...CompTIA Network+: Exam N10-005 Objective Chapter 1.0 1.1 1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 2.0 2.1 2.2 2.3 2.4 2.5 2.6 Network Concepts (21 percent) Compare the layers of the OSI and TCP/IP models: OSI model (Layer 1 – Physical, Layer 2 – Data link, Layer 3 – Network, Layer 4 – Transport, Layer 5 – Session, Layer 6 – Presentation, Layer 7 – Application); TCP/IP model (Network Interface Layer, Internet Layer, Transport Layer, Application Layer [Also described as: Link Layer, Internet Layer, Transport Layer, Application Layer]) Classify how applications, devices, and protocols relate to the OSI model layers: MAC address; IP address; EUI-64; Frames; Packets; Switch; Router; Multilayer switch; Hub; Encryption devices; Cable; NIC; Bridge Explain the purpose and properties of IP addressing: Classes of addresses (A, B, C and D, Public vs. Private); Classless (CIDR); IPv4 vs. IPv6 (formatting); MAC address format; Subnetting; Multicast vs. unicast vs. broadcast; APIPA Explain the purpose and properties of routing and switching: EIGRP; OSPF; RIP; Link state vs. distance vector vs. hybrid; Static vs. dynamic; Routing metrics (Hop counts, MTU, bandwidth, Costs, Latency); Next hop; Spanning-Tree Protocol; VLAN (802.1q); Port mirroring; Broadcast domain vs. collision domain; IGP vs. EGP; Routing tables; Convergence (steady state) Identify common TCP and UDP default ports: SMTP – 25; HTTP – 80; HTTPS – 443; FTP – 20, 21; TELNET – 23; IMAP – 143; RDP – 3389; SSH – 22; DNS – 53; DHCP – 67, 68...
Words: 680 - Pages: 3
...Network Switching Switches can be a valuable asset to networking. Overall, they can increase the capacity and speed of your network. However, switching should not be seen as a cure-all for network issues. Before incorporating network switching, you must first ask yourself two important questions: First, how can you tell if your network will benefit from switching? Second, how do you add switches to your network design to provide the most benefit? This tutorial is written to answer these questions. Along the way, we’ll describe how switches work, and how they can both harm and benefit your networking strategy. We’ll also discuss different network types, so you can profile your network and gauge the potential benefit of network switching for your environment. What is a Switch? Switches occupy the same place in the network as hubs. Unlike hubs, switches examine each packet and process it accordingly rather than simply repeating the signal to all ports. Switches map the Ethernet addresses of the nodes residing on each network segment and then allow only the necessary traffic to pass through the switch. When a packet is received by the switch, the switch examines the destination and source hardware addresses and compares them to a table of network segments and addresses. If the segments are the same, the packet is dropped or “filtered”; if the segments are different, then the packet is “forwarded” to the proper segment. Additionally, switches prevent bad or misaligned...
Words: 3115 - Pages: 13
...links without changing their current environment. MPLS takes the control of IP routing and combines it with layer 2 switching to give a seamless solution to the many needs of companies today (Semeria, 1999). The goal of MPLS was to standardize protocols that used label-swapping forwarding techniques to support unicast and multicast routing (Yuan, 2002). Many ISP networks today are built using an overlay model, in which IP’s topologies run independent of layer 2 switch topology, such as ATM and Frame Relay (Semeria, 1999). MPLS took advantage of the rapid advances in semiconductor components and focused on separating the routing and forwarding problems from each other; layer 2 switches provide high-speed connectivity, while IP routers, interconnected by a mesh of layer 2 circuits, provide intelligence to forward IP datagrams (Semeria, 1999). With these two topologies combined, you are able to get a fast, intelligent network. MPLS is used by many network operators today because it can support a diverse legacy system as well as modernize them for next-generation applications (Cisco, 2013). Because of its many uses, MPLS can be used to facilitate many different forms of network traffic. In short, Multiprotocol Layer Switching is the IETF’s solution to the rapidly growing in size datagrams companies are transporting over networks today by combining layer 2 switch and layer 3 routing into one fully integrated solution (Semeria, 1999). MPLS OPERATION At a high level, MPLS works...
Words: 1246 - Pages: 5
...Data flows in a single direction, from one entity to the next. An entity accepts data in circulation on the ring only if it corresponds to its address. If not, the entity in question passes the data to the next entity. (https://fr.wikipedia.org/wiki/R%C3%A9seau_en_anneau) In a star network topology, network devices are connected to a central hardware system (the node). The role of this one is to ensure the communication between the different equipments of the network. In practice, the central equipment can be a hub , a switch or a router. The downside to a star architecture is that it is susceptible to traffic problems because the central computer is processing all of the messages. (https://fr.wikipedia.org/wiki/R%C3%A9seau_en_%C3%A9toile) The latest implementation in Wide Area Network Architectures has actually existed in the supercomputer industry since its inception being that of the Mesh Architecture. In a fully connected Mesh each node is connected to every other node, and while this may be the ideal implementation it is also the most impractical since this has an exponential cost association the further apart the nodes are geographically from each other....
Words: 1527 - Pages: 7
...flow control at the cost of some network delays. Frame Relay switches packets end to end much faster, but there is no guarantee of data integrity at all. Frame Relay is cost effective, partly due to the fact that the network buffering requirements are carefully optimized. Compared to X.25, with its store and forward mechanism and full error correction, network buffering is minimal. Frame Relay is also much faster than X.25: the frames are switched to their destination with only a few byte time delay, as opposed to several hundred milliseconds delay on X.25. An evolution beyond the X.25 protocol, Frame Relay is a network interface standard based on statistical multiplexing. By combining the flexibility of X.25 packet protocol with the performance of private lines, Frame Relay Service can move data much more efficiently than the packet protocol. In fact, Frame Relay Service streamlines the processing steps associated with X.25 error detection/correction and routing procedures. Frame Relay technology takes advantage of highly accurate digital networks with their reduced line errors and intelligent network end point devices with their end-to-end error checking protocols. The reduced per packet processing time allows you to process more user data. Also, the upgrade to Frame Relay Service is simple and cost effective because Frame Relay Service is based on the HDLC protocol, which is popular among LAN bridges, routers and other communications devices. The following are also the...
Words: 429 - Pages: 2
...SAMPLE TECH WRITING PROPOSAL INTRODUCTION AND DISCLAIMER This is an altered version of a real Tech Writing project submitted by a student and passed by an Evaluator. There is no guaranty that either the original version or this altered one would pass evaluation if submitted today. Despite our best efforts to provide consistent evaluation across all students and projects, Evaluators are human and are allowed latitude in grading. Additionally, your interpretation of what you see is likely to be different from the interpretations of others; in other words, even if you strictly follow the model of this paper, there is no guarantee of immediate success with your project. The original work was altered to mask the identity of its author and the various commercial products mentioned. References and their citations were also masked because no effort was made to determine whether other changes affected their validity. The inserted Comments indicate only that all required TaskStream sections are present, not that they are correctly completed for all types of projects. The best that can be said about the original work is that an evaluator found the work submitted to be sufficient to the task. Viewing this sample may or may not produce a similar result for you. Bottom line: You are the author of your work. We hope this sample helps to dissipate some of the uncertainty that surrounds the Capstone Project, but it cannot guaranty a trouble-free process. IMPORTANT: For maximum benefit...
Words: 7152 - Pages: 29
...IP/MPLS-Based VPNs Layer-3 vs. Layer-2 IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents WHITE PAPER 1. 2. 3. 4. 5. 6. Objective ..................................................................................................................... 3 Target Audience .......................................................................................................... 3 Pre-Requisites.............................................................................................................. 3 Introduction ................................................................................................................. 3 MPLS Layer-3 VPNs .................................................................................................. 4 MPLS Layer-2 VPNs .................................................................................................. 7 6.1. Point-to-Point Connectivity ................................................................................. 8 6.2. Multi-Point Connectivity...................................................................................... 9 7. Which Way to Go: The Layer-3 or The Layer-2 Way.............................................. 12 8. Summary ................................................................................................................... 15 FOUNDRY NETWORKS Page 2 of 16 IP/MPLS-Based VPNs Layer-3 vs. Layer-2 WHITE PAPER 1. Objective To give the reader an insight into the pros...
Words: 5621 - Pages: 23
...Team B - Integrative Network Design Project Jacob Acuna, Susan Granata, David Teague University of Phoenix - NTC/362 Ronald Bowell October 26, 2015 Page Break Kudler Fine Foods is a purveyor of specialty and gourmet foods in the San Diego, CA. area. They currently have three locations: the home office in La Jolla, CA., and two store locations in Del Mar, CA. and Encinitas, CA. Kudler is in need of a new network design and topology that will address multiple issues faced in a growing enterprise. The new network must incorporate a new network topology to reduce downtime and ensure that functionality will remain if one or two devices are down. In addition, a VoIP system must be installed over the network, along with an internal WLAN in each store. The WAN will tie all three stores together to increase collaboration and network file sharing, and the new network must be easily scalable to support growth of the company and integration of future stores. Of utmost priority is the security of the network. The sensitive nature of credit card processing makes Kudler Fine Foods a prime victim for cyber threats, and therefore policies must be put in place to protect the customer and employee data. Network Characteristics and Components The current network characteristics and components for the Del Mar store starts with a small office scenario that is accompanied by six Dell Vostro computers for management. All six computers are running Windows 7 and all...
Words: 3311 - Pages: 14
...Network Design Project Cecil Ruis NTC/362 August 6, 2013 Ron Inmon Kudler Fine Foods (KFF) is a small specialized company that deals in fine foods, wines and other related items for the discerning customer. Presently the company uses a dedicated T3 line to connect their La Jolla, Del Mar and Encinitas stores together with La Jolla being the site for the central server. The company incorporates a Bus Topology for a three locations. Bus networks use a common backbone to connect all devices. This is done with a single cable (backbone) that functions as a common communication link that all devices either tap into or attach to individually. Below is an example of a Bus Topology. Ethernet bus topology is considered the easiest to install and maintain because of its simplicity. Kudler uses a 100Base ThickNet cable for its backbone. The Bus Topology is very effective when connecting fewer than 15 components at a time. This is an ideal set-up for the company because all three locations have less than 15 connections per site. Each location has the same configurations which consist of six computers, one Point of Sales (POS) server, POS terminals, blade server (for all communications, e-mail, storage and Web), one printer, six Voice Over Internet Protocol (VOIP) phones and an APC Smart Uninterrupted Power Supply (UPS). The biggest downside to this system is that if anything happens to the backbone cable the entire system goes down. The plan for Kudler is to incorporate a...
Words: 3569 - Pages: 15
...many useful search results for "ethernet vs. token ring." I'll point out a key difference and give you a source answering your question on performance. Ethernet is based on CSMA/CD (carrier sense multiple access with collision detection), meaning multiple stations sense the carrier at the same time and send data when the carrier is free. However, there might be multiple stations sending a free carrier and send the data at the same time, causing "collision." Collision is the main factor affecting ethernet's performance. The more stations on the same LAN, the higher the collision rate, the lower the performance. Token Ring, on the other hand, is based on a control/access given to the station owning the "token." Think of a token as the key to the media: whichever station has the token would be allowed to use the ring to send the data. So there would be no collision, just multiple stations competing for the same token. With not too many stations, the wait-for and claim of the token is very efficient (think of a video game with less players waiting to play it.) But if there are too many stations, most would just sit around and wait for the token, hence the flat-out of its performance. 2) What are the standards used for the various layers in an Ethernet-based network that is managed by the Internet management protocol? Assume that the Ethernet runs on 10 Mbps on an unshielded twisted-pair cable? A) The standards used for the various layers in an Ethernet-based network that is managed...
Words: 923 - Pages: 4
...and their Building Blocks * 1-1 Introduction to Networks * 1-2 Networking Types * 1-3 OSI Reference Model * 1-4 TCP/IP Model * 1-5 Ethernet Technologies and Cabling * 1-6 Cisco 3 Layer Model * 1-7 Summary * Chapter 2 – IP Addressing and Subnets * 2-1 IP Addresses – Composition, Types and Classes * 2-2 Private and Public IP addresses * 2-3 Subnetting * 2-4 Variable Length Subnet Masks (VLSM) * 2-5 Route Summarization * 2-6 Troubleshooting IP Addressing * Chapter 3 Introduction to Cisco Routers, Switches and IOS * 3-1 Introduction to Cisco Routers, Switches, IOS & the Boot Process * 3-2 Using the Command-Line Interface (CLI) * 3-3 Basic Configuration of Router and Switches * 3-4 Configuring Router Interfaces * 3-5 Gathering Information and Verifying Configuration * 3-6 Configuring DNS & DHCP * 3-7 Saving, Erasing, Restoring and Backing up Configuration & IOS File * 3-8 Password Recovery on a Cisco Router * 3-9 Cisco Discovery Protocol (CDP) * 3-10 Using Telnet on IOS * 3-11 CCNA Lab #1 * Chapter 4 Introduction to IP Routing * 4-1 Understanding IP Routing * 4-2 Static, Default and Dynamic Routing * 4-3 Administrative Distance and Routing Metrics * 4-4 Classes of Routing Protocols * 4-5 Routing...
Words: 95744 - Pages: 383
...Section 1: Networking Concepts CompTIA Network+ N10-005: 1.1a – The OSI Model Through the years, the OSI model has been the fundamental model for networking. In this video, you’ll get an overview of the OSI model and a detailed breakdown of each of each OSI layer. CompTIA Network+ N10-005: 1.1b – The TCP/IP Model The OSI model isn’t the only model in town. In this video, you’ll learn about the TCP/IP model and how real-world applications are associated with each layer. CompTIA Network+ N10-005: 1.2 – The OSI Model in the Real World The OSI model is a useful reference, but how does it really work in the real world? In this video, we’ll investigate how the OSI model maps into an encrypted email conversation with Google Mail. CompTIA Network+ N10-005: 1.3a – Binary Math Calculating in binary is an important skill for any network professional. In this video, you’ll learn the fundamentals for converting between decimal and binary numbers. CompTIA Network+ N10-005: 1.3b – IP Classes The history of TCP/IP includes numerous changes in network technologies and subnetting. In this video, you’ll learn how the IP class-based numbering system was used in the past and how it’s used today. CompTIA Network+ N10-005: 1.3c – Classless Inter-Domain Routing CIDR-block addressing has added new flexibility to IP subnetting. In this video, you’ll learn about classless inter-domain routing and the notation used to designate a CIDR-block address. CompTIA Network+ N10-005: 1...
Words: 4714 - Pages: 19
...computers leaves each computer open to hacking, malware, and viruses — in the event that a virus should attack one computer on the system. There are certain components necessary for an ethernet network: * Ethernet cable * Ethernet hub * Crossover cable * Router Ethernet Cable An ethernet cable is a necessary cord to connect two or more computers to the same network. Each computer must have its own ethernet cable in order to operate on the same ethernet network. Ethernet Hub An ethernet hub is a device used to string together each ethernet cable, which connects each computer on the same network. An ethernet hub contains several ethernet ports. Crossover Cable A crossover cable is a substitute for ethernet cables when one wants to connect two or more computers to the same ethernet network. Router A router is similar to an ethernet cable in that it connects two or more devices. Routers are more often used for local area networks that are small in size. Businesses and universities, for example, often use ethernet cables to connect computers. Small schools or elementary and middle schools (including high schools) use routers. WANs, or wide area networks, require ethernet cables instead of routers — since routers can only work in circumstances of short distances. Certain ethernet networks require...
Words: 9787 - Pages: 40
...5 Question 3 42 marks 8 Bibliography 11 Question 1 Scenario Read the scenario below and answer the questions that follow: 1.1 You have been hired as a network expert to design and configure this network. Design an appropriate IP addressing scheme for Big Data College. For each subnet provide the following: (8 marks) a. Subnet address b. First IP address c. Last IP address d. Broadcast address Subnet Address First host Last Host Broadcast Lab 1 218.35.50.0 218.35.50.1 218.35.50.62 218.35.50.63 Lab 2 218.35.50.64 218.35.50.65 218.35.50.126 218.35.50.127 Lab 3 218.35.50.128 218.35.50.129 218.35.50.190 218.35.50.191...
Words: 824 - Pages: 4
...It will discuss nods, NICs, data routing devices, firewalls, and servers. Hardware choices are very important for a LAN. The types of devices on a network will determine its capabilities. The two biggest factors are cost vs. function. The person, or people, designing a LAN do not want to pay more than necessary according to their needs. But underestimating their requirements can be just as bad, or worse. Underestimating requirements can force a network designer(s) to have to completely replace some, or all, of the network...
Words: 2470 - Pages: 10