . . . . . . . . . . . . . . .................... 270
Service Models.. . . . . . . . . . . . . . . . .................... 271
Software as a Service.. . . . . . . . . . . . .................... 271
Platform as a Service.. . . . . . . . . . . . .................... 272
Infrastructure as a Service. . . . . . . . . .................... 273
Desktop as a Service. . . . . . . . . . . . . .................... 274
Deployment Models. . . . . . . . . . . . . .................... 275
Private Cloud. . . . . . . . . . . . . . . . . .................... 275
Public Cloud. . . . . . . . . . . . . . . . . . .................... 275
Hybrid and Community Clouds. . . . . .................... 276
Infrastructure as Code.. . . . . . . . . . . .................... 276
Connectivity Options. . . . . . . . . . . . .................... 277
Multitenancy. . . . . . . . . . . . . . . . . . .................... 278
Elasticity. . . . . . . . . . . . . . . . . . . . . .................... 278
Scalability. . . . . . . . . . . . . . . . . . . . .................... 278
Security Implications. . . . . . . . . . . . .................... 278
The Relationship Between Resources. .................... 279
What’s Next?. . . . . . . . . . . . . . . . . . . . . . .................... 281
CHAPTER 8:
Network Operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Organizational Documents and Policies.. . . . . . . . . . . . . . . ........ 284
Wiring and Port Locations. . . . . . . . . . . . . . . . . . . . ........ 287
Troubleshooting Using Wiring Schematics. . . . . ........ 289
Physical and Logical Network Diagrams. . . . . . . . . . . ........ 290
Baseline Configurations. . . . . . . . . . . . . . . . . . . . . . ........ 293
Policies, Procedures, Configurations, and Regulations. . ........ 295
Policies.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . ........ 295
Password-Related Policies. . . . . . . . . . . . . . . . . ........ 298
Procedures. . . . . . . . . . . . . . . . . . . . . . . . . . . ........ 301
Change Management Documentation.. . . . . . . . ........ 302
Configuration Documentation.. . . . . . . . . . . . . ........ 303
Regulations. . . . . . . . . . . . . . . . . . . . . . . . . . . ........ 303
CHAPTER 9:
Network Security.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Common Security Concepts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
Access Control.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
Mandatory Access Control.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
CHAPTER 10:
Network Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Troubleshooting Steps and Procedures. . . . . . . . . . . . . . . . ........ 404
Identify the Problem.. . . . . . . . . . . . . . . . . . . . . . . . ........ 405
Identify Symptoms. . . . . . . . . . . . . . . . . . . . . . ........ 406
Determine Whether Anything Has Changed. . . . ........ 406
Duplicate the Problem if Possible. . . . . . . . . . . ........ 407
Approach Multiple Problems Individually. . . . . . ........ 407
Establish a Theory of Probable Cause. . . . . . . . . . . . . ........ 407
Test the Theory to Determine the Cause.. . . . . . . . . . ........ 408
Establish a Plan of Action. . . . . . . . . . . . . . . . . . . . . ........ 408
Implement the Solution or Escalate. . . . . . . . . . . . . . ........ 409
Determine Whether Escalation Is Necessary. . . . ........ 409
Verify Full System Functionality. . . . . . . . . . . . . . . . ........ 410
Document Findings, Actions, Outcomes, and Lessons. . ........ 411
Software Troubleshooting Tools. . . . . . . . . . . . . . . . . . . . . ........ 414
Wi-Fi Analyzer. . . . . . . . . . . . . . . . . . . . . . . . . . . . ........ 415
Protocol Analyzer.. . . . . . . . . . . . . . . . . . . . . . . . . . ........ 415
Bandwidth Speed Tester. . . . . . . . . . . . . . . . . . . . . . ........ 416
Port Scanner. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ........ 416
iperf. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ........ 418
NetFlow Analyzer. . . . . . . . . . . . . . . . . . . . . . . . . . ........ 419
TFTP Server.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . ........ 419
Terminal Emulator. . . . . . . . . . . . . . . . . . . . . . . . . . ........ 419
IP Scanner. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ........ 419
Command-Line Tools. . . . . . . . . . . . . . . . . . . . . . . . ........ 420
The Trace Route Utility (tracert/traceroute). . . . . . . . ........ 421
ping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ........ 425
The Destination Host Unreachable Message. . . . ........ 426
The Request Timed Out Message. . . . . . . . . . . ........ 426
The Unknown Host Message. . . . . . . . . . . . . . ........ 427
The Expired TTL Message. . . . . . . . . . . . . . . . ........ 428
Troubleshooting with ping. . . . . . . . . . . . . . . . ........ 428
hostname. . . . . . . . . . . . . . . . . . . . . . . . . . . . ........ 430
ARP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ........ 430
arp ping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . ........ 431
The netstat Command. . . . . . . . . . . . . . . . . . . . . . . ........ 432
netstat -e.. . . . . . . . . . . . . . . . . . . . . . . . . . . . ........ 434
netstat -a.. . . . . . . . . . . . . . . . . . . . . . . . . . . . ........ 434
Glossary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
Acknowledgments
Thanks are due to Eleanor (Ellie) Bru for working on this title once more and
making it as strong as it can be. An enormous amount of credit for this book
goes to Chris Crayton, without whom this edition would be only a shadow of
what it is. It was an honor to work with him again, and I owe him enormous
gratitude. Thanks continue to be due to Mike Harwood, who wrote the first
few editions, and to the team of talented individuals at Pearson who work
behind the scenes and make each title the best it can be.
▶▶ Mailing address, which identifies the address to which you want your
certificate mailed.
▶▶ Exam number and title.
▶▶ Email address for contact purposes. This often is the fastest and most
effective means to contact you. Test vendors require it for registration.
▶▶ Credit card information so that you can pay online. You can redeem
vouchers by calling the respective testing center.
Most of the questions on the Network+ exam require you to choose a single
correct answer, but a few require multiple answers. When there are multiple
correct answers, a message at the bottom of the screen prompts you to “Choose
all that apply.” Be sure to read these messages.
Good luck!
Companion Website
Register this book to get access to the Pearson Test Prep practice test software
and other study materials plus additional bonus content. Check this site regu-
larly for new and updated postings written by the author that provide further
insight into the more troublesome topics on the exams. Be sure to check the
box that you would like to hear from us to receive updates and exclusive
discounts on future editions of this product or related products.
To access this companion website, follow these steps:
1. Go to www.pearsonITcertification.com/register and log in or create a new
account.
2. Enter the ISBN: 9780137375769.
4. Click the Access Bonus Content link in the Registered Products section
of your account page, to be taken to the page where your downloadable
content is available.
Please note that many of our companion content files can be very large,
especially image and video files.
If you are unable to locate the files for this title by following these steps, please
visit www.pearsonITcertification.com/contact and select the Site Problems/
Comments option. Our customer service representatives will assist you.
Note
The cardboard sleeve in the back of this book includes a piece of paper. The paper
lists the activation code for the practice exams associated with this book. Do not
lose the activation code. On the opposite side of the paper from the activation code
is a unique, one-time-use coupon code for the purchase of the Premium Edition
eBook and Practice Test.
3. Enter your email/password for your account. If you don’t have an account
on PearsonITCertification.com, you will need to establish one by going
to PearsonITCertification.com/join.
5. Enter the access code printed on the insert card in the back of your book
to activate your product.
6. The product will now be listed in your My Products page. Click the
Exams button to launch the exam settings screen and start your exam.
4. Click the Access Bonus Content link under the product listing.
5. Click the Install Pearson Test Prep Desktop Version link under the
Practice Exams section of the page to download the software.
6. After the software downloads, unzip all the files on your computer.
7. Double-click the application file to start the installation, and follow the
onscreen instructions to complete the registration.
8. When the installation is complete, launch the application and select the
Activate Exam button on the My Products tab.
9. Click the Activate a Product button in the Activate Product Wizard.
10. Enter the unique access code found on the card in the sleeve in the back
of your book, and click the Activate button.
11. Click Next and then Finish to download the exam data to your
application.
12. You can now start using the practice exams by selecting the product and
clicking the Open Exam button to open the exam settings screen.
Note that the offline and online versions will sync together, so saved exams and
grade results recorded on one version will be available to you on the other as well.
Study Mode enables you to fully customize your exams and review answers as
you are taking the exam. This is typically the mode you would use first to assess
your knowledge and identify information gaps. Practice Exam Mode locks cer-
tain customization options because it is presenting a realistic exam experience.
Use this mode when you are preparing to test your exam readiness. Flash Card
Mode strips out the answers and presents you with only the question stem. This
mode is great for late-stage preparation when you really want to challenge your-
self to provide answers without the benefit of seeing multiple-choice options.
This mode will not provide the detailed score reports that the other two modes
will, so it should not be used if you are trying to identify knowledge gaps.
In addition to these three modes, you will be able to select the source of your
questions. You can choose to take exams that cover all the chapters, or you can
narrow your selection to a single chapter or the chapters that make up specific
parts in the book. All chapters are selected by default. If you want to narrow
your focus to individual chapters, first deselect all the chapters; then select only
those on which you want to focus in the Objectives area.
You can also select the exam banks on which to focus. Each exam bank comes
complete with a full exam of questions that cover topics in every chapter. The
two exams printed in the book are available to you as well as two additional
exams of unique questions. You can have the test engine serve up exams from
all four banks or just from one individual bank by selecting the desired banks in
the exam bank area.
You can make several other customizations to your exam from the exam set-
tings screen, such as the time of the exam, the number of questions, whether
to randomize questions and answers, whether to show the number of correct
answers for multiple answer questions, or whether to serve up only specific
types of questions. You can also create custom test banks by selecting only
questions that you have marked or questions on which you have added notes.
All but the most basic of networks require devices to provide connectivity
and functionality. Understanding how these networking devices operate and
identifying the functions they perform are essential skills for any network
administrator and are requirements for a Network+ candidate.
This chapter introduces commonly used networking devices, and that
is followed by a discussion of basic corporate and datacenter network
architecture later in the chapter. You are not likely to encounter all the devices
mentioned in this chapter on the exam, but you can expect to work with at
least some of them.
CramSaver
If you can correctly answer these questions before going through this section,
save time by skimming the Exam Alerts in this section and then completing the
Cram Quiz at the end of the section.
1. What is the difference between an active and a passive hub?
2. What is the major difference between a hub and a switch?
3. What are the types of ports found on hubs and switches?
4. What can distribute incoming data to specific application servers and help
distribute the load?
5. True or false: A multilayer switch operates as both a router and a switch.
6. Your company is looking to add a hardware device to the network that can
increase redundancy and data availability as it increases performance by
distributing the workload. What use case might this sample technology
apply to?
Answers
1. Hubs can be either active or passive. Hubs are considered active when
they regenerate a signal before forwarding it to all the ports on the device.
2. Rather than forwarding data to all the connected ports, a switch forwards
data only to the port on which the destination system is connected.
3. Hubs and switches have two types of ports: medium-dependent interface
(MDI) and medium-dependent interface crossed (MDI-X).
4. A content switch can distribute incoming data to specific application
servers and help distribute the load.
5. True. A multilayer switch operates as both a router and a switch.
6. A load balancer can be either a software or hardware component, and it
increases redundancy and data availability as it increases performance by
distributing the workload.
The best way to think about this chapter is as a catalog of networking devices.
The first half looks at devices that you can commonly find in a network of any
substantial size. The devices are discussed in objective order to simplify study
and include everything from simple access points to VPN concentrators.
ExamAlert
Remember this objective begins with “Compare and contrast various devices.” This
means that you need to be able to distinguish one networking or networked device
from another and know its appropriate placement on the network. What does it do?
Where does it belong?
Firewall
A firewall is a networking device, either hardware or software based, that
controls access to your organization’s network. This controlled access is
designed to protect data and resources from an outside threat. To provide this
protection, firewalls typically are placed at a network’s entry/exit points—for
example, between an internal network and the Internet. After it is in place, a
firewall can control access into and out of that point.
Although firewalls typically protect internal networks from public networks,
they are also used to control access between specific network segments within
a network. An example is placing a firewall between the Accounts and Sales
departments.
As mentioned, firewalls can be implemented through software or through
a dedicated hardware device. Organizations implement software firewalls
through network operating systems (NOSs) such as Linux/UNIX, Windows
servers, and macOS servers. The firewall is configured on the server to allow
or block certain types of network traffic. In small offices and for regular home
use, a firewall is commonly installed on the local system and is configured to
control traffic. Many third-party firewalls are available.
Hardware firewalls are used in networks of all sizes today. Hardware
firewalls are often dedicated network devices that can be implemented
with little configuration. They protect all systems behind the firewall from
outside sources. Hardware firewalls are readily available and often are
combined with other devices today. For example, many broadband routers
and wireless access points have firewall functionality built in. In such a case,
the router or AP might have a number of ports available to plug systems
into. Figure 4.1 shows Windows Defender Firewall and the configured
inbound and outbound rules.
ExamAlert
Remember that a firewall uses inbound and outbound rules and can protect internal
networks from public networks and control access between specific network
segments.
IDS/IPS
An intrusion detection system (IDS) is a passive detection system. The IDS can
detect the presence of an attack and then log that information. It also can alert
an administrator to the potential threat. The administrator then analyzes the
situation and takes corrective measures if needed.
A variation on the IDS is the intrusion prevention system (IPS), which is an active
detection system. With IPS, the device continually scans the network, looking
for inappropriate activity. It can shut down any potential threats. The IPS looks
for any known signatures of common attacks and automatically tries to prevent
those attacks. An IPS is considered an active/reactive security measure because
it actively monitors and can take steps to correct a potential security threat.
ExamAlert
An intrusion detection system (IDS) can detect malicious activity and send alerting
messages, but it does not prevent attacks. An intrusion prevention system (IPS)
protects hosts and prevents against malicious attacks from the network layer up
through the application layer.
Router
In a common configuration, routers create larger networks by joining two
network segments. A small office/home office (SOHO) router connects a user to
the Internet. A SOHO router typically serves 1 to 10 users on the system. A
router can be a dedicated hardware device or a computer system with more
than one network interface and the appropriate routing software. All modern
network operating systems include the functionality to act as a router.
Note
Routers normally create, add, or divide networks or network segments at the
network layer of the OSI reference model because they normally are IP-based
devices. Chapter 2, “Models, Ports, Protocols, and Network Services,” covers the
OSI reference model in greater detail.
A router derives its name from the fact that it can route data it receives from
one network to another. When a router receives a packet of data, it reads the
packet’s header to determine the destination address. After the router has
determined the address, it looks in its routing table to determine whether it
knows how to reach the destination; if it does, it forwards the packet to the next
hop on the route. The next hop might be the final destination, or it might be
another router. Figure 4.2 shows, in basic terms, how a router works.
Note
You can find more information on network routing in Chapter 3, “Addressing, Routing,
and Switching.”
Workstation
Workstation
1 Workstation
Server
Workstation
Workstation
Router Router
2
Switch
Like hubs, switches are the connectivity points of an Ethernet network. Devices
connect to switches via twisted-pair cabling, one cable for each device. The
difference between hubs and switches is in how the devices deal with the data
they receive. Whereas a hub forwards the data it receives to all the ports on the
device, a switch forwards it to only the port that connects to the destination
device. It does this by the MAC address of the devices attached to it and then
by matching the destination MAC address in the data it receives. Figure 4.3
shows how a switch works. In this case, it has learned the MAC addresses of
the devices attached to it; when the workstation sends a message intended
for another workstation, it forwards the message on and ignores all the other
workstations.
Switch Da
ta i
s
onl forwa
by des y to rde
t a sent tina t
tion he
d
D a e
nod nod
one e
By forwarding data to only the connection that should receive it, the switch
can greatly improve network performance. By creating a direct path between
two devices and controlling their communication, the switch can greatly
reduce the traffic on the network and therefore the number of collisions. As
you might recall, collisions occur on Ethernet networks when two devices
attempt to transmit at the same time. In addition, the lack of collisions
enables switches to communicate with devices in full-duplex mode. In a full-
duplex configuration, devices can send data to and receive data from the
switch at the same time. Contrast this with half-duplex communication, in
which communication can occur in only one direction at a time. Full-duplex
transmission speeds are double that of a standard half-duplex connection. So,
a 100 Mbps connection becomes 200 Mbps, and a 1000 Mbps connection
becomes 2000 Mbps, and so on.
The net result of these measures is that switches can offer significant
performance improvements over hub-based networks, particularly when
network use is high.
by using a cable between two MDI-X ports. The crossover cable uncrosses
the internal crossing. Auto MDI-X ports on more modern network device
interfaces can detect whether the connection would require a crossover, and
automatically choose the MDI or MDI-X configuration to properly match the
other end of the link.
ExamAlert
In a crossover cable, wires 1 and 3 and wires 2 and 6 are crossed.
A switch can work at either Layer 2 (the data link layer) or Layer 3 (the
network layer) of the OSI model. When it filters traffic based on the MAC
address, it is called a Layer 2 switch since MAC addresses exist at Layer 2 of the
OSI model (if it operated only with IP traffic, it would be a Layer 3 switch).
Multilayer Switch
It used to be that networking devices and the functions they performed were
separate. Bridges, routers, hubs, and more existed but were separate devices.
Over time, the functions of some individual network devices became integrated
into a single device. This is true of multilayer switches.
A multilayer switch is one that can operate at both Layer 2 and Layer 3 of
the OSI model, which means that the multilayer device can operate as both a
switch and a router (by operating at more than one layer, it is living up to the
name of being “multilayer”). Also called a Layer 3 switch, the multilayer switch
is a high-performance device that supports the same routing protocols that
routers do. It is a regular switch directing traffic within the LAN; in addition, it
can forward packets between subnets.
ExamAlert
A multilayer switch operates as both a router (Layer 3 capable device) and a switch
(Layer 2 switch).
Content servers can help with load balancing because they can distribute
requests across servers and target data to only the servers that need it, or dis-
tribute data between application servers. For example, if multiple mail serv-
ers are used, the content switch can distribute requests between the servers,
thereby sharing the load evenly. This is why the content switch is sometimes
called a load-balancing switch.
ExamAlert
A content switch can distribute incoming data to specific application servers and
help distribute the load.
Hub
At the bottom of the networking devices food chain, so to speak, are hubs.
Hubs are used in networks that use Ethernet twisted-pair cabling to connect
devices. Hubs also can be joined to create larger networks. Hubs are simple
devices that direct data packets to all devices connected to the hub, regardless
of whether the data package is destined for the device. This makes them inef-
ficient devices and can create a performance bottleneck on busy networks.
In its most basic form, a hub does nothing except provide a pathway for the
electrical signals to travel along. Such a device is called a passive hub. Far more
common nowadays is an active hub, which, as well as providing a path for the
data signals, regenerates the signal before it forwards it to all the connected
devices. In addition, an active hub can buffer data before forwarding it. How-
ever, a hub does not perform any processing on the data it forwards, nor does it
perform any error checking.
Hubs come in a variety of shapes and sizes. Small hubs with five or eight con-
nection ports are commonly called workgroup hubs. Others can accommodate
larger numbers of devices (normally up to 32). These are called high-density
devices.
ExamAlert
Because hubs don’t perform any processing, they do little except enable communi-
cation between connected devices. For today’s high-demand network applications,
something with a little more intelligence is required. That’s where switches come in.
A basic hub works at Layer 1 (the physical layer) of the OSI model.
Bridge
A bridge, as the name implies, connects two networks. Bridging is done at the
first two layers (physical and data link layer) of the OSI model and differs from
routing in its simplicity. With routing, a packet is sent to where it is intended
to go, whereas with bridging, it is sent away from this network. In other words,
if a packet does not belong on this network, it is sent across the bridge with the
assumption that it belongs there rather than here.
If one or more segments of the bridged network are wireless, the device is
known as a wireless bridge.
Access Point
The term access point (AP) can technically be used for either a wired or wireless
connection, but in reality it is almost always associated only with a wireless-
enabling device. A wireless access point (WAP) is a transmitter and receiver
(transceiver) device used to create a wireless LAN (WLAN). WAPs typically
are separate network devices with a built-in antenna, transmitter, and adapter.
WAPs use the wireless infrastructure network mode to provide a connection
point between WLANs and a wired Ethernet LAN. WAPs also usually have
several ports, giving you a way to expand the network to support additional
clients.
Depending on the size of the network, one or more WAPs might be
required. Additional WAPs are used to allow access to more wireless clients
and to expand the range of the wireless network. Each WAP is limited by a
transmission range—the distance a client can be from a WAP and still obtain
a usable signal. The actual distance depends on the wireless standard used and
the obstructions and environmental conditions between the client and the
WAP.
ExamAlert
An AP or WAP can operate as a bridge connecting a standard wired network to
wireless devices or as a router passing data transmissions from one access point to
another.
Saying that a WAP is used to extend a wired LAN to wireless clients does not
give you the complete picture. A wireless AP today can provide different services
in addition to just an access point. Today, the APs might provide many ports
that can be used to easily increase the network’s size. Systems can be added to
and removed from the network with no effect on other systems on the network.
Also, many APs provide firewall capabilities and Dynamic Host Configuration
Protocol (DHCP) service. When they are hooked up, they give client systems a
private IP address and then prevent Internet traffic from accessing those sys-
tems. So, in effect, the AP is a switch, DHCP server, router, and firewall.
APs come in all shapes and sizes. Many are cheaper and are designed strictly
for home or small office use. Such APs have low-powered antennas and limited
expansion ports. Higher-end APs used for commercial purposes have high-
powered antennas, enabling them to extend how far the wireless signal can
travel.
Note
APs are used to create a wireless LAN and to extend a wired network. APs are used
in the infrastructure wireless topology.
Media Converter
When you have two dissimilar types of network media, a media converter is
used to allow them to connect. They are sometimes referred to as couplers.
Depending on the conversion being done, the converter can be a small device,
barely larger than the connectors themselves, or a large device within a sizable
chassis.
Reasons for not using the same media throughout the network, and thus rea-
sons for needing a converter, can range from cost (gradually moving from coax
to fiber), disparate segments (connecting the office to the factory), or the need
to run particular media in a setting (the need for fiber to reduce EMI problems
in a small part of the building).
Figure 4.5 shows an example of a media converter. The one shown converts
between 10/100/1000TX and 1000LX (with an SC-type connector).
The following converters are commonly implemented and are ones that
CompTIA has previously included on the Network+ exam.
ExamAlert
Make sure you know that the possibilities listed here exist:
▶▶ Single mode fiber to Ethernet
▶▶ Single mode to multimode fiber
▶▶ Multimode fiber to Ethernet
▶▶ Fiber to coaxial
Voice Gateway
When telephone technology is married with information technology, the result
is called telephony. There has been a massive move from landlines to voice
over IP (VoIP) for companies to save money. One of the biggest issues with the
administration of this is security. When both data and VoIP are on the same
line, they are both vulnerable in the case of an attack. Standard telephone
systems should be replaced with a securable PBX.
A VoIP gateway, also sometimes called a PBX gateway, can be used to convert
between the legacy telephony connection and a VoIP connection using Session
Initiation Protocol (SIP). This is referred to as a “digital gateway” because the
voice media are converted in the process.
ExamAlert
Be sure that you know that by having both data and VoIP on the same line, they are
both vulnerable in the case of an attack.
Repeater
A repeater (also called a booster or wireless range extender) can amplify a wire-
less signal to make it stronger. This increases the distance that the client system
can be placed from the access point and still be on the network. The extender
needs to be set to the same channel as the AP for the repeater to take the trans-
mission and repeat it. This is an effective strategy to increase wireless transmis-
sion distances.
ExamAlert
Carefully read troubleshooting question scenarios to be sure the transmission from
the AP is getting to the repeater first, and then the repeater is duplicating the signal
and passing it on.
Load Balancer
Network servers are the workhorses of the network. They are relied on to
hold and distribute data, maintain backups, secure network communications,
and more. The load of servers is often a lot for a single server to maintain.
This is where load balancing comes into play. Load balancing is a technique in
which the workload is distributed among several servers. This feature can take
networks to the next level; it increases network performance, reliability, and
availability.
ExamAlert
Remember that load balancing increases redundancy and therefore data availability.
Also, load balancing increases performance by distributing the workload.
Note
Multilayer switches and DNS servers can serve as load balancers.
Proxy Server
Proxy servers typically are part of a firewall system. They have become so
integrated with firewalls that the distinction between the two can sometimes
be lost.
However, proxy servers perform a unique role in the network environment—
a role that is separate from that of a firewall. For the purposes of this book, a
proxy server is defined as a server that sits between a client computer and the
Internet and looks at the web page requests the client sends. For example, if
a client computer wants to access a web page, the request is sent to the proxy
server rather than directly to the Internet. The proxy server first determines
whether the request is intended for the Internet or for a web server locally. If
the request is intended for the Internet, the proxy server sends the request as if
it originated the request. When the Internet web server returns the information,
the proxy server returns the information to the client. Although a delay might
be induced by the extra step of going through the proxy server, the process
is largely transparent to the client that originated the request. Because each
request a client sends to the Internet is channeled through the proxy server, the
proxy server can provide certain functionality over and above just forwarding
requests.
One of the most notable extra features is that proxy servers can greatly improve
network performance through a process called caching. When a caching proxy
server answers a request for a web page, the server makes a copy of all or part of
that page in its cache. Then, when the page is requested again, the proxy server
answers the request from the cache rather than going back to the Internet. For
example, if a client on a network requests the web page www.comptia.org, the
proxy server can cache the contents of that web page. When a second client
computer on the network attempts to access the same site, that client can grab
it from the proxy server cache, and accessing the Internet is unnecessary. This
greatly increases the response time to the client and can significantly reduce the
bandwidth needed to fulfill client requests.
Nowadays, speed is everything, and the capability to quickly access information
from the Internet is a crucial concern for some organizations. Proxy servers and
their capability to cache web content accommodate this need for speed.
An example of this speed might be found in a classroom. If a teacher asks 30
students to access a specific Uniform Resource Locator (URL) without a proxy
server, all 30 requests would be sent into cyberspace and subjected to delays or
other issues that could arise. The classroom scene with a proxy server is quite
different. Only one request of the 30 finds its way to the Internet; the other
29 are filled by the proxy server’s cache. Web page retrieval can be almost
instantaneous.
However, this caching has a potential drawback. When you log on to the
Internet, you get the latest information, but this is not always so when
information is retrieved from a cache. For some web pages, it is necessary to go
directly to the Internet to ensure that the information is up to date. Some proxy
servers can update and renew web pages, but they are always one step behind.
The second key feature of proxy servers is allowing network administrators to
filter client requests. If a server administrator wants to block access to certain
websites, a proxy server enables this control, making it easy to completely
disallow access to some websites. This is okay, but what if it were necessary
to block numerous websites? In this case, maintaining proxy servers gets a bit
more complicated.
Determining which websites users can or cannot access is usually done through
something called an access control list (ACL). Chapter 3 discussed how an ACL
can be used to provide rules for which port numbers or IP addresses are
allowed access. An ACL can also be a list of allowed or nonallowed websites; as
you might imagine, compiling such a list can be a monumental task. Given that
millions of websites exist, and new ones are created daily, how can you target
and disallow access to the “questionable” ones? One approach is to reverse the
situation and deny access to all pages except those that appear in an “allowed”
list. This approach has high administrative overhead and can greatly limit the
productive benefits available from Internet access.
Understandably, it is impossible to maintain a list that contains the locations
of all sites with questionable content. In fairness, that is not what proxy servers
were designed to do. However, by maintaining a list, proxy servers can better
provide a greater level of control than an open system. Along the way, proxy
servers can make the retrieval of web pages far more efficient.
A reverse proxy server is one that resides near the web servers and responds to
requests. These are often used for load-balancing purposes because each proxy
can cache information from a number of servers.
Networked Devices
One of the fastest areas of growth in networking isn’t necessarily in adding
more users, but in adding more devices. Each “smart” device has the ability to
monitor or perform some task and report the status of the data it has collected,
or itself, back. Most of these devices require IP addresses and function like nor-
mal nodes, but some network only through Bluetooth or NFC. Table 4.1 lists
some of the devices commonly being added to the network today.
ExamAlert
You will be expected to know the devices mentioned in this chapter. Review Table 4.1,
and make sure that you understand each device and how and why it is used on the
network.
Cram Quiz
1. Users are complaining that the network’s performance is unsatisfactory. It takes
a long time to pull files from the server, and, under heavy loads, workstations
can become disconnected from the server. The network is heavily used, and
a new videoconferencing application is about to be installed. The network is a
1000BASE-T system created with Ethernet hubs. Which device are you most likely
to install to alleviate the performance problems?
❍❍ A. Switch
❍❍ B. Router
❍❍ C. Media converter
❍❍ D. Firewall
2. Which of the following devices forwards data packets to all connected ports?
❍❍ A. Router
❍❍ B. Switch
❍❍ C. Content filter
❍❍ D. Hub
3. Which of the following devices passes data based on the MAC address?
❍❍ A. Hub
❍❍ B. Switch
❍❍ C. MSAU
❍❍ D. Router
5. Which of the following is the best answer for a device that continually scans the
network, looking for inappropriate activity?
❍❍ A. IPS
❍❍ B. NGFW
❍❍ C. VCPN
❍❍ D. AAA
Networking Architecture
▶▶ Explain basic corporate and datacenter network architecture.
CramSaver
If you can correctly answer these questions before going through this section,
save time by skimming the Exam Alerts in this section and then complete the
Cram Quiz at the end of the section.
1. What is the term for the network architecture design in which servers,
appliances, and other switches located within the same rack are connected
to an in-rack network switch?
2. True or false: Traffic flows entering and leaving a datacenter are known as
East-West traffic.
3. True or false: In the three-tiered architecture, the access/edge layer ensures
data is delivered to edge/end devices.
Answers
1. This is known as top-of-rack (ToR) switching.
2. False. Traffic flows entering and leaving a datacenter are known as North-
South traffic.
3. True. The access/edge layer is the place where switches connect to and
ensure data is delivered to edge/end devices.
The networking devices discussed previously in this chapter are used to build
networks. For this particular objective, CompTIA wants you to be aware
of some of the architecture and design elements of the network. Whether
you’re putting together a datacenter or a corporate office, planning should be
involved, and no network should be allowed to haphazardly sprout without
management and oversight.
Three-Tiered Architecture
To improve system performance, as well as to improve security, it is possible to
implement a tiered systems model. This is often referred to as an n-tiered model
because the n- can be one of several different numbers.
If we were looking at database, for example, with a one-tier model, or single-
tier environment, the database and the application exist on a single system. This
is common on desktop systems running a standalone database. Early UNIX
Core Layer
The core layer is the backbone: the place where switching and routing meet
(switching ends, routing begins). It provides high-speed, highly redundant
forwarding services to move packets between distribution-layer devices in
different regions of the network. The core switches and routers would be the
most powerful in the enterprise (in terms of their raw forwarding power,) and
would be used to manage the highest-speed connections (such as 100 Gigabit
Ethernet). Core switches also incorporate internal firewall capability as part of
their features, helping with segmentation and control of traffic moving from
one part of the network to another.
Distribution/Aggregation Layer
The distribution layer, or aggregation layer (sometimes called the workgroup
layer), is the layer in which management takes place. This is the place
where QoS policies are managed, filtering is done, and routing takes place.
Distribution layer devices can be used to manage individual branch-office
WAN connections, and this is considered to be smart (usually offering a larger
feature set than switches used at the access/edge layer). Lower latency and
larger MAC address table sizes are important features for switches used at
this level because they aggregate traffic from thousands of users rather than
hundreds (as access/edge switches do).
Access/Edge Layer
Switches that allow end users and servers to connect to the enterprise are called
access switches or edge switches, and the layer where they operate in the three-
tiered model is known as the access layer, or edge layer. Devices at this layer may
or may not provide Layer 3 switching services; the traditional focus is on mini-
mizing the cost of each provisioned Ethernet port (known as “cost-per-port”)
and providing high port density. Because the focus is on connecting client nodes,
such as workstations to the network, this is sometimes called the desktop layer.
ExamAlert
Remember: The core layer is the backbone of the network (where the fastest routers
and switches operate to manage separate networks), whereas the distribution/
aggregation layer (between the access/edge and core layers) is the “boundary” layer
where ACLs and Layer 3 switches operate to properly manage data between VLANs
and subnetworks. The access/edge layer is the place where switches connect to
and ensure data is delivered to edge/end devices, such as computers and servers.
Software-Defined Networking
Software-defined networking (SDN) is a dynamic approach to computer
networking intended to allow administrators to get around the static limitations
of physical architecture associated with traditional networks. They can do so
through the implementation of technologies such as the Cisco Systems Open
Network Environment.
The goal of SDN is not only to add dynamic capabilities to the network but
also to reduce IT costs through implementation of cloud architectures. SDN
combines network and application services into centralized platforms that can
automate provisioning and configuration of the entire infrastructure.
The SDN architecture, from the top down, consists of the application layer,
control layer, and infrastructure layer. CompTIA also adds the management
plane as an objective, and a discussion of each of these components follows.
Application Layer
The application layer is the top of the SDN stack, and this is where load
balancers, firewalls, intrusion detection, and other standard network
applications are located. While a standard (non-SDN) network would use a
specialized appliance for each of these functions, with an SDN network, an
application is used in place of a physical appliance.
Control Layer
The control layer is the place where the SDN controller resides; the controller
is software that manages policies and the flow of traffic throughout the network.
This controller can be thought of as the brains behind SDN, making it all
possible. Applications communicate with the controller through a northbound
interface, and the controller communicates with switching using southbound
interfaces.
Infrastructure Layer
The physical switch devices themselves reside at the infrastructure layer. This is
also known as the control plane when breaking the architecture into “planes”
because this is the component that defines the traffic routing and network
topology.
Management Plane
With SDN, the management plane allows administrators to see their devices
and traffic flows and react as needed to manage data plane behavior. This can
be done automatically through configuration apps that can, for example, add
more bandwidth if it looks as if edge components are getting congested. The
management plane manages and monitors processes across all layers of the
network stack.
ExamAlert
A major benefit of SDN is that it replaces traditional dedicated hardware/services
with virtual.
Because of the design of this model, no matter which leaf switch is connected
to a server, the traffic always has to cross the same number of devices to get to
another server. This keeps latency at a steady level.
When top-of-rack (ToR) switching is incorporated into the network architecture,
switches located within the same rack are connected to an in-rack network
switch, which is connected to aggregation switches (usually via fiber cabling).
The big advantage of this setup is that the switches within each rack can be
connected with cheaper copper cabling and the cables to each rack are all that
need be fiber.
ExamAlert
Remember that in a spine and leaf model the spine is the backbone of the network
and is responsible for interconnecting all the leaf switches in a full-mesh topology.
Traffic Flows
Traffic flows within a datacenter typically occur within the framework of one
of two models: East-West or North-South. The names may not be the most
intuitive, but the East-West traffic model means that data is flowing among
devices within a specific datacenter while North-South means that data is
flowing into the datacenter (from a system physically outside the datacenter) or
out of it (to a system physically outside the datacenter).
The naming convention comes from the way diagrams are drawn: data staying
within the datacenter is traditionally drawn on the same horizontal line (East-
to-West), while data leaving or entering is typically drawn on a vertical line
(North-to-South). With the increase in virtualization being implemented at so
many levels, the East-West traffic has increased in recent years.
ExamAlert
East-West traffic is a concept referring to network traffic flow within a datacenter
between servers. North-South refers to data transfers between the datacenter and
that outside of the network.
were kept close at hand so they could be rebooted and serviced regularly.
Today, however, that choice is not such an easy one. The cloud, virtualization,
software-defined networking, and many other factors have combined to offer
several options in which cost often becomes one of the biggest components.
An on-premises datacenter can be thought of as the old, traditional approach:
the data and the servers are kept in house. One alternative to this is to share a
colocation. In this arrangement, several companies put their “servers” in a shared
space. The advantage to this approach is that by renting space in a third-party
facility, it is often possible to gain advantages associated with connectivity
speed, and possibly technical support. When describing this approach, we
placed “servers” in quotation marks because the provider will often offer virtual
servers rather than dedicated machines for each client, thus enabling companies
to grow without a reliance on physical hardware.
Incidentally, any remote and autonomous office, regardless of the number of
users who may work from it, is known as a branch office. This point is important
because it may be an easy decision to keep the datacenter on-premises at
headquarters, but network administrators need to factor in how to best support
branch offices as well. The situation could easily be that while on-premises
works best at headquarters, all branch offices are supported by colocation sites.
Storage-Area Networks
When it comes to data storage in the cloud, encryption is one of the best ways
to protect it (keeping it from being of value to unauthorized parties), and VPN
routing and forwarding can help. Backups should be performed regularly (and
encrypted and stored in safe locations), and access control should be a priority.
The consumer retains the ultimate responsibility for compliance. Per NIST SP
800-144,
The main issue centers on the risks associated with moving important
applications or data from within the confines of the organization’s comput-
ing center to that of another organization (i.e., a public cloud), which is
readily available for use by the general public. The responsibilities of both
the organization and the cloud provider vary depending on the service
model. Reducing cost and increasing efficiency are primary motivations for
moving towards a public cloud, but relinquishing responsibility for security
should not be. Ultimately, the organization is accountable for the choice of
public cloud and the security and privacy of the outsourced service.
Tip
Look to CompTIA’s Cloud+ certification for more specialization in cloud and
virtualization technologies.
iSCSI
The Small Computer Systems Interface (SCSI) standard has long been the
language of storage. Internet Small Computer Systems Interface (iSCSI) expands
this through Ethernet, allowing IP to be used to send SCSI commands.
Logical unit numbers (LUNs) came from the SCSI world and carry over, acting as
unique identifiers for devices. Both NAS and SAN use “targets” that hold up to
eight devices.
Using iSCSI for a virtual environment gives users the benefits of a file system
without the difficulty of setting up Fibre Channel. Because iSCSI works both
at the hypervisor level and in the guest operating system, the rules that govern
the size of the partition in the OS are used rather than those of the virtual OS
(which are usually more restrictive).
The disadvantage of iSCSI is that users can run into IP-related problems if
configuration is not carefully monitored.
ExamAlert
Know that FCoE allows Fibre Channel to use 10 Gigabit Ethernet (or even higher)
networks. This solves the problem of enterprises having to run parallel infrastructures
for both LANs and SANs.
Network-Attached Storage
Storage is always a big issue, and the best answer is always a storage-area
network. Unfortunately, a SAN can be costly and difficult to implement and
maintain. That is where network-attached storage (NAS) comes in. NAS is easier
than SAN and uses TCP/IP. It offers file-level access, and a client sees the
shared storage as a file server.
Note
On a VLAN, multipathing creates multiple paths to the storage resources and can be
used to increase availability and add fault tolerance.
ExamAlert
For the exam, you should know the difference between NAS and SAN technologies
and how to apply them.
Cram Quiz
1. Logical unit numbers (LUNs) came from the SCSI world and use “targets” that
hold up to how many devices?
❍❍ A. 4
❍❍ B. 6
❍❍ C. 8
❍❍ D. 128
2. What is the network architecture in which the database and the application exist
on a single system?
❍❍ A. N-tiered
❍❍ B. One-tiered
❍❍ C. Two-tiered
❍❍ D. Three-tiered
3. On a VLAN, what creates multiple paths to the storage resources and can be used
to increase availability and add fault tolerance?
❍❍ A. FCoE
❍❍ B. Adding a management plane
❍❍ C. Colocating
❍❍ D. Multipathing
4. What traffic pattern refers to data that travels outside the datacenter or
enterprise?
❍❍ A. East-to-West
❍❍ B. North-to-South
❍❍ C. On-premises
❍❍ D. West-to-South
What’s Next?
For the Network+ exam, and for routinely working with an existing network
or implementing a new one, you need to identify the characteristics of network
media and their associated cabling. Chapter 5, “Cabling Solutions and Issues,”
focuses on the media and connectors used in today’s networks and what you are
likely to find in wiring closets.
A
absorption, 263–264
access control, 405. See also security
802.1x, 416
defense in depth, 408
discretionary, 405–406
MAC filtering, 418
mandatory, 405
NAC (network access control), 417
network segmentation, 408
RADIUS (Remote Authentication
Dial-In User Service), 411–412
role-based, 406–408
rule-based, 406
screened subnet, 408–409
TACACS (Terminal Access
Controller Access Control System),
412
access/edge layer, 174
ACLs (access control lists), 146, 167,
405–406
ad hoc topology, 9
scalability, 289–290 D
security, 290
DaaS (Desktop as a Service), 288–289
VPC (virtual private cloud), 289
DAC (discretionary access control),
cloud sites, 316 405–406
clustering, 318 data link layer, 44
coaxial cable, 190–191 datacenters
cold sites, 315 location types, 176–177
commands traffic flows, 176
arp ping, 431–432 deauthentication, 422
dig, 442–443 decapsulation, 49–50
FTP, 60
default gateway, 100–102, 120–122
hostname, 430
default route, 123
ipconfig, 437–440
defense in depth, 408
netstat, 432–437
demarcation point, 32–33
nslookup, 441–442
DHCP (Dynamic Host Configuration
ping, 425–426, 428–430. See also ping Protocol), 62–63, 86–88, 109
command
DNS suffixes and, 89
show, 445
relays and IP helpers, 89
tcpdump, 443
rogue servers, 422
tracert, 126–127, 421–422
differential backups, 310
configuration-related documentation,
303 dig command, 442–443
connectionless protocols, 54 disaster recovery, 308, 309. See also
power management
connection-oriented protocols, 54
backups, 309, 311–312
connectors
best practices, 312–313
BNC, 194–195
differential, 310
fiber, 197–199
full, 309–310
F-type, 197
incremental, 310–311
RJ-11, 195–196
cloud sites, 316
RJ-45, 196
cold sites, 315
convergence, 127–128
environmental concerns, 339
core layer, 173
hot sites, 315–316
cross-over cable, 201–203, 225
MTBF (mean time between failures),
cryptography, 412 316
CSMA/CA (Carrier Sense Multiple MTTR (mean time to recovery), 316
Access/Collision Avoidance), 132–133 RTO (recovery time objective), 317
CSMA/CD (Carrier Sense Multiple snapshots, 312
Access/Collision Detection), 130–132
SPOF (single point of failure), 316
CSU/DSU (channel service unit/data
UPSs (uninterruptible power
service unit), 34
supplies), 313–314
cut-through switching, 158 warm sites, 316
CWDM (coarse wavelength-division disposal of assets policies, 425
multiplexing), 31