Network+ Revisions
Network+ Revisions
Revise:
Layer 7 Application Layer: Http, FTP,SMTP
Layer 4: TCP (Segments), UDP(Datagram)
Layer 3 Netowrk Layer: ICMP, IP
Layer 2 Data Link Layer Devices: Bridge, Switch, Network Adapter (NIC Card)
Layer 1 Equipments: Hub, Network Cabling, Repeater, Media Converter
Section 9 IP Addressing:
IP Addressing in Layer 3 used by routers to send data from one network to another
Ipv4 Addressing:
Class A: 1-126
Class B: 128-191
Class C: 192-223
-8 Bits (128+64+32+16+8+4+2+1) = 11111111.11111111.11111111.11111111
-Use Subnet Mark to determine Network Portion + Host Portion
-Multicast Address: a logical identifier for a group of hosts in a computer network
-Subnetting: take large network and subdivide into smaller portions
-Classful default subnet mask
-Classless: Used to borrow of the host bits from ipv4 address
-CIDR: 255.255.255.0/24(classful)/ 255.255.255.192 / 26
IPv4 Types:
-Private IP Ranges:
Class A: 10.0.0.0 – 10.255.255.255
Class B: 172.16.0.0 – 172.31.255.255
Class C: 192.168.0.0 – 192.168.255.255
DHCP Process: DORA, Discover, Offer, Request, Acknowledge
Data Flows:
-Unicast: Single source device to Single Destination device i.e phone call
-Multicast: Single Source Device to Multiple (but specific) destination device
-Broadcast: Data travels from a single source device to all devices on a destination
network
Assigning IP Addresses:
-WINS (Windows Internet Name Service): Identifies NetBIOS systems on TCP/IP Network
and converts those NetBIOS names to IP Addresses (used in local area network) Like DNS
but only used within a Windows domain environment.
ZeroConf(Zero Configuration):
-newer technology based on APIPA.
-Can resolve computer names to IP Addresses without need for DNS by using mDNS
- Perform service discovery on a network
-Apple it’s called Bonjour
-Windows it’s called Link-Local Multicast Name Resolution (LLMNR)
-Linux: ZeroConfig is implemented through SystemD (System Daemon Service)
Example: 192.168.1.0/26
/26 means classless and borrowed 2 bits from hosts for creating subnets
Created Subnets: Borrowed 2 Bits from host so 2S = 22 = 4 Subnets (2 = number of
borrowed bits)
Calculate host bits: 32 total – 26 Networks = 6 hosts bits
so 2h -2 = 26 -2 = 62 hosts (-2 because first one is network id and last one is broadcast)
Memorize
Routing:
-Forward packets between different networks or subnets
-Each subnet or external network is going to be its own broadcast domain because
routers are used to separate broadcast domain
Routing Table:
-Helps determine which route entry is the best fit for the network
-The longer the IP prefix or higher the CIDR notation the more specific route becomes
-Directly connected routes: routers that are physically directly connected.
-Default Static Route (0.0.0.0/0) – if you don’t where to go just go here
-Dynamic Routing- Learned by exchanging information between routers
-Preventing Routing Loops:
-Split Horizon: Prevents a route learned on one interface from being advertised
back out of that same interface.
-Poison Reverse: Cause a route received on one interface to be advertise backed
out of that same interface with high cost
Routing Protocols:
-Internal and External Protocols
-IGP Interior Gateway Protocol– Operates within an autonomous system. Examples: RIP,
OSPF, EIGRP, IS-IS
-EGP Exterior Gateway Protocol– Operates between autonomous systems. Examples:
BGP (Internet)
Routing Selection:
-Administrative Distance (AD): Lower AD is considered more believable or trustworthy
-Directly Connected Network: AD 0
-Statically Connected Network: AD 1
-EIGRP: AD 90
-OSPF AD 110
-RIP: 120 AD
-External EIGRP: AD 170
Address Translation:
-NAT: translates private IP address to public IP Addresses for routing over public
networks
-DNAT (Dynamic NAT): Automatically assigns an IP address from a pool and gives one to
one translation
-SNAT (Static NAT): Manually assigns an IP and gives one to one translation
-PAT (Port Address Translation): Sharing of one public IP by multiple private IP addresses
which gives a many to one translation (Home Network)
DHCP: DHCP Scope, DHCP Reservation, DORA Process, 24 Hrs (Home Lease)/ 7 or 30
(Corporate)
Discover: The client sends a broadcast message to find a DHCP server.
Offer: The DHCP server responds with an IP address offer and other network details.
Request: The client replies to the server, requesting the offered IP address.
Acknowledge: The DHCP server confirms the assignment and finalizes the process.
-Gets IP Address, Subnet Mask, Default Gateway IP, DNS Server IP
DHCP Relay: Forward DHCP packets between clients and servers. Used when the client
device and the DHCP Server are not located on the same subnet or network. Can
configure one device for DHCP relay rather than installing DHCP server on every subnet.
-Uniform Resource Locator: Contains Fully Qualified Domain Name with method of
accessing information. Securely Https:// or insecurely Http:, ftp://ftp.diontraiing.com.
-Host File: The system first consults its host file to see if it already knows the IP address
for that given domain name. Host file is an alternative to DNS
-Reverse DNS Lookup: Determines what the domain name is for a given IP address
-Forward Lookup: Use DNS to find the IP address for a given domain name.
-Internal DNS: A DNS service used within private networks to resolve internal resources'
hostnames to IP addresses
-External DNS: A DNS service that resolves publicly accessible domain names to IP addresses.
-Recursive Lookup: DNS Server communicates with several other DNS servers to hunt down the
IP address and return to client. Your ISP may or may not know the IP Address for DION
training.com they will go up a level to next DNS server and if not another level and continue to
do this until it finds that server.
Securing DNS:
-DNS Security Extensions (DNSSEC)- Adds a layer of security to DNS by verifying that DNS
responses come from a trusted source and have not been tampered with. Provides data integiry
and authentication but doesn’t encrypt DNS queries.
-DNS over HTTPS (DoH): Encrypts DNS Queries using HTTPS protocal, ensuring praviacy and
security during transmission
-DNS over TLS (DoT): Encrpts DNS queries using Transport Layer Secuirty (TLS) doesn’t use HttpS
-DNS Snooping: An attacker monitors DNS queries to infer what websites a user is visiting
NTP
-Network Time Protocol (NTP)- Synchronizes clocks between systems communicating over a
packet-switched, variable-latency data network.
-Sent over UDP using port 123
-Precision Time Protocol (PTP)- Used to synchronize clocks through a computer network (offers
a higher precision timekeeping solution for scenarios where every microsecond counts)
-Network Time Security (NTS) – Extension of NTP and ensures time synchronization processes
are secure from malicious interference.
Quality of Service:
-Delay: time a packet travels from source to destination
-Jitter: uneven arrival of packets which is especially harmful in VOIP Traffic
-Drop: occurs during link congestion when a router’s interface queue overflows and causes
packet loss
-Effective Bandwidth: lowest link inside your connection
QOS Mechanisms:
- Classification: Traffic is placed into different categories
- Marking: Alter bits with a frame, call, packet which indicates handling of traffic
- Congestion Management: Queuing
- Congestion Avoidance: Newly arriving packets would be discarded if the device’s
output queue fills to capacity.
- Polciing, Shaping
- Link Efficency: Compression (Compress payload such as IP,UDP,RTP)
- Link Efficiency Link Fragmentation and LFI: Fragments large data packets and
interleaves smaller data packets between the fragments.
Section 12
Fiber to the Home: Fiber optic connecting brought directly to individual residences
Fiber to the Curb (FTTC): Fiber optic cable run to the curbside or cabinet and use traditional
copper cables for individual homes or businesses
Fiber to the Node/ Neighborhood (FTTN): Fiber optic connection extended to a central point in
a particular area or neighborhood
Fiber to the Building Basement (FTTB): Fiber optic cables reach the building’s main
communication room or basement.
Hybrid Fiber-Coaxial (HFC)- High-Capacity highway that carries vast amounts of data using a
blend of fiber optic and coaxial cables
Digital Subscriber Line (DSL) Connection- Family of Technologies that provide internet access by
transmitting digital data over the wires of a local telephone network
Symmetric DSL(SDSL): Works like a T1 with equal upload and download speeds
Very High Bit-Rate DSL (VDSL): Has very high speeds with download over 50 MBps and upload
over 10 Mbps
Satellite Connections:
Slow, Expensive, High Latency, Used in remote/mobile environments
Starlink uses low earth orbit instead of geosynchronous satteleites and has low latency
Cellular Connections:
Global System for Mobile Communication (GSM) – Cellular technology that takes the voice
during a call and then converts it to digital data
Code-Division Multiple Access (CDMA) – Cellular technology that uses code division to split up
the channel.
Microwave Connections:
Uses beam of radio waves in the microwave frequency range to transmit information
between two fixed locations
UHF,
Microwaves can provide a very fast connection point using point-to-point connections
between two places.
Worldwide INteroperabiltiy for Microwave Acess (WiMAX)
Leased Line:
Fixed bandwidth that has symmetric data connection that’s exclusively reserved for
subscribers use
Dedicated Leased Line: Continuous connection between two points that are set up by a
telecommunication provider
Ensures data travels securely and freely from any kind of congestion or security breaches
Symmetric: Upload and Download speeds is same
Bandwidth Options and Reliable and Secure
Expensive
Exam Revisions
Revisions:
Layer 7 Application Layer: Http, FTP,SMTP
Layer 4: TCP (Segments), UDP(Datagram)
Layer 3 Netowrk Layer: ICMP, IP
Layer 2 Data Link Layer Devices: Bridge, Switch, Network Adapter (NIC Card)
Layer 1 Equipments: Hub, Network Cabling, Repeater, Media Converter
Exam Compass 3:
Cloud, Protocols, 51.43%
-VPC
-Private Cloud
-VXLAN
-Intranet
-Network Security Group (NSG): Firewall Like capabilities, apply security rules to specific NIC,
use for controlling inbound and outbound traffic in cloud computing environment.
-Netowrk Secuirty List (NSL): Provide firewall-like capabilities, applies security to subnet level,
use of controlling inbound and outbound traffic in cloud computing environment
-Internet Gateway: A type of network gateway that allows instances within a cloud
environment to send and receive unencrypted traffic to and from the Internet is
called
-What are Function of cloud gateway using NAT
-Direct Connections
-Public VS Private VS Hybrid Cloud
-SaaS, DaaS, PaaS, IaaS
-Scalability vs Rapid Eliastacity
-Virtualiaztion, Multitenancy, Sandboxing, Containterization ‘
-Telnet: User/Pass Authentication, Transmit data in an unencrypted form, Enables
remote login and command exection
-SMTP: Sending email messages between mail servers, Sending email messasges
from a client devices
-Zeroconf
- TFTP: Provides no security features, A very basic form of file sharing protoocl