CompTIA Network+ Study Guide
CompTIA Network+ Study Guide
CompTIA Network+ Study Guide
ThisisourfreestudyguideforCompTIA'sNetwork+certificationexam(N10004).Ifyouwouldliketoreportan
errororcontributeadditionalinformation,pleaseusethecontactlinkatthebottomofthesite,orpostinour
forums.Wehopeyoufindthisguideusefulinyourstudies.
Domain1.0:NetworkTechnologies
Domain1.1:CommonNetworkingProtocols
TCPTCPbreaksdataintomanageablepacketsandtracksinformationsuchassourceanddestinationof
packets.Itisabletoreroutepacketsandisresponsibleforguaranteeddeliveryofthedata.
IPThisisaconnectionlessprotocol,whichmeansthatasessionisnotcreatedbeforesendingdata.IPis
responsibleforaddressingandroutingofpacketsbetweencomputers.Itdoesnotguaranteedeliveryand
doesnotgiveacknowledgementofpacketsthatarelostorsentoutoforderasthisistheresponsibilityof
higherlayerprotocolssuchasTCP.
UDPAconnectionless,datagramservicethatprovidesanunreliable,besteffortdelivery.
ICMPInternetControlMessageProtocolenablessystemsonaTCP/IPnetworktosharestatusanderror
informationsuchaswiththeuseofPINGandTRACERTutilities.
SMTPUsedtoreliablysendandreceivemailovertheInternet.
FTPFiletransferprotocolisusedfortransferringfilesbetweenremotesystems.Mustresolvehostnameto
IPaddresstoestablishcommunication.Itisconnectionoriented(i.e.verifiesthatpacketsreachdestination).
TFTPSameasFTPbutnotconnectionoriented.
ARPprovidesIPaddresstoMACaddressresolutionforIPpackets.AMACaddressisyourcomputer'sunique
hardwarenumberandappearsintheform00A0F12764E1(forexample).EachcomputerstoresanARP
cacheofothercomputersARPIPcombinations.
POP3PostOfficeProtocol.APOP3mailserverholdsmailuntiltheworkstationisreadytoreceiveit.
IMAPLikePOP3,InternetMessageAccessProtocolisastandardprotocolforaccessingemailfromyour
localserver.IMAP(thelatestversionisIMAP4)isaclient/serverprotocolinwhichemailisreceivedandheld
foryoubyyourInternetserver.
TELNETProvidesavirtualterminalorremoteloginacrossthenetworkthatisconnectionbased.The
remoteservermustberunningaTelnetserviceforclientstoconnect.
HTTPTheHypertextTransferProtocolisthesetofrulesforexchangingfiles(text,graphicimages,sound,
video,andothermultimediafiles)ontheWorldWideWeb.Itistheprotocolcontrollingthetransferand
addressingofHTTPrequestsandresponses.
HTTPSSignifiesthatawebpageisusingtheSecureSocketsLayer(SSL)protocolandisprovidingasecure
connection.Thisisusedforsecureinternetbusinesstransactions.
NTPNetworkTimeProtocolisaprotocolthatisusedtosynchronizecomputerclocktimesinanetworkof
computers.
SNMPStandsforSimpleNetworkManagementProtocolandisusedformonitoringandstatusinformation
onanetwork.SNMPcanbeusedtomonitoranydevicethatisSNMPcapableandthiscanincludecomputers,
printers,routers,servers,gatewaysandmanymoreusingagentsonthetargetsystems.Theagentsreport
informationbacktothemanagementsystemsbytheuseoftrapswhichcapturesnapshotdataofthe
system.Thistrapinformationcouldbesystemerrors,resourceinformation,orotherinformation.The
SNMPv2standardincludesenhancementstotheSNMPv1SMIspecificdatatypes,suchasincludingbit
strings,networkaddresses,andcounters.InSNMPv3securitywasaddressed.Becauseallofthetrap
informationsentwasincleartext,anymonitoringinformationbeingsentandcollectedforoperational
purposescouldalsobepulledoffthewirebyamaliciousperson
SIPStandsforSessionInitiationProtocolandisasignalingprotocol,widelyusedforcontrollingmultimedia
communicationsessionssuchasvoiceandvideocallsoverInternetProtocol(IP).Otherfeasibleapplication
examplesincludevideoconferencing,streamingmultimediadistribution,instantmessaging,presence
informationandonlinegames.Theprotocolcanbeusedforcreating,modifyingandterminatingtwoparty
(unicast)ormultiparty(multicast)sessionsconsistingofoneorseveralmediastreams.Themodificationcan
involvechangingaddressesorports,invitingmoreparticipants,addingordeletingmediastreams,etc.
RTPRealtimeTransportProtocolistheaudioandvideoprotocolstandardusedtodelivercontentoverthe
Internet.RTPisusedinconjunctionwithotherprotocolssuchasH.323andRTSP.
IGMPInternetGroupManagementProtocolisusedtomanageInternetProtocolmulticastgroups.IP
hostsandadjacentmulticastroutersuseIGMPtoestablishmulticastgroupmemberships.IGMPisonly
neededforIPv4networks,asmulticastishandleddifferentlyinIPv6networks.
TLSTransportLayerSecurityisacryptographicprotocolthatprovidessecurityforcommunicationsover
networkssuchastheInternet.TLSandSSLencryptthesegmentsofnetworkconnectionsattheTransport
Layerendtoend.Severalversionsoftheprotocolsareinwidespreaduseinapplicationslikewebbrowsing,
electronicmail,Internetfaxing,instantmessagingandvoiceoverIP(VoIP).
Domain1.2:IdentifyCommonlyUsedTCP/UDPPorts
Portsarewhatanapplicationuseswhencommunicatingbetweenaclientandservercomputer.Somecommon
portsare:
Protocol Type
Number
FTP
TCP
20,21
SSH
TCP
22
TELNET
TCP
23
SMTP
TCP
25
DNS
TCP/UDP 53
DHCP
UDP
67
TFTP
UDP
69
HTTP
TCP
80
POP3
TCP
110
NTP
TCP
123
IMAP4
TCP
143
SNMP
UDP
161
HTTPS
TCP
443
Domain1.3:IdentifytheFollowingAddressFormats
IPv4EveryIPaddresscanbebrokendowninto2parts,theNetworkID(netid)andtheHostID(hostid).Allhosts
onthesamenetworkmusthavethesamenetid.Eachofthesehostsmusthaveahostidthatisuniqueinrelation
tothenetid.IPaddressesaredividedinto4octetswitheachhavingamaximumvalueof255.WeviewIPv4
addressesindecimalnotationsuchas124.35.62.181,butitisactuallyutilizedasbinarydata.
IPaddressesaredividedinto3classesasshownbelow:
Class Range
A
1126
<128191
192223
NOTE:127.x.x.xisreservedforloopbacktestingonthelocalsystemandisnotusedonlivesystems.Thefollowing
addressrangesarereservedforprivatenetworks:
10.0.0.010.254.254.254
172.16.0.0172.31.254.254
192.168.0.0192.168.254.254
IPv6ThepreviousinformationonTCP/IPhasreferredtoIPv4,however,thisaddressingschemehasrunoutof
availableIPaddressesduetothelargeinfluxofinternetusersandexpandingnetworks.Asaresult,thepowersthat
behadtocreateanewaddressingschemetodealwiththissituationanddevelopedIPv6.Thisnewaddressing
schemeutilizesa128bitaddress(insteadof32)andutilizesahexnumberingmethodinordertoavoidlong
addressessuchas132.64.34.26.64.156.143.57.1.3.7.44.122.111.201.5.Thehexaddressformatwillappearin
theformof3FFE:B00:800:2::Cforexample.
MACAddressingAlsoknownashardwareaddressorethernetaddress,AMACaddressisauniquecodeassigned
tomostnetworkinghardware.Thehardwareisassignedauniquenumberbythemanufacturerandtheaddressis
permanentlyassignedtothedevice.MACAddressesareina48bithexidecimalformatsuchas00:2f:21:c1:11:0a.
Theyareusedtouniquelyidentifyadeviceonanetwork,andforotherfunctionssuchasforbeingauthenticated
byaDHCPserver.Formoreinformation,readMACAddressingFormatsAndBroadcasts.
Domain1.4:ProperUseofAddressingTechnologies
SubnettingIPaddressescanbeclassA,BorC.ClassAaddressesarefornetworkswithalargenumberofhosts.
Thefirstoctetisthenetidandthe3remainingoctetsarethehostid.ClassBaddressesareusedinmediumtolarge
networkswiththefirst2octetsmakingupthenetidandtheremaining2arethehostid.ClassCisforsmaller
networkswiththefirst3octetsmakingupthenetidandthelastoctetcomprisingthehostid.TheNetworkIDand
theHostIDaredeterminedbyasubnetmask.Thedefaultsubnetmasksareasfollows:
Class
DefaultSubnet Subnets
HostsPerSubnet
ClassA 255.0.0.0
126
16,777,214
ClassB 255.255.0.0
16,384
65,534
ClassC 255.255.255.0
2,097,152 254
Whatifyouwantedmorethan1subnet?Subnettingallowsyoutocreatemultiplelogicalnetworksthatexist
withinasingleClassA,B,orCnetwork.Ifyoudon'tsubnet,youwillonlybeabletouseonenetworkfromyour
ClassA,B,orCnetwork.Whensubnettingisemployed,themultiplenetworksareconnectedwitharouterwhich
enablesdatatofinditswaybetweennetworks.Ontheclientside,adefaultgatewayisassignedintheTCP/IP
properties.ThedefaultgatewaytellstheclienttheIPaddressoftherouterthatwillallowtheircomputerto
communicatewithclientsonothernetworks.
ClassfulversusClasslessaddressingtheoriginalTCP/IPaddressingmethoddescribedabovewascalled
classfuladdressingwhichworkedbydividingtheIPaddressspaceintochunksofdifferentsizescalledclasses.
ClasslessaddressingisreferredtoasClasslessInterDomainRouting(CIDR)andisdonebyallocatingaddressspace
toInternetserviceprovidersandendusersonanyaddressbitboundary,insteadofon8bitsegments.So
172.16.50.0doesnothavetousethestandardsubnetmaskof255.255.0.0whichmakesaClassBaddressspace
andwhichalsoputsitonthesamenetworkas172.16.51.0usingthesubnetmaskof255.255.0.0.(Withclassful
addressing,ourexamplehas172.16asthenetworknameandthe50.0and51.0rangesarebothpartofthesame
hostnamingconvention).Instead,byusingclasslessaddressing172.16.50.0/24putsthesesystemsonadifferent
networkthan172.16.51.0/24becausethenetworknameshereare172.16.50and172.16.51whichare
different.
NATNATstandsforNetworkAddressTranslationandisacommonlyusedIPtranslationandmappingtechnology.
Usingadevice(suchasarouter)orpieceofsoftwarethatimplementsNATallowsanentirehomeorofficenetwork
toshareasingleinternetconnectionoverasingleIPaddress.Asinglecablemodem,DSLmodem,oreven56k
modemcouldconnectallthecomputerstotheinternetsimultaneously.Additionally,NATkeepsyourhomenetwork
fairlysecurefromhackers.NATisbuiltintothemostcommonInternetConnectionSharingtechnologies.
PATPortAddressTranslationisafeatureofanetworkdevicethattranslatesTCPorUDPcommunicationsmade
betweenhostsonaprivatenetworkandhostsonapublicnetwork.ItallowsasinglepublicIPaddresstobeusedby
manyhostsonaprivatenetwork.
SNATSecureNetworkAddressTranslationanextensionofthestandardNetworkAddressTranslation(NAT)
service.SNATisdonethroughonetooneIPaddresstranslationofoneinternalIPaddresstooneexternalIP
addresswhereNATiseffectivelyoneexternaladdresstomanyinternalIPaddresses.
DHCPDynamicHostConfigurationProtocolprovidesasolutionthatautomaticallyassignsIPaddressesto
computersonanetwork.WhenaclientisconfiguredtoreceiveanIPaddressautomatically,Itwillsendouta
broadcasttotheDHCPserverrequestinganaddress.Theserverwillthenissuea"lease"andassignittothatclient.
SomeofthebenefitsofDHCPincludethefollowing:
PreventsusersfrommakinguptheirownIPaddresses.
Preventsincorrectgatewayorsubnetmasksfrombeingentered.
Decreasesamountoftimespentconfiguringcomputersespeciallyinenvironmentswherecomputersget
movedaroundallthetime.
APIPAStandsforAutomaticPrivateInternetProtocolAddressing.Clientsystemsthatareconfiguredfor
automaticIPaddressassignment/dynamicIPassignmentwillattempttouseDHCPtomakearequestforanIP
addressleaseforagivennetwork.WhentheDHCPserverisunavailabletheserviceontheclientwillautomatically
configurethesystemwithanAPIPAIPaddressinthe169.254.0.1through169.254.255.254addressrangewitha
subnetmaskof255.255.0.0.
Unicastthesendingofinformationpacketstoasinglenetworknode.Thistypeofnetworktransmissionisused
whereaprivateoruniqueresourcesuchasmediaserversarebeingrequestedfortwowayconnectionsthatare
neededtocompletethenetworkcommunication.Sointhemediaserverexample,aclientsystemmaymakethe
requestforstreamingcontentfromthesinglesourceandtherespondingsystemmayleverageunicastaspartof
theresponsetothesessionrequesttodeliverthecontent.
Multicastasinglesourceaddressrespondingtomultipledestinationaddresseswithinformationtobesent.Ina
mediaserverexample,thesinglesourceaddressmayneedtosendthedatatomultipleclientsitdoesthisby
sendingthedatawithmultipledestinationIPaddresses.Alltheclientsthatseethisnetworktrafficwillcheckto
seeifitismeantforthemwiththesuppliedinformation.Ifitisnottheclientdoesnotreceivethedata.Ifa
networknodedoesseethatthedataisintendedforthemthedevicewillrespondbyreceivingthepacket.
Broadcasttrafficsentoutfromanetworknodethatwillreacheveryothernodeonthesubnet/broadcast
domainbecausethemessageissentwiththeintentofreachingallnodes.Thenetworknodethatissendingthe
trafficwillusethebroadcastaddressforthatsubnetandeverydeviceinthatbroadcastdomainwillreceivethe
broadcastinformation.GenerallythebroadcastaddressisthelastIPaddressofthatsegment.Asanexample,in
theIPaddressrangeof192.168.0.0thisbroadcastaddresswouldbe192.168.255.255andthetrafficwouldreach
allavailablenodesonthesubnet.Additionally255.255.255.255couldbeusedwhichisthebroadcastaddressof
thezeronetwork(0.0.0.0).InternetProtocolstandardsoutlinethatthezeronetworkstandsforthelocalnetwork
soonlythosenodeonthelocalnetworkwouldhearthebroadcasttrafficacrossthe255.255.255.255address.
Domain1.5:CommonIPv4andIPv6RoutingProtocols
LinkStateroutingprotocolsareoneofthetwomainclassesofroutingprotocolsusedinpacketswitching
networksandincludesprotocolssuchasOpenShortestPathFirst(OSPF)andIntermediateSystemtoIntermediate
System(ISIS).Thelinkstateprotocolisperformedoneveryrouteronthenetwork,whereeveryroutingnode
constructsamapoftheconnectivitytothenetworkbyshowingwhichnodesareconnectedtoeachother.Each
routercalculatesthenextbestlogicalhopfromittoeverypossibleknowndestinationwhichformsthenode's
routingtable.
OpenShortestPathFirst(OSPF)isadynamicroutingprotocolandisusedonInternetProtocol(IP)
basednetworksofallsizeslargetosmall.OSPFisaninteriorgatewayprotocol(IGP)thatroutesIPpackets
withinasingleroutingdomainandwasdesignedtosupportvariablelengthsubnetmasking(VLSM)and
ClasslessInterDomainRouting(CIDR)addressing.
IntermediateSystemtoIntermediateSystem(ISIS)alinkstateprotocolthatoperatesby
forwardingnetworktopologyinformationthroughoutanetworkofrouters.Eachrouterthenindependently
buildsapictureofthenetwork'stopologybasedonthedatareceivedandthebesttopologicalpaththrough
thenetworktothedestination.ISISisanInteriorGatewayProtocol(IGP)typicallyusedonlargernetworks.
Distancevectorroutingprotocolsareoneofthetwomainclassesofroutingprotocolsusedinpacket
switchingnetworksandincludesRoutingInformationProtocol(RIP)andInteriorGatewayRoutingProtocol(IGRP).
usesdistanceasonefactorandthevectorastheothertodetermineagainsttheknownroutingtablestodeliver
datatosourceanddestinationlocations.Routersusingthedistancevectorroutingprotocolwillupdateother
routersoftopologychangesperiodicallywhenachangeisdetectedinthetopologyofanetwork.
RoutingInformationProtocol(RIPv1)RIPisadistancevectorroutingprotocolusinghopcountasa
routingmetric.ThemaximumnumberofhopsallowedforRIPis15whicheffectivelylimitsthesizeof
networksthatRIPcansupport.
RoutingInformationProtocol(RIPv2)improveduponRIPv1byhavingtheabilitytoincludesubnet
informationwithitsupdateswhichallowsforClasslessInterDomainRouting(CIDR)support.The30second
proactivebroadcasthasbeeneliminatedinfavorofmulticastadvertisementsforitsupdates.The15hop
countlimitremainssothatthedevicesarebackwardscompatiblewithRIPv1devices.
BorderGatewayProtocol(BGP)isthecoreroutingprotocoloftheInternet.ItmaintainsatableofIP
networksandthedatathatdesignateswhereandhowtoreacheachnetworkthroughautonomoussystems
(AS).BGPmakesroutingdecisionsbasedonpath,networkpoliciesand/orrulesets.
EnhancedInteriorGatewayRoutingProtocol(EIGRP)aproprietaryhybridprotocolfromCiscothat
isadistancevectorroutingprotocolthatfunctionslikealinkstateroutingprotocol.EIGRPcollects
informationandstoresitinthreetablestheNeighborTablewhichstorestheinformationaboutneighboring
routers,theTopologyTablewhichcontainsonlytheinformationanddataregardingtheroutingtablesfrom
directlyconnectedneighborsandtheRoutingtablewhichstorestheactualroutestoalldestinations.
Domain1.6:ThePurposeandPropertiesofRouting
InteriorGatewayProtocol(IGP)routingprotocolthatisusedwithinanautonomoussystemwhichis
sometimesreferredtoasanadministrativedomain.OnetypeofInteriorGatewayProtocolaretheDistancevector
routingprotocolssuchasRoutingInformationProtocol(RIP),InteriorGatewayRoutingProtocol(IGRP)and
EnhancedInteriorGatewayRoutingProtocol(EIGRP).AnothertypearetheLinkstateroutingprotocolssuchas
OpenShortestPathFirst(OSPF)andIntermediatesystemtointermediatesystem(ISIS)
ExteriorGatewayProtocol(EGP)routingprotocolthatisusedacrossdifferentautonomoussystems/
administrativedomains.ItwastheroutingprotocolleveragedforInternetconnecteddevicesintheearly1980s.
BorderGatewayProtocol(BGP)isthereplacementstandardforInternetroutingoverEGP.
StaticRouterUpdatesarouterwithmanuallyconfiguredroutingtables.Forthesetypesofdevices,anetwork
administratorwillmanuallybuildandmakeupdatestotheroutingtableforallroutesintheadministrativedomain.
Staticroutersarebestsuitedforsmallinternetworksduetotheneedofthemanualadministration,theydonot
scalewelltolargenetworkswhereroutinginformationisoftenchanged,updatedandappended.Staticroutersare
notfaulttolerantbecausewhenanothernetworkdevicegoesdownthemanuallyinputinformationmaynot
necessarilyprovidealternatepathingtoadestinationwhichmakesitunreachable(unlessquick,manual
administrativeupdatesaremade.)
DynamicRouterUpdatesArouterwithdynamicallyconfiguredroutingtables.Thistypeofautomatic
configurationismadeupofroutingtablesthatarebuiltandmaintainedbyongoingcommunicationbetweenthe
routersonly(bydefaultthisdoesnotincludeinitialsetupandconfigurationoradministrativeneedsfora
persistentrouteconfiguration).Dynamicroutingisfaulttolerantifarouterorlinkgoesdown,therouterssense
thechangeinthenetworktopologywhenthelearnedrouteexpiresintheroutingtableandcannotberenewed
duetotheoutage.Thischangeisthendisseminatedtootherrouterssothatalltherouterslearnofthenetwork
changes.RoutingInformationProtocol(RIP)andOpenShortestPathFirst(OSPF)routingprotocolsforIPandRIP
forIPXaresomeofexamplesofprotocolsthatcanbeusedforthesedynamicupdates.
NextHopdefinedasthenextplacethatadatapacketneedstogo.Inmostcases,routersdonotneedallofthe
informationregardingwheretheoriginatingsourceofthedatatransmissionwas.Inmostcasesroutersjustneed
toknowwheretheredataneedstogonextandthenextreferredtoasthenexthopbecausealltheyaretrying
todoisdeliverittothespecifieddestinationIPaddressthatisincludedintheheaderinformationofthedatabeing
sent.IfthatrouteristhelasthopandcandeliverittothespecifiedIPaddressitdoesotherwiseitreferstoits
routingtablestofigureoutwhichroutertohanditofftointheefforttogetthedatapacketwhereitneedstogo.
RoutingTablessometimesreferredtoasaRoutingInformationBase(RIB),isthedatabaseinformationthat
storesalltheroutinformationfortheroutingnetworkdevices.Theroutingtableholdstherouteinformation
regardingthetopologyofthenetworkimmediatelyaroundthedevicetoothernetworkdestinationsanditwilloften
includethemetric/costassociatedfortheroute.Therearethreemainrouteentriesthataregenerallyfoundin
theroutingtablesNetworkRoute,HostRouteandtheDefaultRoute.TheNetworkRouteisroutetoaspecific
NetworkIDonthenetwork.TheHostRouteisaroutetoaspecificnetworkaddress.ADefaultrouteisthepath
usedifaphysicalrouterorothernetworkroutingdevicecannotfindarouteforthespecifieddestination.
Convergenceachievedwhenalloftheavailabletopologyinformationfromroutingdeviceshavebeenpassed
alongtoalloftheotherdeceivesintotalityandallwhentheinformationgatheredisnotinacontradictionstateto
anyotherrouter'sinformedtopologyinformation.Whenallofthenetworkroutingdevices"agree"onwhatthe
networktopologylookslikeitissaidtohavefullconvergence.
Domain1.7:CharacteristicsofWirelessStandards
WirelessnetworksallowcomputerstocomunicatewithouttheuseofcablesusingIEEE802.11standards,also
knownasWiFi.Aconnectionismadefromadevice,whichisusuallyaPCoraLaptopwithawirelessnetwork
interfacecard(NIC),andanAccessPoint(AP),whichactsasabridgebetweenthewirelessstationsandDistribution
System(DS)orwirednetworks.An802.11wirelessnetworkadaptercanoperateintwomodes,AdHocand
Infrastructure.Ininfrastructuremode,allyourtrafficpassesthroughawirelessaccesspoint.InAdhocmodeyour
computerstalkdirectlytoeachotheranddonotneedanaccesspoint.Thetablebelowshowsthevarious
standards.
Standard Speed
Distance Frequency
802.11a
54mbps
100ft
5GHz
802.11b
11mbps
300ft
2.4GHz
802.11g
54mbps
300ft
2.4GHz
802.11n
540mbps 600ft
5GHzand/or2.4GHz
AuthenticationandEncryption:
WEPWiredEquivalentPrivacyisasecurityencryptionalgorithmthatiseasilycracked.Forthisreason,it
hasbeenreplacedbyothertechnologies.
WPATheoriginalWPAstandardusedTKIP,butwaslaterreplacedbyWPA2whichusesamoresecureAES
basedalgorithm.WPAusesa256bitkeytoencryptdata.Thiskeymaybeenteredeitherasastringof64
hexadecimaldigits,orasapassphraseof8to63characters.Itissusceptibletobruteforceattackswhena
weakpassphraseisused.
RADIUSRemoteAuthenticationDialInUserService(RADIUS)isanetworkingprotocolthatprovides
centralizedAuthentication,Authorization,andAccounting(AAA)managementforcomputerstoconnectand
useanetworkservice.RADIUSisoftenusedbyISPsandenterprisestomanageaccesstotheInternetor
internalnetworks,andwirelessnetworks.Microsoft'sanswertocorporatewirelesssecurityistheuseof
RADIUSauthenticationthroughitsInternetAuthenticationServices(IAS)product.
TKIPTemporalKeyIntegrityProtocolwasdesignedasasolutiontoreplaceWEPwithoutrequiringthe
replacementoflegacyhardware.TKIPsufferedfromsimilarflawsasWEPandhasbeenreplacedbymore
secureencryptionschemes.
Domain2.0:NetworkMediaandTopologies
Domain2.1:StandardCableTypesandTheirProperties
CableTypes:
Type
Description
CAT3
Unshieldedtwistedpaircapableofspeedsupto10Mbit/s.Usedwith10BaseT,100BaseT4,and
100BaseT2Ethernet.
CAT4
Unshieldedtwistedpaircapableofspeedsupto20Mbit/s.Notwidelyused.Usedwith10BaseT,
100BaseT4,and100BaseT2Ethernet.
CAT5
Unshieldedtwistedpaircapableofspeedsupto100Mbit/s.Maybeusedwith10BaseT,100BaseT4,
100BaseT2,and100BaseTXEthernet.
CAT5e
EnhancedCat5issimilartoCAT5,butexceedsitsperformance.Improveddistanceoverprevious
categoriesfrom100mto350m.Maybeusedfor10BaseT,100BaseT4,100BaseT2,100BaseTXand
1000BaseTEthernet.
CAT6
Cantransmitdataupto220matgigabitspeeds.IthasimprovedspecificationsforNEXT(NearEnd
CrossTalk),PSELFEXT(PowerSumEqualLevelFarEndCrossTalk),andAttenuation.Cat6is
backwardcompatiblewithlowerCategorygradesandsupportsthesameEthernetstandardsasCat
5e.
Multimode Multimodefibershavelargecores.Theyareabletocarrymoredatathansinglemodefibersthough
Fiber
theyarebestforshorterdistancesbecauseoftheirhigherattenuationlevels.
Single
Mode
Fiber
SingleModefibershaveasmallglasscore.SingleModefibersareusedforhighspeeddata
transmissionoverlongdistances.Theyarelesssusceptibletoattenuationthanmultimodefibers.
RG59and Thesearebothshieldedcoaxialcablesusedforbroadbandnetworking,cabletelevision,andother
RG6
uses.
Serial
Aserialcableisacablethatcanbeusedtotransferinformationbetweentwodevicesusingserial
communication,oftenusingtheRS232standard.TypicallyuseDsubminiatureconnectorswith9or
25pins.Cablesareoftenunshielded,althoughshieldingcablesmayreduceelectricalnoiseradiatedby
thecable.
Shieldedtwistedpair(STP)differsfromUTPinthatithasafoiljacketthathelpspreventcrosstalk.Crosstalk
issignaloverflowfromanadjacentwire.
EMIElectricaldevicessuchasprinters,airconditioningunits,andtelevisionmonitorscanbesourcesof
electromagneticinterference,orEMI.SometypesofnetworkmediahavemoreresistancetoEMIthanothers.
StandardUTPcablehasminimalresistancetoEMI,whilefiberopticcableishighlyresistant.
Plenumgradecablingisrequiredifthecablingwillberunbetweentheceilingandthenextfloor(thisiscalled
theplenum).Plenumgradecablingisresistanttofireanddoesnotemitpoisonousgasseswhenburned.
SimplexSignalscanbepassedinonedirectiononly.
HalfDuplexHalfduplexmeansthatsignalscanbepassedineitherdirection,butnotinbothsimultaneously.
FullDuplexFullduplexmeansthatsignalscanbepassedineitherdirectionsimultaneously.
Domain2.2:CommonConnectorTypes
BNCThisconnectorhasfounduseswithbothbroadcasttelevisionequipmentand
computernetworks.Withregardstonetworking,thisconnectorwasusedonearly
10Base2(Thinnet)Ethernetnetworks.Ithasacenterpinconnectedtothecenter
coaxialcableconductorandametaltubeconnectedtotheoutercableshield.Arotating
ringoutsidethetubelocksthecabletothefemaleconnector.
RJ11ShortforRegisteredJack11,afourorsixwireconnectorusedprimarilyto
connecttelephoneequipmentintheUnitedStates(POTS).Thecableitselfiscalled
category1(Cat1)andisusedfordialupconnections.Modemshaverj11jacksthat
connectthemtothewalloutlet.
RJ45ShortforRegisteredJack45,itisaneightwireconnectorusedcommonlyto
connectdevicesonEthernetLANs.RJ45connectorslooksimilartoRJ11connectors
usedforconnectingtelephoneequipment,buttheyarelarger.
STTheSTconnectorisafiberopticconnectorwhichuses
aplugandsocketwhichislockedinplacewithahalftwist
bayonetlock.TheSTconnectorwasthefirststandardfor
fiberopticcabling.STConnectorsarehalfduplex.
SCTheSCconnectorisafiberopticconnectorwithapushpulllatchingmechanism
whichprovidesquickinsertionandremovalwhilealsoensuringapositiveconnection.SC
Connectorsarehalfduplex.
LCTheLCconnectorisjustlikeaSCconnectoronlyitishalfthesize.LikeSC
connectors,LCconnectorsarehalfduplex.
RS232Astandardforserialbinarydatainterconnection
betweenaDTE(Dataterminalequipment)andaDCE(Data
communicationequipment).Commonlyfoundinusewithbar
codescanners,measuringtools,andlaboratoryinstruments
aredesignedtointerfacetoacomputerusingastandard
RS232serialcableconnection.ManyoftheseusesarebeingreplacedwithUSBenableddevices.Theconnectorisa
DB9orDB25connector.
Domain2.3:CommonPhysicalNetworkTopologies
StarThestartopologyusestwistedpair(10baseTor100baseT)cablingandrequiresthatall
devicesareconnectedtoahub.Advantagesarecentralizedmonitoring,andfailuresdonotaffect
othersunlessitisthehub,easytomodify.Thedisadvantageisthatthehubisasinglepointof
failure.Ifitgoesdown,therearenocommunicationspossible.
MeshInatruemeshtopologyeverynodehasaconnectiontoeveryothernodeinthenetwork.
Afullmeshprovidesredundancyincaseofafailurebetweenlinks,butisimpracticalduethe
complexityandtheexpensiveamountofcablingrequired.
BusThistopologyisanoldoneandessentiallyhaseachofthecomputersonthenetworkdaisy
chainedtoeachother.Packetsmustpassthroughallcomputersonthebus.Thistypeischeap,
andsimpletosetup,butcausesexcessnetworktraffic,afailuremayaffectmanyusers,and
problemsaredifficulttotroubleshoot.
RingAringtopologyhasaphysicalandlogicalringandisusedonSONETandFDDInetworks
(notethatTokenRingnetworksareactuallyahybridstarringtopology).Anystationcansenda
packetaroundtheringbutonlythestationwiththetokencandoso.Thetokenispassedaround
theringgivingallstationsanopportunitytocommunicate.Thisisaveryfastandsimplenetwork.
Howeverifanypartoftheringgoesdown,theentireLANgoesdown.Ifthereisaproblemata
station,itmaybedifficulttolocateit.Ringnetworksarenotverycommon.
PointtopointThistopologygenerallyreferstoaconnectionrestrictedtotwoendpoints.Point
topointissometimesreferredtoasP2P(notthesameaspeertopeerfilesharingnetworks),or
Pt2Pt,orvariationsofthis.ExamplesofthistopologyincludeRS232serialconnectionsaswellas
lasernetworkconnectionsbetweenbuildings.
PointtoMultipointAlsoknownasP2MP,thisisamethodofcommunicationbetweenaseries
ofreceiversandtransmitterstoacentrallocation.Themostcommonexampleofthisistheuseof
awirelessaccesspointthatprovidesaconnectiontomultipledevices.
HybridHybridtopologiesarecombinationsoftheaboveandarecommononverylarge
networks.Forexample,astarbusnetworkhashubsconnectedinarow(likeabusnetwork)and
hascomputersconnectedtoeachhubasinthestartopology.
Domain2.4:WiringStandards
568Aand568BThenumber568referstotheorderinwhichtheindividualwiresinsideaCAT5cableare
terminated.Theonlydifferencebetweenthetwostandardsisthatthegreenandorangepinsareterminatedto
differentpins.Thereisnodifferenceinsignalandboththe568Aand568BareusedaspatchcordsforEthernet
connections.
StraightthroughvsCrossoverAstraightthroughcableuseseitherthe568Aor568Bwiringstandardandis
usedforconnectingdevicestorouters,hubs,switches,etc.Ancrossovercableisusedtoconnectcomputing
devicestogetherdirectly(i.e.connecting2computersdirectlytogether).Acrossovercableusesthe568Astandard
ononeendand568Bontheotherend.
RolloverRollovercable(alsoknownasCiscoconsolecable)isatypeofnullmodemcablethatismostcommonly
usedtoconnectacomputerterminaltoarouter'sconsoleport.Thiscableistypicallyflatandhasalightbluecolor.
Itgetsthenamerolloverbecausethepinoutsononeendarereversedfromtheother,asifthewirehadbeenrolled
overandyouwereviewingitfromtheotherside.
LoopbackAloopbackcableredirectstheoutputbackintoitselfandisusedfortroubleshootingpurposes(loopback
test).ThiseffectivelygivestheNICtheimpressionthatitiscommunicatingonanetwork,sinceitsabletotransmit
andreceivecommunications.
Domain2.5:WANTechnologyTypesandProperties
FrameRelayFramerelayisasecure,privatenetworkthatutilizesalogicalpathorvirtualcircuittoallocate
bandwidthforhighperformancetransmissions.Framerelayisthepremierhighspeedpacketswitchingprotocol
communicatingdata,imaging,andvoicebetweenmultiplelocations.Framerelayisavailableinarangeof
bandwidthsfrom56KbpstofullT1(1.54Mbps).
T1/T3AT1isadedicatedphoneconnectionsupportingdataratesof1.544Mbps.AT1lineactuallyconsists
of24individualchannels,eachofwhichsupports64Kbitspersecond.Each64Kbit/secondchannelcanbe
configuredtocarryvoiceordatatraffic.Mosttelephonecompaniesallowyoutobuyjustsomeoftheseindividual
channels,knownasfractionalT1access.T1linesareapopularleasedlineoptionforbusinessesconnectingtothe
InternetandforInternetServiceProviders(ISPs)connectingtotheInternetbackbone.TheInternetbackbone
itselfconsistsoffasterT3connections.T1comesineithercopperorfiberoptics.
ATMATMstandsforAsynchronousTransferModeandisahighspeed,packetswitchingtechniquethatuses
shortfixedlengthpacketscalledcells.ATMcantransmitvoice,video,anddataoveravariablespeedLANandWAN
connectionsatspeedsrangingfrom1.544Mbpstoashighas622Mbps.ATMiscapableofsupportingawiderangeof
traffictypessuchasvoice,video,imageanddata.
SONETSONETandSDHareasetofrelatedstandardsforsynchronousdatatransmissionoverfiberoptic
networks.SONETisshortforSynchronousOpticalNETworkandSDHisanacronymforSynchronousDigital
Hierarchy.SONETistheUnitedStatesversionofthestandardandSDHistheinternationalversion.SONETdefines
abaserateof51.84Mbpsandasetofmultiplesofthebaserateknownas"OpticalCarrierlevels."(OCx).Speeds
approaching40gigabitspersecondarepossible.
ISDNIntegratedServicesDigitalNetwork(ISDN)iscomprisedofdigitaltelephonyanddatatransportservices
offeredbyregionaltelephonecarriers.ISDNinvolvesthedigitalizationofthetelephonenetwork,whichpermits
voice,data,text,graphics,music,video,andothersourcematerialstobetransmittedoverexistingtelephone
wires.Thereare2typesofISDNchannels:
B(bearer)Transfersdataat64Kbps.AnISDNusuallycontains2Bchannelsforatotalof128kbps.
D(data)Handlessignallingateither16Kbpsor64Kbps(sometimeslimitedto56Kbps)whichenablestheB
channeltostrictlypassdata
Connection
Speed
Medium
ISDNBRI
64kbps/channel
Twistedpair
ISDNPRI
1,544kbps
Twistedpair
POTS
Upto56Kbps
Twistedpair
PSTN
64kbps/channel
Twistedpair
FrameRelay
56kbps45mbps
Varies
T1
1.544Mbps
Twistedpair,coaxial,oropticalfiber
ADSL
256Kbpsto24Mbps(ADSL2+)
Twistedpair
SDSL
1.544mbps
Twistedpair
VDSL
100mbps
Twistedpair
Cablemodem
512Kbpsto52Mbps
Coaxial
Satellite
1gbps(avg15mbps)
Air
T3
44.736Mbps
Twistedpair,coaxial,oropticalfiber
OC1
51.84Mbps
Opticalfiber
OC3
155.52Mbps
Opticalfiber
Wireless
1gbps
Air
ATM
10gbps
Opticalfiber
SONET
10gbps
Opticalfiber
PacketandCircuitSwitchingPacketswitchingreferstoprotocolsinwhichmessagesaredividedintopackets
beforetheyaresent.Eachpacketisthentransmittedindividuallyandcanevenfollowdifferentroutestoits
destination.Onceallthepacketsformingamessagearriveatthedestination,theyarerecompiledintotheoriginal
message.MostmodernWideAreaNetwork(WAN)protocols,includingTCP/IPandFrameRelayarebasedonpacket
switchingtechnologies.Incontrast,normaltelephoneserviceisbasedonacircuitswitchingtechnology,inwhicha
dedicatedlineisallocatedfortransmissionbetweentwoparties.Circuitswitchingisidealwhendatamustbe
transmittedquicklyandmustarriveinthesameorderinwhichitissent.Thisisthecasewithmostrealtimedata,
suchasliveaudioandvideo.Packetswitchingismoreefficientandrobustfordatathatcanwithstandsomedelays
intransmission,suchasemailmessagesandWebpages.
Domain2.6:LANTechnologyTypesandProperties
EthernetEthernetisthemostwidelyinstalledlocalareanetwork(LAN)technology.Specifiedinastandard,IEEE
802.3,EthernetwasoriginallydevelopedbyXeroxfromanearlierspecificationcalledAlohanet(forthePaloAlto
ResearchCenterAlohanetwork)andthendevelopedfurtherbyXerox,DEC,andIntel.Earlyethernetnetworks
usescoaxialconnections.Themostcommontypescurrentlyusetwistedpaircabling,however,fiberopticcablingis
becomingmuchmorecommonasstandardsandspeedsincrease.Belowaresomeoftheethernetstandards:
Connection
CableType
Type
Connector
Maximum
Speed
Length
10BaseT
Category3orbetter
UTPcable
RJ45
100
meters
(328ft)
10
mbps
100BaseTX
Cat5twistedpair
RJ45
100
meters
(328ft)
100
mbps
100BaseFX
FiberOptic
ST,SC
2000
meters
100
mbps
1000BaseT
CAT5eorhigher
RJ45
100
meters
(328ft)
1gbps
1000Base
LX
Laseroverfiber
SC
Upto
5000
meters
1gbps
1000Base
SX
Shortwavelengthlaser
overfiber
SC
Upto550
meters
1gbps
1000Base
CX
Twinaxorshorthaul
copper
9PinshieldedDsubminiatureconnector,or8pin
ANSIfiberchanneltype2(HSSC)connector.
25meters
1gbps
10GBASE
SR
Shortwavelaserover
multimodefiberoptics
LC,SC
300
meters
10
Gbps
10GBASE
LR
Laseroversinglemode
fiberoptics
LC,SC
2000
meters
10
Gbps
10GBASE
ER
Laserovereithersingle
ormultimodefiber
LC,SC
40
kilometers
10
Gbps
10GBASE
SW
Shortwavelaserover
multimodefiberoptics
LC,SC
300
meters
10
Gbps
10GBASE
LW
Laseroversinglemode
fiberoptics
LC,SC
2000
meters
10
Gbps
10GBASE
EW
Laserovereithersingle
ormultimodefiber
10GBASET
Cat5e(orhigher)
twistedpair
LC,SC
RJ45
40
kilometers
10
Gbps
100
meters
(328ft)
10
Gbps
CSMA/CD(CarrierSenseMultipleAccesswithCollisionDetection)Intheearlydaysofethernet,when
twohostswouldsendpacketsatthesametime,acollisionwouldoccur.Astandardhadtobecreatedthatwould
havethehostsfollowrulesrelatingtowhentheycouldsenddataandwhentheycouldnot.ThisstandardisCarrier
SenseMultipleAccesswithCollisionDetection,referredtoasCSMA/CD.CSMA/CDforcescomputerstolistento
thewirebeforesendinginordertomakesurethatnootherhostonthewireissending.Ifacollisionisdetected,
bothofthesenderswillsendajamsignalovertheEthernet.Thisjamsignalindicatestoallotherdevicesonthe
Ethernetsegmentthattherehasbeenacollision,andtheyshouldnotsenddataontothewire.
HowEthernetCSMA/CDWorks
Bonding(AKALinkAggregation,PortTrunking,EtherChannel,etc.)Usesmultiplenetworkcables/portsin
paralleltoincreasethelinkspeedbeyondthelimitsofanyonesinglecableorport,andtoincreasetheredundancy
forhigheravailability.
Domain2.7:CommonLogicalNetworkTopologies
PeertoPeerApeertopeernetworkisoneinwhichlacksadedicatedserverandeverycomputeractsasbotha
clientandaserver.Thisisagoodnetworkingsolutionwhenthereare10orlessusersthatareincloseproximityto
eachother.Apeertopeernetworkcanbeasecuritynightmare,becausethepeoplesettingpermissionsforshared
resourceswillbeusersratherthanadministratorsandtherightpeoplemaynothaveaccesstotherightresources.
Moreimportantlythewrongpeoplemayhaveaccesstothewrongresources,thus,thisisonlyrecommendedin
situationswheresecurityisnotanissue.P2Pfilesharingnetworksworkunderasimilararchitecture,however,
therearedifferencesbetweenthemandtheLANnetworkingarchitecture.
Client/ServerThistypeofnetworkisdesignedtosupportalargenumberofusersandusesdedicatedserver/sto
accomplishthis.Clientslogintotheserver/sinordertorunapplicationsorobtainfiles.Securityandpermissions
canbemanagedby1ormoreadministratorswhichwhosetpermissionstotheservers'resources.Thistypeof
networkalsoallowsforconvenientbackupservices,reducesnetworktrafficandprovidesahostofotherservices
thatcomewiththenetworkoperatingsystem.
VPNAvirtualprivatenetworkisonethatusesapublicnetwork(usuallytheInternet)toconnectremotesitesor
userstogether.CompaniesusesitetositeVPNtosupportcriticalapplicationstoconnectofficestoremoteusers.
Insteadofusingadedicated,realworldconnectionsuchasleasedline,aVPNuses"virtual"connectionsrouted
throughtheInternetfromthecompany'sprivatenetworktotheremotesiteoremployee.
VLANAvirtualLANisalocalareanetworkwithadefinitionthatmapsworkstationsonabasisotherthan
geographiclocation(forexample,bydepartment,typeofuser,orprimaryapplication).ThevirtualLANcontroller
canchangeoraddworkstationsandmanageloadbalancingandbandwidthallocationmoreeasilythanwitha
physicalpictureoftheLAN.Networkmanagementsoftwarekeepstrackofrelatingthevirtualpictureofthelocal
areanetworkwiththeactualphysicalpicture.
Domain2.8:InstallcomponentsofWiringDistribution
VerticalCrossConnectisalocationwithinabuildingwherecablesoriginateand/orareterminated,
reconnectedusingjumpersorpassthroughsorareconnectedtopatchpanelsorothersimilardeviceswherethe
locationsarefromupperorlowerfloorsinthebuilding.Thesecablescouldbeofmultipledifferenttypesand
mediumssuchasphonenetworks,datalines,copperbased,fiberchannel,etc.
HorizontalCrossConnectsimilartoVerticalCrossConnectlocationsthesearewithinabuildingwherecables
originateand/orareterminatedbuttheselocationsareallonthesamefloororbuildinglevel.AswithVertical
CrossConnectconfigurations,theselocationscanbeofmultipledifferentnetworktypesandmediums.
PatchPanelwallorrackmountedcollectionofdataconnectionswhereallofthenetworkmediaconverges.
Theseroomsaregenerallysomeformoftelecommunicationsclosetinafacilityanditisusedtoconnectallofthe
differenttypesofincomingandoutgoingmediatypesontheLAN.Whentheyallspanthesamefloorofabuilding
theyaresometimesreferredtoasHorizontalCrossConnectlocationsandwhentheyspandifferentlevelsofa
location/differentfloorsofabuildingtheyaresometimesreferredtoasVerticalCrossConnectlocations.Themain
PatchPanelroomwilloftenbetheconnectionpointfortheLANtobeconnectedtotheWANand/ortheinternet.
66Blockisalegacytypeofpunchdownblockusedtoconnectsetsof22through26AmericanWireGauge
(AWG)solidcopperwireinatelephonesystem.Theyhavea25pairstandardnonsplitcapacityandgenerallyare
unsuitedfortrafficanddatanetworkcommunicationsabove10megabitspersecond(Mbps).
MainDistributionFrame(MDF)isawiredistributionframeforconnectingequipmentinsideafacilitytocables
andsubscribercarrierequipmentoutsideofthefacility.Oneexampleofthisiswhereallofthephonecablinginside
afacilityisruntoplannedphonelocations(e.g.offices)backtotheMDF.Whenthelocaltelephonecompanymakes
theexternalconnectionsthenallcircuitsarecompleted.
IntermediateDistributionFrame(IDF)isanotherplacemuchlikeaHorizontalCrossConnectlocationora
VerticalCrossConnectlocationwherenetworkadministratorscanphysicallychangethenetworkmediaaroundand
wheretheycanhouseotherneedednetworkequipmentsuchasrouters,switches,repeatersandsoforth.
25Pairisagroupingof25pairsofwiresallinsideasinglecovering/housingorouterinsulationcasing.Itisbest
suitedfortelephone/voicecablerunsratherthandatacablerunsandisgenerallyusedasafeedercable.
100Pairisalargercablingsegmenttoits25paircousinbutusedinthesamemannerallofthe100pairsof
wiresareinsideasinglecovering/housingorouterinsulationcasing.Itisbestsuitedfortelephone/voicecable
runsratherthandatacablerunsandisgenerallyusedasafeedercable.
110Blockisthemoremodernreplacementofthelegacy66Blockandisusedasawiringdistributionpointfor
wiredtelephonesystems(voice)andothertypesofwirednetworking(data).Ononesideoftheblockwiresare
puncheddownintoRJ11connectorsforvoiceandRJ45connectorsfordatacommunications.
Demarcisthepointofoperationalandadministrativecontrolchangeinanetwork.Oneexampleofthisisthe
MainDistributionFrame(MDF)pointinafacility.Thisiswherethewiredistributionframeforconnectingequipment
insideafacilitytocablesandsubscribercarrierequipmentoutsideofthefacilityoccursandthisisconsidereda
demarcationpointoftheoperationalcontroloftheinternalsystemswhereitchangesovertothecontrolofthe
externalpresence.
DemarcExtensionwheretheendofthelineoftheexternaladministrativecontrolisextendedbeyondthat
actualendpoint.Exampleyouareonebusinessinsideofalargehighrisebuildingonthe15thflooronlyandthe
MainDistributionFrame(MDF)pointisonthegroundfloor.YourresponsibilityprobablyendsattheIntermediate
DistributionFrame(IDF)onyourfloorandtheexternaladministration(examplePhoneCompany)endsatthe
MainDistributionFrame(MDF)onthegroundfloor.Thebuildingadministrationownsallthecablingresponsibility
betweentheMainDistributionFrame(MDF)onthegroundfloorandyourIntermediateDistributionFrame(IDF)on
yourfloor.ThatcablingiseffectivelytheDemarcExtension
SmartJackisanetworkconnectiondevicethatisusedtoconnectyourinternalnetworktoanexternalservice
providernetwork.Thedevicehandlesallofthecodeandprotocoldifferencesbetweenthetwonetworksandisoften
theactualdemarcationpointbetweenthetwoserviceentities.
WiringInstallationisthephysicalinstallationofinternalwiringinafacility.Thismaybethepullsofcopper
phoneanddatalinestotherunningoffiberopticmediumfromthedifferentcrossconnectlocations.
WiringTerminationistheendpointofnetworkedcablerunsthatwillgenerallyendeitherinapatchpanelora
jacklocationinanoffice.ThishashistoricallybeenthecopperwirerunsassociatedwithphonelinestotheRJ11
jacks/blockstothedatalinesontheRJ45connections.Wireterminationisalsoaconsiderationonfiberopticpulls
aswellwhichrequiresahighersetofskilllevel.
Domain3.0:NetworkDevices
Domain3.1:CommonNetworkDevices
HubAphysicallayernetworkdeviceusedtoconnectmultipleEthernetdevicestogether.
Activehubsactasarepeaterandboostthesignalinordertoallowforittotravelfarther,while
passivehubssimplypassthesignalthrough.Mosthubshaveanuplinkportthatallowsthem
toconnecttootherhubs,arouter,orothernetworkdevices.
Repeater:Aphysicallayerdevicethatboostssignalsin
ordertoallowasignaltotravelfartherandprevent
attenuation.Attentuationisthedegradationofasignalasittravelsfartherfrom
itsorigination.Repeatersdonotfilterpacketsandwillforwardbroadcasts.Both
segmentsmustusethesameaccessmethod,whichmeansthatyoucan't
connectatokenringsegmenttoanEthernetsegment.Repeaterscanconnectdifferentcabletypesasshownin
theimage.
ModemThemodemisadevicethatconvertsdigitalinformationtoanalogbyMODulatingiton
thesendingendandDEModulatingtheanaloginformationintodigitalinformationatthe
receivingend.Mostmodernmodemsareinternal,however,theycanbeinternalorexternal.
ExternalmodemsareconnectedtothebackofthesystemboardviaaRS232serialconnection.
Internalmodemsareinstalledinoneofthemotherboard'sPCIorISAexpansionslotsdepending
onthemodem.ThemodemcontainsanRJ11connectionthatisusedtopluginthetelephoneline.Modemshave
differenttransmissionmodesasfollows:
SimplexSignalscanbepassedinonedirectiononly.
HalfDuplexHalfduplexmeansthatsignalscanbepassedineitherdirection,butnotinboth
simultaneously.Halfduplexmodemscanworkinfullduplexmode.
FullDuplexFullduplexmeansthatsignalscanbepassedineitherdirectionsimultaneously.
ModemscanalsobeclassifiedbytheirspeedwhichismeasuredbytheBAUDrate.Onebaudisoneelectronicstate
changepersecond.Sinceasinglestatechangecaninvolvemorethanasinglebitofdata,theBitsPerSecond(BPS)
unitofmeasurementhasreplaceditasabetterexpressionofdatatransmissionspeed.Commonmodemspeeds
areV.34at28.8kbps,V.34+at33.6kbpsandV.90at56Kbps.
NetworkInterfaceCardANetworkInterfaceCard,oftenabbreviatedasNIC,isan
expansionboardyouinsertintoacomputersothecomputercanbeconnectedtoa
network.MostNICsaredesignedforaparticulartypeofnetwork,protocolandmedia,
althoughsomecanservemultiplenetworks.
MediaConverterssimplenetworkingdevicesthatmakeit
possibletoconnecttwodissimilarmediatypessuchastwisted
pairwithfiberopticcabling.Theywereintroducedtotheindustrynearlytwodecadesago,
andareimportantininterconnectingfiberopticcablingbasedsystemswithexisting
copperbased,structuredcablingsystems.TheyarealsousedinMANaccessanddata
transportservicestoenterprisecustomers.Fibermediaconverterssupportmanydifferent
datacommunicationprotocolsincludingEthernet,FastEthernet,GigabitEthernet,
T1/E1/J1,DS3/E3,aswellasmultiplecablingtypessuchascoax,twistedpair,multimodeandsinglemodefiber
optics.MediaconvertertypesrangefromsmallstandalonedevicesandPCcardconverterstohighportdensity
chassissystemsthatoffermanyadvancedfeaturesfornetworkmanagement.
SwitchAswitchisanetworkdevicethatfiltersandforwardspacketsbetween
LANsegmentsandensuresthatdatagoesstraightfromitsorigintoitsproper
destination.Switchesremembertheaddressofeverynodeonthenetwork,and
anticipatewheredataneedstogo.Aswitchonlyoperateswiththecomputerson
thesameLAN.Thisreducescompetitionforbandwidthbetweendevicesonthe
network.Itisn'tsmartenoughtosenddataouttotheinternet,oracrossaWAN.Thesefunctionsrequirearouter.
BridgeFunctionsthesameasarepeater,butcanalsodivideanetworkinorderto
reducetrafficproblems.Abridgecanalsoconnectunlikenetworksegments(ie.tokenring
andethernet).Bridgescreateroutingtablesbasedonthesourceaddress.Ifthebridge
can'tfindthesourceaddressitwillforwardthepacketstoallsegments.Bridging
methods:
TransparentOnlyonebridgeisused.
SourceRouteBridgingaddresstablesarestoredoneachPConthenetwork
SpanningTreePreventsloopingwherethereexistsmorethanonepathbetweensegments
WirelessAccessPointAWirelessAccessPointisaradiofrequencytransceiverwhichallowsyour
wirelessdevicestoconnecttoanetwork.TheWAPusuallyconnectstoawirednetwork,andcan
relaydatabetweenthewirelessdevices(suchascomputersorprinters)andwireddevicesonthe
network.Awirelessaccesspointwillsupportupto32wirelessdevices.Therangeofthewireless
signaldependsgreatlyonobstructionssuchaswalls.Formoreinformationaboutwireless
standards,seedomain1.7.
RouterFunctioningatthenetworklateroftheOSImodel,arouteris
similartoaswitch,butitcanalsoconnectdifferentlogicalnetworksor
subnetsandenabletrafficthatisdestinedforthenetworksontheother
sideoftheroutertopassthrough.Routerscreateormaintainatableof
theavailableroutesandcanbeconfiguredtousevariousroutingprotocolstodeterminethebestrouteforagiven
datapacket.Routerscanconnectnetworksthatusedisimilarprotocols.Routersalsotypicallyprovideimproved
securityfunctionsoveraswitch.
FirewallEitherahardwareorsoftwareentity(oracombinationofboth)that
protectsanetworkbystoppingnetworktrafficfrompassingthroughit.Inmost
cases,afirewallisplacedonthenetworktoallowallinternaltraffictoleavethe
network(emailtotheoutsideworld,webaccess,etc.),butstopunwantedtraffic
fromtheoutsideworldfromenteringtheinternalnetwork.Thisisachievedby
grantinganddenyingaccesstoresourcesbasedonasetofconfigurablerules.
DHCPServerAserverthatisresponsibleforassiginguniqueIPaddresstothe
computersonanetwork.ADHCPserverpreventstheassignmentofduplicateIP
addressestoclientsandreducesadministrativeeffortinnetworkconfiguration.ADHCPserverisactuallymoreofa
servicethatisfoundonnetworkoperatingsystemssuchasWindows2002/2008server,oronnetworkdevices
suchasrouters.
Domain3.2:SpecializedNetworkDevices
MultilayerSwitchAmultilayerswitch(MLS)isacomputernetworkingdevicethatswitchesonOSIlayer2like
anordinarynetworkswitchandprovidesextrafunctionsonhigherOSIlayers.SomeMLSsarealsoabletoroute
betweenVLANand/orportslikeacommonrouter.Theroutingisnormallyasquickasswitching(atwirespeed).
SomeswitchescanuseuptoOSIlayer7packetinformationtheyarecalledlayer47switches,contentswitches,
webswitchesorapplicationswitches.
ContentSwitchThemainfunctionofacontentswitchistoinspectthenetworkdatathatitreceivessothatit
candecidewhereonthenetworkthatdata(orrequest)needstobeforwardedto.Oncethisisdeterminedthedata
issenttotheappropriateserverwhichcanhandlethedata.Inmostcasestheswitchlookstoseewhattypeof
applicationorsoftwaretherequestistargetedat.Itdoesthisbylookingtoseewhatporttherequestsisdirected
at.Forexampleifthedataistargetedatanftpportthentherequestwillbesenttoanftpsever.Themainbenefit
ofthisapproachisthattheswitchactsasaloadbalancerasitcanbalancedataorrequestsacrossthedifferent
typeofapplicationserversusedbythebusiness.Asecondmajorfunctionthatthistypeofswitchcanperformisto
lookattheincomingrequestsandseewhichwebsitesaretargeted.Thisisimportantforlargeenterprisesor
hostingcompanies.Ifforexampleawebhostingcompanywashostingseveralthousandwebsitestheswitchcould
directrequeststothespecificserversthatthewebsitesarerunningon.Thesedevicestendtobeveryexpensive.
IDS/IPSThesetermsstandforIntrusionDetectionSystemandIntrusionPreventionSystemrespectively.IDSis
adevice(orapplication)thatmonitorsnetworkand/orsystemactivitiesformaliciousactivitiesorpolicyviolations.
IDSisapassivesystemthatgivesalertswhensomethingsuspiciousisdetectedandlogstheeventsintoadatabase
forreporting.IPS,ontheotherhand,sitsinlinewithtrafficflowsonanetwork,activelyshuttingdownattempted
attacksastheyresentoverthewire.Itcanstoptheattackbyterminatingthenetworkconnectionorusersession
originatingtheattack,byblockingaccesstothetargetfromtheuseraccount,IPaddress,orotherattribute
associatedwiththatattacker,orbyblockingallaccesstothetargetedhost,service,orapplication.Vendorsare
increasinglycombiningthetwotechnologiesintoasinglebox,nowreferredtoasIDPS.Thesedevicesareused
with,notinsteadof,afirewall.
LoadBalancerAloadbalancerisahardwareand/orsoftwaresolutionthatprovidesloadbalancingservices.Load
balancingisusedtodistributeworkloadsevenlyacrosstwoormorecomputers,networklinks,CPUs,harddrives,or
otherresources,inordertogetoptimalresourceutilization,maximizethroughput,minimizeresponsetime,and
avoidoverload.Usingmultiplecomponentswithloadbalancing,insteadofasinglecomponent,mayincrease
reliabilitythroughredundancy.Asanexample,Googlereceivesmany,manymoresearchrequeststhanasingle
servercouldhandle,sotheydistributetherequestsacrossamassivearrayofservers.
MutlifunctionNetworkDevicesAsyoumightguess,multifunctionnetworkdevicescombinethefunctionof
individualdevicesintoasingleunit.Anexampleiswirelessaccesspointswhichoftenincludeoneormoreofthe
following:firewall,DHCPserver,wirelessaccesspoint,switch,gateway,androuter.
DNSServerDNSisanInternetandnetworkingservicethattranslatesdomainnamesintoIPaddresses.The
internetisbasedonnumericalIPaddresses,butweusedomainnamesbecausetheyareeasiertoremember.DNS
istheservicethatlooksuptheIPaddressforadomainnameallowingaconnectiontobemade.Thisprocessisvery
similartocallinginformation.Youcallthemwithaname,theychecktheirdatabaseandgiveyouthephone
number.TheDNSserviceisincludedwithserveroperatingsystems(Windows2003/2008,Linux,etc.)andnetwork
devicessuchasrouters.
BandwidthShaperDescribesthemechanismsusedtocontrolbandwidthusageonthenetwork.Bandwidth
shapingistypicallydoneusingsoftwareinstalledonanetworkserver.Fromthisserver,administratorscancontrol
whousesbandwidth,forwhat,andwhen.Bandwidthshapingestablishesprioritiestodatatravelingtoandfromthe
Internetandwithinthenetwork.Abandwidthshaperessentiallyperformstwokeyfunctions:monitoringand
shaping.Monitoringincludesidentifyingwherebandwidthusageishighandatwhattimeofday.Afterthat
informationisobtained,administratorscancustomizeorshapebandwidthusageforthebestneedsofthenetwork.
IamunawarewhyCompTIAlistedthisinthe"networkdevices"sectionoftheirobjectives,butbandwidthshapers
aretypicallysoftware.
ProxyServerAproxyserveractsasamiddlemanbetweenclientsandtheInternetprovidingsecurity,
administrativecontrol,andcachingservices.Whenausermakesarequestforaninternetserviceanditpasses
filteringrequirements,theproxyserverlooksinitslocalcacheofpreviouslydownloadedwebpages.Iftheitemis
foundincache,theproxyserverforwardsittotheclient.Thisreducesbandwidththroughthegateway.Ifthepage
isnotinthecache,theproxyserverwillrequestthepagefromtheappropriateserver.Nowadays,thefunctionsof
proxyserversareoftenbuiltintofirewalls.
CSU/DSUAChannelServiceUnit/DataServiceUnit(CSU/DSU)actsasatranslatorbetweentheLANdata
formatandtheWANdataformat.SuchaconversionisnecessarybecausethetechnologiesusedonWANlinksare
differentfromthoseusedonLANs.AlthoughCSU/DSU'slooksimilartomodems,theyarenotmodems,andthey
don'tmodulateordemodulatebetweenanaloganddigital.Alltheyreallydoisinterfacebetweena56K,T1,orT3
lineandserialinterface(typicallyaV.35connector)thatconnectstotherouter.Manynewerroutershave
CSU/DSUsbuiltintothem.
Domain3.3:AdvancedFeaturesofaSwitch
PoEGenerallyspeaking,PoweroverEthernettechnologydescribesasystemtosafelypasselectricalpower,along
withdata,onEthernetcabling.StandardversionsofPoEspecifycategory5cableorhigher.Powercancomefroma
powersupplywithinaPoEenablednetworkingdevicesuchasanEthernetswitchorfromadevicebuiltfor
"injecting"powerontotheEthernetcabling.IPPhones,LANaccesspoints,andWiFiswitchestoRFIDreadersand
networksecuritycameras.AlloftheserequiremorepowerthanUSBoffersandveryoftenmustbepoweredover
longerrunsofcablethanUSBpermits.Inaddition,PoEusesonlyonetypeofconnector,an8P8C(RJ45),whereas
therearefourdifferenttypesofUSBconnectors.
SpanningTreeProtocolSpanningTreeisoneofthreebridgingmethodsanetworkadministratorcanuse.
Whichmethodyouuseusuallywillbedeterminedbythenetworkssize.Thesimplestmethodistransparent
bridging,whereonlyonebridgeorswitchexistsonthenetwork.ThenextisSourceRoute,inwhichbridging
addresstablesarestoredoneachPConthenetwork.Thenthereswhatyoucamefor,spanningtree,which
preventsloopswherethereexistsmorethanonepathbetweensegments.STPwasupgradedtoRapidSpanning
TreeProtocol(RSTP).
VLANAbroadcastdomainisnormallycreatedbytherouter.WithVLANs,aswitchcancreatethebroadcast
domain.Thisallowsavirtualnetwork,independentofphysicallocationtobecreated.
TrunkingVLANsarelocaltoeachswitch'sdatabase,andVLANinformationisnotpassedbetweenswitches.
TrunklinksprovideVLANidentificationforframestravelingbetweenswitches.TheVLANtrunkingprotocol(VTP)is
theprotocolthatswitchesusetocommunicateamongthemselvesaboutVLANconfiguration.
PortMirroringUsedonanetworkswitchtosendacopyofnetworkpacketsseenononeswitchport(oran
entireVLAN)toanetworkmonitoringconnectiononanotherswitchport.Thisiscommonlyusedfornetwork
appliancesthatrequiremonitoringofnetworktraffic,suchasanintrusiondetectionsystem.
PortAuthenticationTheIEEE802.1xstandarddefines802.1xportbasedauthenticationasaclientserver
basedaccesscontrolandauthenticationprotocolthatrestrictsunauthorizedclientsfromconnectingtoaLAN
throughpubliclyaccessibleports.Theauthenticationservervalidateseachclientconnectedtoaswitchportbefore
makingavailableanyservicesofferedbytheswitchortheLAN.
Domain3.4:ImplementaBasicWirelessNetwork
InstallClienttheactualstepstakentosetupacomputer,laptoporothernetworkconnecteddevicetothe
network.ThismaybeintheformofjustgettingitcorrectlyconfiguredtouseTCP/IPormoreinvolvedsuchas
installingasoftwaresuitesothatspecificnetworkparameterscanbeleveragedforproperconnectivitytonetwork
resourcesorresourcesonthedomain.
NetworkConnectionsDialogBoxusedtoconfiguredifferentaspectsofthenetworkconnectionsbywayofa
graphicaluserinterface(GUI)withintheMicrosoftWindowsoperatingsystems(WindowsXP,WindowsVista,Server
2003,etc).Withrespecttopeertopeernetworks,youcanusetheNetworkTaskspanetoCreateaNew
Connection,SetupaHomeorsmallofficenetworkaswellaschangetheWindowsFirewallsettingsandview
availablewirelessnetworks.
WirelessNetworkConnectionDialogBoxthegraphicaluserinterface(GUI)withintheMicrosoftWindows
operatingsystemsusedtoconfigurethewirelessdevicesandtheirsettings.OntheGeneraltabyoucanconfigure
thespecifichardwaresettings(parameters,drivers,etc)aswellastheprotocols(e.g.TCP/IP)andthenetwork
clientthatthedevicewilluse(e.g.ClientforMicrosoftNetworks).Additionally,youcaninstallservicesfromthis
screenaswell(e.g.VirtualMachineNetworkService).TheWirelessNetworkstabwillshowyoutheavailable
networksandallowyoutoconfigurepreferenceforeachofthenetworksencountered.
AccessPointPlacementcorrectlypositioningyourWirelessAccessPointswillallowfortheseamlessuseof
wirelessdevicesonyournetwork.Bycorrectlyplacingthedevices,userswillnotgenerallyexperiencesignallossof
theirconnectiontothenetwork.Itisimportanttounderstandthattherearemanythingsthataffectthewireless
accesspointsignalwithrespecttobroadcastandreceivingstrengththatincludetheconstructionandarchitecture
ofthebuildingwherethedevicesaredistributedaswellasgeneraldisruptionofthefrequencyrangethatthe
accesspointsoperateonbyotherdevices(e.g.microwaveovens,cordlessphones,etc).
PhysicalLocationsofWirelessAccessPoints(WAPs)deviceplacementbestpracticesincludeplanningfor
morethanjustnominalhalfdistancesbetweendevices.Considerationneedstobegiventowhattypeof
obstructionsmaybecurrentlyintheway(physicalfirebreaksinbetweenwallsmetalsuperstructure,etc)aswell
asfutureplanstosubdivideoffices.Electricalmotorsandotherhighercurrentcarryinglinesneedtobeconsidered
aswelltokeepinterferencetoaminimum.
WiredorWirelessConnectivityplanningforWAPtoWAPconnectionsonlyoramixofwiredandwireless
connections.ItseasiertoconnectWAPtoWAPinadaisychainsignalrelayconfigurationbutwhenyoudothisyou
needtorealizethataphysicalfailureinoneWAPdevicemaytakeoutallthedevices.Itismoreworkanditcosts
moreintimemoneyandefforttoconnecttheWAPsusingwiredconnectionsbacktoaswitchorarouterbutit
greatlyreducesthepotentialconnectivelylossonthenetworkthelossofasingleWAPwheretheWAPsarewired
backresultsinonlyimpactingtheusersofthatoneWAPinsteadofallWAPsupanddownstream.
InstallAccessPointanothertermfortheWirelessAccessPoint(s)thatwillallowyoutocorrectlygainaccessto
thenetworkwithyourdevice.Thispointontothenetworkwillallowtheclientdevicetoconfigureitselfwiththe
necessaryencryption(ifrequired)andanyothernetworkrequiredsettingsorelseriskbeingdefaultedoffthe
network.
ConfiguringEncryptionwithrespecttowirelessclientsthesearethesettingsmostcommonlyused.Disabled
simplymeansthateverythingispassedascleartext.WiredEquivalentPrivacy(WEP)isthelowestformofthe
typesofencryptionavailableandisgenerallyonlyusedtodaytoallowlegacydevicesthatcannothandlemore
robustencryptionprotocolstogainsomewhatsecuredaccesstothenetwork.WEPhasbeenchallengedand
defeatedforanumberofyearsmainlyduetotheincreaseincomputingpowerandthefactthatthekeysare
alphanumericorhexadecimalcharactersthatareconfiguredin40bit,64bit,128bit,153bitand256bitstrength.
WiFiProtectedAccess(WPA)wascreatedbytheWiFiAlliancetobettersecurewirelessnetworksandwascreated
inresponsetotheweaknessesresearchersfoundinWiredEquivalentPrivacy(WEP).TemporalKeyIntegrity
Protocol(TKIP)isusedinWPAtoencrypttheauthenticationandencryptioninformationthatwasinitiallypassedon
thewireincleartextbeforeanetworknodecouldsecureitscommunicationsonthenetwork.WiFiProtected
Accessversion2(WPA2)offersadditionalprotectionbecauseitusesthestrongestauthenticationandencryption
algorithmsavailableintheAdvancedEncryptionStandard(AES).
ConfiguringChannelsandFrequenciesmostwirelessroutersworkinthe2.4GHzfrequencyrangeand
requirenetworkadministratorstosetupthechannelsforthedevicestouse.1,6and11arethemainchannels
usedbecausetheygenerallywillnotbeinterferedwithfromotherdevicessuchascordlessphonesandBluetooth
devicesthatalsoworkatthisfrequencyrange.
SettingESSIDandBeaconExtendedServiceSetidentifier(ESSID)istheadvertisementfromtheWireless
AccessPointthatbasicallyannouncesitsavailabilityfornetworkdevicestomakeaconnection.Theannouncement
signalthatissentoutiscalledthebeacon.
VerifyingInstallationtheprocessthatisoutlinedformakingsurethatallthesettingsneededtoconnecta
networknodetothewirelessdevice.ThebestpracticestepsgenerallyincludeoninitialinstallationoftheWireless
AccessPoint(WAP)todosowithoutanysecuritytoverifythataclientcangetonthenetwork.Oncethatis
successfulyouwouldthenincorporatethesecurityprotocolthatyouwantedtouseandtomakesuretheclientcan
operateonthenetworkagain.Oncethisissuccessfullydoneitisassumedallothernetworknodeswouldbeableto
successfullyrepeatthesamestepstoaccessthenetworksecurelyandwiththetrafficencrypted.
Domain4.0:NetworkManagement
Domain4.1:OSIModel
TheOSInetworkingmodelisdividedinto7layers.Eachlayerhasadifferentresponsibility,andallthelayerswork
togethertoprovidenetworkdatacommunication.
Layer
Description
Application
Representsuserapplications,suchassoftwareforfiletransfers,databaseaccess,andemail.It
handlesgeneralnetworkaccess,flowcontrol,anderrorrecovery.Providesaconsistentneutral
interfaceforsoftwaretoaccessthenetworkandadvertisesthecomputersresourcestothe
network.
DeterminesdataexchangeformatsandtranslatesspecificfilesfromtheApplicationlayerformat
Presentation intoacommonlyrecognizeddataformat.Itprovidesprotocolconversion,datatranslation,
encryption,charactersetconversion,andgraphicscommandexpansion.
Session
Handlessecurityandnamerecognitiontoenabletwoapplicationsondifferentcomputersto
communicateoverthenetwork.Managesdialogsbetweencomputersbyusingsimplex(rare),half
duplexorfullduplex.Thephasesinvolvedinasessiondialogareasfollows:establishment,data
transferandtermination.
Transport
Providesflowcontrol,errorhandling,andisinvolvedincorrectionoftransmission/reception
problems.Italsobreaksuplargedatafilesintosmallerpackets,combinessmallpacketsintolarger
onesfortransmission,andreassemblesincomingpacketsintotheoriginalsequence.
Network
Addressesmessagesandtranslateslogicaladdressesandnamesintophysicaladdresses.Italso
managesdatatrafficandcongestioninvolvedinpacketswitchingandrouting.Itenablestheoption
ofspecifyingaserviceaddress(sockets,ports)topointthedatatothecorrectprogramonthe
destinationcomputer.
Theinterfacebetweentheupper"software"layersandthelower"hardware"Physicallayer.Oneof
itsmaintasksistocreateandinterpretdifferentframetypesbasedonthenetworktypeinuse.The
DataLinklayerisdividedintotwosublayers:theMediaAccessControl(MAC)sublayerandthe
LogicalLinkControl(LLC)sublayer.
DataLink
Physical
LLCsublayerstartsmaintainsconnectionsbetweendevices(e.g.serverworkstation).
MACsublayerenablesmultipledevicestosharethesamemedium.MACsublayermaintains
physicaldevice(MAC)addressesforcommunicatinglocally(theMACaddressofthenearest
routerisusedtosendinformationontoaWAN).
Thespecificationforthehardwareconnection,theelectronics,logiccircuitry,andwiringthat
transmittheactualsignal.Itisonlyconcernedwithmovingbitsofdataonandoffthenetwork
medium.MostnetworkproblemsoccuratthePhysicallayer.
Hereisanidiotic,yeteasywaytorememberthe7layers.Memorizethefollowing
sentence:AllPeopleSeemToNeedDataProcessing.Thefirstletterofeachwordcorrespondstothefirstletterof
thelayersstartingwithApplicationandendingwiththephysicallayer.
Domain4.3:EvaluatetheNetworkBasedonConfigurationManagement
Documentation
Thetopicscoveredinthissectionareeitheralreadycoveredelsewhere,oraretooexpansiveforthepurposesofthis
guide.Consultyourbook(s)formoreinformationaboutthesetopics.
Domain4.4:ConductNetworkMonitoringtoIdentifyPerformanceandConnectivity
Issues
Thetopicscoveredinthissectionareeitheralreadycoveredelsewhere,oraretooexpansiveforthepurposesofthis
guide.Consultyourbook(s)formoreinformationaboutthesetopics.
Domain4.5:ExplainDifferentMethodsandRationalesforNetworkPerformance
Optimization
QualityofService(QoS)isasetofparametersthatcontrolsthelevelofqualityprovidedtodifferenttypesof
networktraffic.QoSparametersincludethemaximumamountofdelay,signalloss,noisethatcanbe
accommodatedforaparticulartypeofnetworktraffic,bandwidthpriority,andCPUusageforaspecificstreamof
data.Theseparametersareusuallyagreeduponbythetransmitterandthereceiver.Boththetransmitterandthe
receiverenterintoanagreementknownastheServiceLevelAgreement(SLA).InadditiontodefiningQoS
parameters,theSLAalsodescribesremedialmeasuresorpenaltiestobeincurredintheeventthattheISPfailsto
providetheQoSpromisedintheSLA.
TrafficShaping(alsoknownas"packetshaping"orITMPs:InternetTrafficManagementPractices)isthecontrol
ofcomputernetworktrafficinordertooptimizeorguaranteeperformance,increase/decreaselatency,and/or
increaseusablebandwidthbydelayingpacketsthatmeetcertaincriteria.Morespecifically,trafficshapingisany
actiononasetofpackets(oftencalledastreamoraflow)whichimposesadditionaldelayonthosepacketssuch
thattheyconformtosomepredeterminedconstraint(acontractortrafficprofile).Trafficshapingprovidesameans
tocontrolthevolumeoftrafficbeingsentintoanetworkinaspecifiedperiod(bandwidththrottling),orthe
maximumrateatwhichthetrafficissent(ratelimiting),ormorecomplexcriteriasuchasGCRA.Thiscontrolcan
beaccomplishedinmanywaysandformanyreasonshowevertrafficshapingisalwaysachievedbydelaying
packets.Trafficshapingiscommonlyappliedatthenetworkedgestocontroltrafficenteringthenetwork,butcan
alsobeappliedbythetrafficsource(forexample,computerornetwork
cardhttp://en.wikipedia.org/wiki/Traffic_shapingcite_note2)orbyanelementinthenetwork.Trafficpolicingis
thedistinctbutrelatedpracticeofpacketdroppingandpacketmarking.
LoadBalancingisatechniquetodistributeworkloadevenlyacrosstwoormorecomputers,networklinks,
CPUs,harddrives,orotherresources,inordertogetoptimalresourceutilization,maximizethroughput,minimize
responsetime,andavoidoverload.Usingmultiplecomponentswithloadbalancing,insteadofasinglecomponent,
mayincreasereliabilitythroughredundancy.Theloadbalancingserviceisusuallyprovidedbyadedicatedprogram
orhardwaredevice(suchasamultilayerswitchoraDNSserver).
HighAvailability(akaUptime)referstoasystemorcomponentthatiscontinuouslyoperationalforadesirably
longlengthoftime.Availabilitycanbemeasuredrelativeto"100%operational"or"neverfailing."Awidelyheldbut
difficulttoachievestandardofavailabilityforasystemorproductisknownas"five9s"(99.999percent)
availability.
Sinceacomputersystemoranetworkconsistsofmanypartsinwhichallpartsusuallyneedtobepresentinorder
forthewholetobeoperational,muchplanningforhighavailabilitycentersaroundbackupandfailoverprocessing
anddatastorageandaccess.Forstorage,aredundantarrayofindependentdisks(RAID)isoneapproach.Amore
recentapproachisthestorageareanetwork(SAN).
Someavailabilityexpertsemphasizethat,foranysystemtobehighlyavailable,thepartsofasystemshouldbe
welldesignedandthoroughlytestedbeforetheyareused.Forexample,anewapplicationprogramthathasnot
beenthoroughlytestedislikelytobecomeafrequentpointofbreakdowninaproductionsystem.
CacheEngine(akaserver)isadedicatednetworkserverorserviceactingasaserverthatsavesWebpagesor
otherInternetcontentlocally.Byplacingpreviouslyrequestedinformationintemporarystorage,orcache,acache
serverbothspeedsupaccesstodataandreducesdemandonanenterprise'sbandwidth.Cacheserversalsoallow
userstoaccesscontentoffline,includingmediafilesorotherdocuments.Acacheserverissometimescalleda
"cacheengine."Acacheserverisalmostalwaysalsoaproxyserver,whichisaserverthat"represents"usersby
interceptingtheirInternetrequestsandmanagingthemforusers.Typically,thisisbecauseenterpriseresourcesare
beingprotectedbyafirewallserver.Thatserverallowsoutgoingrequeststogooutbutscreensallincomingtraffic.
Aproxyserverhelpsmatchincomingmessageswithoutgoingrequests.Indoingso,itisinapositiontoalsocache
thefilesthatarereceivedforlaterrecallbyanyuser.Totheuser,theproxyandcacheserversareinvisibleall
InternetrequestsandreturnedresponsesappeartobecomingfromtheaddressedplaceontheInternet.(The
proxyisnotquiteinvisibleitsIPaddresshastobespecifiedasaconfigurationoptiontothebrowserorother
protocolprogram.)
Faulttolerancedescribesacomputersystemorcomponentdesignedsothat,intheeventthatacomponent
fails,abackupcomponentorprocedurecanimmediatelytakeitsplacewithnolossofservice.Faulttolerancecan
beprovidedwithsoftware,orembeddedinhardware,orprovidedbysomecombination.Inthesoftware
implementation,theoperatingsystemprovidesaninterfacethatallowsaprogrammerto"checkpoint"criticaldata
atpredeterminedpointswithinatransaction.Inthehardwareimplementation(forexample,withStratusandits
VOSoperatingsystem),theprogrammerdoesnotneedtobeawareofthefaulttolerantcapabilitiesofthe
machine.
Atahardwarelevel,faulttoleranceisachievedbyduplexingeachhardwarecomponent.Disksaremirrored.Multiple
processorsare"lockstepped"togetherandtheiroutputsarecomparedforcorrectness.Whenananomalyoccurs,
thefaultycomponentisdeterminedandtakenoutofservice,butthemachinecontinuestofunctionasusual.
ParametersInfluencingQOS
Bandwidthistheaveragenumberofbitsthatcanbetransmittedfromthesourcetoadestinationoverthe
networkinonesecond.
Latency(AKA"lag")istheamountoftimeittakesapacketofdatatomoveacrossanetworkconnection.
Whenapacketisbeingsent,thereis"latent"time,whenthecomputerthatsentthepacketwaitsforconfirmation
thatthepackethasbeenreceived.Latencyandbandwidtharethetwofactorsthatdetermineyournetwork
connectionspeed.Latencyinapacketswitchednetworkismeasuredeitheroneway(thetimefromthesource
sendingapackettothedestinationreceivingit),orroundtrip(theonewaylatencyfromsourcetodestinationplus
theonewaylatencyfromthedestinationbacktothesource).Roundtriplatencyismoreoftenquoted,becauseit
canbemeasuredfromasinglepoint.Notethatroundtriplatencyexcludestheamountoftimethatadestination
systemspendsprocessingthepacket.Manysoftwareplatformsprovideaservicecalledpingthatcanbeusedto
measureroundtriplatency.Pingperformsnopacketprocessingitmerelysendsaresponsebackwhenitreceivesa
packet(i.e.performsanoop),thusitisarelativelyaccuratewayofmeasuringlatency.
Whereprecisionisimportant,onewaylatencyforalinkcanbemorestrictlydefinedasthetimefromthestartof
packettransmissiontothestartofpacketreception.Thetimefromthestartofpackettransmissiontotheendof
packettransmissionatthenearendismeasuredseparatelyandcalledserializationdelay.Thisdefinitionoflatency
dependsonthethroughputofthelinkandthesizeofthepacket,andisthetimerequiredbythesystemtosignal
thefullpackettothewire.
Someapplications,protocols,andprocessesaresensitivetothetimeittakesfortheirrequestsandresultstobe
transmittedoverthenetwork.Thisisknownaslatencysensitivity.Examplesoflatencysensitiveapplications
includeVOIP,videoconferencing,andonlinegames.InaVOIPdeployment,highlatencycanmeananannoying
andcounterproductivedelaybetweenaspeakerswordsandthelistenersreceptionofthosewords.Network
managementtechniquessuchasQoS,loadbalancing,trafficshaping,andcachingcanbeusedindividuallyor
combinedtooptimizethenetworkandreducelatencyforsensitiveapplications.Byregularlytestingforlatencyand
monitoringthosedevicesthataresusceptibletolatencyissues,youcanprovideahigherlevelofservicetoend
users.
JitterJitteristhedeviationinordisplacementofsomeaspectofthepulsesinahighfrequencydigitalsignal.As
thenamesuggests,jittercanbethoughtofasshakypulses.Thedeviationcanbeintermsofamplitude,phase
timing,orthewidthofthesignalpulse.Anotherdefinitionisthatitis"theperiodfrequencydisplacementofthe
signalfromitsideallocation."Amongthecausesofjitterareelectromagneticinterference(EMI)andcrosstalkwith
othersignals.Jittercancauseadisplaymonitortoflickeraffecttheabilityoftheprocessorinapersonalcomputer
toperformasintendedintroduceclicksorotherundesiredeffectsinaudiosignals,andlossoftransmitteddata
betweennetworkdevices.Theamountofallowablejitterdependsgreatlyontheapplication.
PacketLossisthefailureofoneormoretransmittedpacketstoarriveattheirdestination.Thiseventcan
causenoticeableeffectsinalltypesofdigitalcommunications.
Theeffectsofpacketloss:
Intextanddata,packetlossproduceserrors.
Invideoconferenceenvironmentsitcancreatejitter.
Inpureaudiocommunications,suchasVoIP,itcancausejitterandfrequentgapsinreceivedspeech.
Intheworstcases,packetlosscancauseseveremutilationofreceiveddata,brokenupimages,unintelligible
speechoreventhecompleteabsenceofareceivedsignal.
Thecausesofpacketlossincludeinadequatesignalstrengthatthedestination,naturalorhumanmade
interference,excessivesystemnoise,hardwarefailure,softwarecorruptionoroverburdenednetworknodes.Often
morethanoneofthesefactorsisinvolved.Inacasewherethecausecannotberemedied,concealmentmaybe
usedtominimizetheeffectsoflostpackets.
Echoiswhenportionsofthetransmissionarerepeated.Echoescanoccurduringmanylocationsalongthe
route.Splicesandimproperterminationinthenetworkcancauseatransmissionpackettoreflectbacktothe
source,whichcausesthesoundofanecho.Tocorrectforecho,networktechnicianscanintroduceanecho
cancellertothenetworkdesign.Thiswillcancelouttheenergybeingreflected.
HighBandwidthApplicationsAhighbandwidthapplicationisasoftwarepackageorprogramthattendsto
requirelargeamountsofbandwidthinordertofulfillarequest.Asdemandfortheseapplicationscontinuesto
increase,bandwidthissueswillbecomemorefrequent,resultingindegradationofanetworksystem.Onewayto
combattheeffectsoftheseapplicationsonanetworkistomanagetheamountofbandwidthallocatedtothem.
ThisallowsuserstostillusetheapplicationswithoutdegradingtheQoSofnetworkservices.
Examples:
ThinClients
VoiceoverIP
RealTimeVideo
Multimedia
Domain4.6:ImplementtheFollowingNetworkTroubleshootingMethodology
GatherInformationontheProblem
Inacontactcenternetwork,problemsaretypicallydiscoveredandreportedbyoneofthefollowingtypesofusers:
Externalcustomersdialingintoacallcentertoorderproducts,obtaincustomerservice,andsoforth.
Internalagentsreceivingincomingcallsfromacallqueueorinitiatingoutboundcollectioncallstocustomers.
InternalusersusingadministrativephonestocallemployeesinothercompanylocationsorPSTN
destinations,andperformbasicactionssuchascalltransfersanddialingintoconferences.
Asthenetworkadministrator,youmustcollectsufficientinformationfromtheseuserstoallowyoutoisolatethe
problem.Detailed,accurateinformationwillmakethistaskeasier.Asyouturnupyournetwork,youmayconsider
puttingthesequestionsinanonlineform.Aformwillencourageuserstoprovidemoredetailsabouttheproblem
andalsoputthemintothehabitoflookingforparticularerrormessagesandindicators.Capturingtheinformation
electronicallywillalsopermityoutoretrieveandreexaminethisinformationinthefuture,shouldtheproblem
repeatitself.
IdentifyTheAffectedArea
Determineiftheproblemislimitedtooneworkstation,orseveralworkstations,oneserver,onesegment,orthe
entirenetwork.Ifonlyonepersonisexperiencingacertainproblem,theproblemismostlikelyattheworkstation.
Ifgroupsofworkstationsareaffected,theproblemmightlieatapartofthenetworkthatusersallhavein
common,suchasaparticularsoftwareapplicationordatabase,aserver,thenetworksegment,orthenetwork
configuration.
DetermineIfAnythingHasChanged
Todeterminewhathaschanged,askquestionsuchas:
Couldyoudothistaskbefore?Ifthisisanewtask,perhapstheuserneedsdifferentsysetmpermissions,or
additionalhardwareofsoftware.
Ifyoucoulddoitbefore,whendidyoufirstnoticeyoucouldntdoitanymore?Trydofindoutwhat
happenedjustbeforetheproblemcameup,oratleasttrytopinpointthetime,sincethesourceofthe
problemmightberelatedtootherchangeselsewhereonthenetwork.
Whathaschangedsincethelasttimeyouwereabletodothistask?Userscangiveyouinformationabout
eventsthatmightaffecttheirlocalsystems.Youcanhelpthemwithleadingquestionssuchas,Did
someoneaddsomethingtoyourcomputer?orDidyoudosomethingdifferentlythistime?.
EstablishTheMostProbableCause
Toestablishthemostprobablecause,useasystematicapproach.Eliminatepossiblecauses,startingwiththe
obviousandsimplestoneandworkingbackthroughothercauses.Donotoverlookstraightforwardandsmple
correctionsthatcanfixarangeofproblemsanddonotcostmuchtimeorefforttotry.Youmightfindyoucan
resolvetheissueonthespot.
DetermineIfEscalationIsNecessary
Whiletroubleshootinganetworkproblem,youmightfindthecauseoftheproblemisnotanissuethatcanbe
resolvedoverthephoneorattheusersdesktop.Itmaybenecessarytocontactafellowemployeewhohas
specializedknowledge,oramoresenioradministratorwiththeappropriatepermissionsandauthoration.Inthese
cases,theproblemshouldbeescalatedtotheappropriatepersoneltoberesolvedasquicklyaspossible.Createan
ActionPlanandSolution,IdentifyingPotentialEffectOnceyouhavedeterminedtheprobablecause,youshould
createanactionplanbeforechangesaremade,detailingeachsteptakenwhileattemptingtoresolvetheissue.
Oneshouldalsobecertainthattheoriginalstate(beforetroubleshooting)canbereturnedtoincasethingsdonot
goasplanned.Alsoconsiderthehowtheplanwillaffecttheuserorotheraspectsofthenetwork.Thinkingahead
canhelpensureproductivitydoesntsufferandthatdowntimeisminimized.
ImplementandTesttheSolution
Implementtheactionplanstepbysteptofixtheproblem.Ifmultiplechangesaremadeatonce,youwillbeunable
toverifyexactlywhateffecteachadjustmenthad.Besuretodocumenteachstepbecauseyoucanlosesightof
whatyouhavetriedincomplextroubleshootingscenarios.Testthesolution.Makesurethesolutionimplemented
actuallysolvestheproblemanddidntcauseanynewones.Useseveraloptionsandsituationstoconductthetests.
Sometimestestingovertimeisneededtoensurethesolutionisthecorrectone.
IdentifytheResultsandEffectsoftheSolution
Verifythattheuseragreesthattheproblemissolvedbeforeyouproceedwithfinaldocumentationandclosingthe
request.Eveniftheproblemissolved,andthesolutionwaswellthoughtoutanddocumented,theremight
cascadingeffectselsewhereonthelocalsystemoronthenetwork.Testforthisbeforeclosingouttheissue.Ifa
majorchangewasmade,itisadvisabletocontinuemonitoringandtestingforseveraldaysorevenweeksafterthe
problemappearstoberesolved.
DocumenttheProcessandSolution
Documenttheproblemandprocessusedtoarrivedatthesolution.Maintaintherecordsaspartofanoverall
documentationplan.Thiswillprovideandevergrowingdatabaseofinformationspecifictoyournetworkandalsoit
willbevaluablereferencematerialforfuturetroubleshootinginstances.especiallyiftheproblemisspecifictothe
organization.Creatingatroubleshootingtemplatewithrequiredinformationincludedinalltroublereportswill
ensurealltroublereportsareaccurateandconsistentnomatterwhocompletesthem.
Domain4.7:TroubleshootCommonConnectivityIssuesandSelectanAppropriate
Solution
Crosstalk
Symptoms:Slownetworkperformanceand/oranexcessofdroppedorunintelligiblepackets.Intelephony
applications,usershearpiecesofvoiceorconversationsfromaseparateline.
Causes:Generallycrosstalkoccurswhentwocablesruninparallelandthesignalofonecableinterfereswiththe
other.Crosstalkcanalsobecausedbycrossedorcrushedwirepairsintwistedpaircabling.
Resolution:theuseoftwistedpaircablingordigitalsignalcanreducetheeffectsofcrosstalk.Maintainingproper
distancebetweencablescanalsohelp.
NearEndCrosstalk
Symptoms:Signallossorinterference
Causes:Nearendcrosstalkiscrosstalkthatoccurscloseralongthecabletothetransmittingend.Oftenoccursinor
neartheterminatingconnector.
Resolution:Testwithcabletesterfrombothendsofthecableandcorrectanycrossedorcrushedwires.Verifythat
thecableisterminatedproperlyandthatthetwistsinthepairsofwiresaremaintained.
Attenuation
Symptoms:Slowresponsefromthenetwork.
Causes:Attenuationisthedegradationofsignalstrength.
Resolution:Useshortercableruns,addmoreaccesspoints,and/oraddrepeatersandsignalboosterstothecable
path.Or,evaluatetheenvironmentforinterference.Theinterferenceyouwouldlookforwoulddependonthe
spectrumused.
Collisions
Symptoms:Highlatency,reducednetworkperformance,andintermittentconnectivityissues.
Causes:CollisionsareanaturalpartofEthernetnetworkingasnodesattempttoaccessshredresources.
Resolution:Dependsonthenetwork.Forexample,replacingahubwithaswitchwilloftensolvetheproblem.
Shorts
Symptoms:Electricalshortscompletelossofsignal.
Causes:Twonodesofanelectricalcircuitthataremeanttobeatdifferentvoltagescreatealowresistance
connectioncausingashortcircuit.
Resolution:UseaTDRtodetectandlocateshorts.Replacecablesandconnectorswithknownworkingones.
OpenImpedanceMismatch
Symptoms:Alsoknownasecho,thetelltalesignofopenmismatchisanechooneitherthetalkerorlistenerend
oftheconnection.
Causes:Themismatchingofelectricalresistance.
Resolution:UseaTDRtodetectimpedance.Collectandreviewdata,interpretthesymptoms,anddeterminethe
rootcauseinordertocorrectthecause.
Interference
Symptoms:Crackling,humming,andstaticareallsignsofinterference.Additionally,lowthroughput,network
degradation,andpoorvoicequalityarealsosymptomsofinterference.
Causes:RFIcanbecausedbyanumberofdevicesincludingcordlessphones,BlueToothdevices,cameras,paging
systems,unauthorizedaccesspoints,andclientsinadhocmode.
Resolution:Removeoravoidenvironmentalinterferencesasmuchaspossible.Thismayentailsimplyturningoff
competingdevices.EnsurethereisadequateLANcoverage.Toresolveproblemsproactively,testareaspriorto
deploymentusingtoolssuchasspectrumanalyzers.
PortSpeed
Symptoms:Noorlowspeedconnectivitybetweendevices.
Causes:Portsareconfiguredtooperateatdifferentspeedsandarethereforeincompatiblewitheachother.
Resolution:Verifythatequipmentiscompatibleandoperatingatthehighestcompatiblespeeds.Forexample,ifa
switchisrunningat100Mbs,butacomputersNICcardrunsat10Mbs,thecomputerwillrunattheslowerspeed
(10Mbs).Replacethecardwithonethatrunsat100Mbsandthroughputwillbeincreasedtothehigherlevel(or
atleasthigherlevelssincetherearevariablessuchasnetworkcongestion,etc.)
PortDuplexMismatch
Symptoms:Latecollisions,alignmenterrors,andFCSerrorsarepresentduringtesting.
Causes:Mismatchesaregenerallycausedbyconfigurationerrors.Theseoccurwhentheswitchportandadevice
areconfiguredtouseadifferentduplexsettingorwhenbothendsaresettoautonegotiatethesetting.Resolution:
Verifythattheswitchportandthedeviceareconfiguredtousethesameduplexsetting.Thismayentailhavingto
upgradeoneofthedevices.
IncorrectVLAN
Symptoms:Noconnectivitybetweendevices.
Causes:DevicesareconfiguredtousedifferentVLANs
Resolution:ReconfiguredevicestousethesameVLAN.
IncorrectIPAddress
Symptoms:Noconnectivitybetweendevices.
Causes:EitherthesourceordestinationdevicehasanincorrectIPaddress.
Resolution:Usethepingcommandtodetermineifthereisconnectivitybetweendevices.Resolutionwilldependon
theproblem.IfanetworkisrunningarougeDHCPserver,forexample,twocomputerscouldhaveleasedthesame
IPaddress.CheckTCP/IPconfigurationinformationusingipconfig/allonWindowmachinesandifconfigon
Linux/UNIX/Applemachines.InthatcasetroubleshootDHCP(itmaybeoffline,etc.).Itcouldbethecasethata
staticIPaddresswasenteredincorrectly.CheckIPaddressesemptythearpcacheonbothcomputers.
WrongGateway
Symptoms:Noconnectivitybetweendevices.
Causes:TheIPaddressofthegatewayisincorrectforthespecifiedroute.
Resolution:ChangetheIPaddressofthegatewaytothecorrectaddress.
WrongDNS
Symptoms:Noconnectivitybetweendevices.
Causes:AdeviceisconfiguredtousethewrongDNSserver.
Resolution:OpenthenetworkpropertiesonaWindowsmachine.OpenTCP/IPpropertiesandchecktheIPaddress
oftheDNSserverlistedfortheclient.PutinthecorrectIPaddress.Testforconnectivity.
WrongSubnetMask
Symptoms:Noconnectivitybetweendevices.
Causes:Eitherthesourceordestinationdevicehasanincorrectsubnetmask.
Resolution:Usethepingcommandtodetermineifthereisconnectivitybetweendevices.ChecktheIPaddresson
bothdevices.Changetheincorrectsubnetmasktoacorrectsubnetmask.Testforconnectivity.
IssuesthatshouldbeIDdbutEscalated
SwitchingLoop:Needspanningtreeprotocoltoensureloopfreetopologies.
RoutingLoop:Packetsareroutedinacirclecontinuously.
RouteProblems:Packetsdontreachtheirintendeddestination.Thiscouldbecausedbyanumberofthings:
configurationproblems,convergence(inwhichyouhavetowaitforthediscoveryprocesstocomplete),orabroken
segment(arouterisdown,etc.).
Proxyarp:Ifmisconfigured,DoSattackscanoccur.
BroadcastStorms:Thenetworkbecomesoverwhelmedbyconstantbroadcasttraffic.
WirelessConnectivityIssues
Interference
Symptoms:Lowthroughput,networkdegradation,droppedpackets,intermittentconnectivity,andpoorvoice
qualityareallsymptomscausedbyinterference.
Causes:RFIcanbecausedbycordlessphones,Bluetoothdevices,cameras,pagingsystems,unauthorizedaccess
points,metalbuildingframing,andclientsinadhocmode.
Resolution:Removeoravoidenvironmentalinterferencesasmuchaspossible.
IncorrectEncryption
Symptoms:Forwireless,ifencryptionlevelsbetweentwodevices(accesspointandclient)donotmatch,
connectionisimpossible.Similarly,ifdifferentencryptionkeysareusedbetweentodevicestheycantnegotiatethe
keyinformationforverificationanddecryptioninordertoinitiatecommunication.
Causes:Improperconfiguration.
Resolution:Ensurethatsecuritysettingsmatchbetweenandamongdevices.
CongestedChannel
Symptoms:Veryslowspeeds.
Causes:Interferencefromneighboringwirelessnetworkcongestednetworkchannel.
Resolution:Manywirelessroutersaresettoautoconfigurethewirelesschannel.Tryloggingintotherouterand
manuallychangethechannelthewirelessrouterisoperatingon.
IncorrectFrequency
Symptoms:Noconnectivity.
Causes:Inwireless,devicesmustoperateonthesamefrequency.Adevicefora802.11afrequencycant
communicatewithonedesignedfor802.11b.
Resolution:Deploydevicesthatoperateonthesamefrequency.
ESSIDMismatch
Symptoms:Noconnectivitybetweendevices.
Causes:DevicesareconfiguredtousedifferentESSIDs.
Resolution:SetthedevicestousethesameSSID.Ensurethatthewirelessclientandtheaccesspointarethe
same.Note:SSIDsarecasesensitive.
StandardMismatch
Symptoms:Noconnectivitybetweendevices.
Causes:Devicesareconfiguredtousedifferentstandardssuchas802.11a/b/g/n.
Resolution:Deviceshavetobechosentoworktogether.802.11a,forexample,isincompatiblewith802.11b/g
becausethefirstoperatesat5GHzandthesecondat2.4GHz.Oa802.11groutercouldbesetonlyforgmode
andyouaretryingtoconnectwitha802.11bwirelesscard.Changethemodeontherouter.
Distance
Symptoms:Slowconnectionandlowthroughput.
Causes:Thedistancebetweentwopointsmaybetoblameforthisconnectivityissue.Thelongerthedistance
betweenthetwopointstheprominenttheproblemmaybecome.Issuesthatcanoccurbetweenthetwopoints
includelatency,packetloss,retransmission,ortransienttraffic.
Resolution:Iftheissueiswithcabling,donotexceeddistancelimitations.Iftheissueiswithwireless,youmay
needtoincreasecoverage.Useaspectrumanalyzertodeterminecoverageandsignalstrength.
Bounce
Symptoms:Noorlowconnectivitybetweendevices.
Causes:Signalfromdevicebouncesoffobstructionsandisnotreceivedbuythereceivingdevice.
Resolution:Ifpossible,moveonedeviceortheothertoavoidobstructions.Monitorperformanceandcheckfor
interference.
IncorrectAntennaPlacement
Symptoms:Noorlowsignalandconnectivity.
Causes:Thepositionoftheaccesspointsantennacannegativelyaffectoverallperformance.
Resolution:Changethepositionoftheantennaandmonitordeviceperformance.
Domain5.0:NetworkTools
Domain5.1:CommandLineInterfaceTools
TracerouteAcommandlinetroubleshootingtoolthatenablesyoutoviewtheroutetoaspecifiedhost.This
willshowhowmanyhopsthepacketshavetotravelandhowlongittakes.InWindowsoperatingsystems,the
commandusedis"tracert".
IPCONFIGThiscommandisusedtoviewnetworksettingsfromaWindowscomputercommandline.Below
aretheipconfigswitchesthatcanbeusedatacommandprompt.
ipconfig/allwilldisplayallofyourIPsettings.
ipconfig/renewforcestheDHCPserver,ifavailabletorenewalease.
ipconfig/releaseforcesthereleaseofalease.
IFCONFIGIFCONFIGisaLinux/UnixcommandlinetoolthatissimilartoIPCONFIGinWindows.Commonuses
forifconfigincludesettinganinterface'sIPaddressandnetmask,anddisablingorenablingagiveninterface.At
boottime,manyUNIXlikeoperatingsystemsinitializetheirnetworkinterfaceswithshellscriptsthatcallifconfig.
Asaninteractivetool,systemadministratorsroutinelyusetheutilitytodisplayandanalyzenetworkinterface
parameters.
PINGPING(PacketInterNetGroper)isacommandlineutilityusedtoverifyconnectionsbetweennetworked
devices.PINGusesICMPechorequeststhatbehavesimilarlytoSONARpings.Thestandardformatforthe
commandispingip_address/hostname.Ifsuccessful,thepingcommandwillreturnrepliesfromtheremotehost
withthetimeittooktoreceivethereply.Ifunsuccessful,youwilllikelyrecieveanderrormessage.Thisisoneof
themostimportanttoolsfordeterminingnetworkconnectivitybetweenhosts.
ARP(AddressResolutionProtocol)AhostPCmusthavetheMACandIPaddressesofaremotehostin
ordertosenddatatothatremotehost,andit'sARPthatallowsthelocalhosttorequesttheremosthosttosend
thelocalhostitsMACaddressthroughanARPRequest.GuideToARP,IARP,RARP,andProxyARP
ARPPING(ARPING)ARPINGisacomputersoftwaretoolthatisusedtodiscoverhostsonacomputer
network.TheprogramtestswhetheragivenIPaddressisinuseonthelocalnetwork,andcangetadditional
informationaboutthedeviceusingthataddress.Thearpingtoolissimilarinfunctiontoping,whichprobeshosts
usingtheInternetControlMessageProtocolattheInternetLayer(OSILayer3).ArpingoperatesattheLinkLayer
(OSILayer2)usingtheAddressResolutionProtocol(ARP)forprobinghostsonthelocalnetwork(link)only,asARP
cannotberoutedacrossgateways(routers).However,innetworksemployingrepeatersthatuseproxyARP,the
arpingresponsemaybecomingfromsuchproxyhostsandnotfromtheprobedtarget.
NSLOOKUPThisisacommandthatqueriesaDNSserverformachinenameandaddressinformation.
OriginallywrittenforUnixoperatingsystems,thiscommandisnowavailableonWindowsandotheroperating
systems.Tousenslookup,type"nslookup"followedbyanIPaddress,acomputername,oradomainname.
NSLOOKUPwillreturnthename,allknownIPaddressesandallknownaliases(whicharejustalternatenames)for
theidentifiedmachine.NSLOOKUPisausefultoolfortroubleshootingDNSproblems.
HostnameThehostnamecommandisusedtoshoworsetacomputer'shostnameanddomainname.Itis
oneofthemostbasicofthenetworkadministrativeutilities.Ahostnameisanamethatisassignedtoahost(i.e.,
acomputerconnectedtothenetwork)thatuniquelyidentifiesitonanetworkandthusallowsittobeaddressed
withoutusingitsfullIPaddress.DomainnamesareuserfriendlysubstitutesfornumericIPaddresses.
Dig(domaininformationgroper)DigisaLinux/UnixtoolforinterrogatingDNSnameservers.Itperforms
DNSlookupsanddisplaystheanswersthatarereturnedfromthenameserver(s)thatwerequeried.
MtrMtrisaLinuxcommandlinetoolthatcombinesthefunctionalityofthetracerouteandpingprogramsina
singlenetworkdiagnostictool.
RouteTheroutecommandisusedtodisplayandmanipulatealocalroutingtable.Examplesofitsuseinclude
addinganddeletingastaticroute.ThistoolisavailableinUnix,LinuxandWindows.
NBTSTATIsaWindowsutilityusedtotroubleshootconnectivityproblemsbetween2computers
communicatingviaNetBT,bydisplayingprotocolstatisticsandcurrentconnections.NBTSTATexaminesthecontents
oftheNetBIOSnamecacheandgivesMACaddress.
NETSTATIsaWindows,Linux,andUnixcommandlinetoolthatdisplaysnetworkconnections(bothincoming
andoutgoing),routingtables,andanumberofnetworkinterfacestatistics.Itisusedforfindingproblemsinthe
networkandtodeterminetheamountoftrafficonthenetworkasaperformancemeasurement.
Domain5.2:NetworkScanners
PacketSniffersApacketsnifferisadeviceorsoftwareusedtocapturepacketstravelingoveranetwork
connection.Thepacketsareloggedandcanbedecodedinordertoprovideinformationandstatisticsaboutthe
trafficonthenetworkornetworksegment.Thesetoolsareusedfortroubleshootingdifficultnetworkproblems,
monitoringnetworktraffic,anddetectingintrusionattempts.AlsoknownasPacketAnalyzers.
IntrusionDetectionSoftwareThiswascoveredearlierindomain3.1.
IntrusionPreventionSoftwareThiswascoveredearlierindomain3.1.
PortScannersAportscannerisaprogramdesignedtoprobenetworkhostsforopenports.Thisisoftenused
byadministratorstoverifysecuritypoliciesoftheirnetworksandbyattackerstoidentifyrunningservicesonahost
thatcanbeexploitedtogainaccess.
Domain5.3:HardwareTools
CableTestersCabletestersareelectronicdevicesusedtotestacable'sintegritybycheckingforopensand
shortswhichcancauseconnectivityproblems.
ProtocolAnalyzersThistoolisusedtomonitornetworktrafficanddisplaypacketandprotocolstatisticsand
information.Asfaraswe'reconcerned,itisprettymuchthesamethingasapacketsniffer.Mosttoolssoldtoday
combinethefunctionsofthelisteningdevice(packetsniffer)andtheanalyticaldevice(packetanalyzer).
CertifiersCertifiersareatoolthattestscablesinordertoensurethattheywillperformthejobintended.This
includescheckingthespeedloadsthatitcanhandle.
TDR(TimeDomainReflectometer)Sendsasignaldownacableandmeasuresthedistancethatthesignal
travelledbeforebouncingback(likesonar).Usedtofindopensandshortsincables.
OTDR(OpticalTimeDomainReflectometer)SimilartotheTDRabove,however,thisisusedtotestfiber
opticcableswithlight.
MultimeterAmultimeter,alsoknownasavolt/ohmmeter,isanelectronicmeasuringinstrumentusedto
measurevoltage,currentandresistance.
TonerProbeMostwilldetectopensandshortslikeacabletester,butthistoolismainlyusedtolocatethe
terminationpointsofcables.
ButtSetAportabletelephonethatconnectstoalineusingalligatorclipsandisusedtotesttelephonecircuits.
PunchDownToolApunchdowntoolisusedtoconnectcablingsuchastelephoneandethernettowalljacks.
CableStripperFairlyselfexplanatory.Atoolusedtostripthejacketsoffofcablesinordertoexposethewire
thatcanbeconnectedtoconnectorsorwalljacks.
SnipsSpecialscissorsusedforcuttingcable.
VoltageEventRecorderCapturesandlogselectricalcurrentinformationfordeviceswhichcanthenbe
accessedonaPC.Mostlyusedformissioncriticaldevicessuchasthosefoundinahospital.
TemperatureMonitorWearen'tentirelysurewhatCompTIAisreferringtowiththis.Thereareallkindsof
temperaturemonitorsfromCPUtemperaturemonitoringsoftwaretodevicesthatmonitorthetemperatureofa
serverroom.
Domain6.0:NetworkSecurity
Domain6.1:HardwareandSoftwareSecurityDevices
Thetopicscoveredinthissectionarealreadycoveredelsewhereinthisguide.
Domain6.2:Firewalls
ApplicationLayervs.NetworkLayerAnapplicationlayerfirewallworksattheapplicationlayerofaprotocol
stack.(ThisistrueforboththeOSImodelandtheInternetProtocolSuite(TCP/IP))Sometimesreferredtoasa
proxybasedfirewallorproxyserver,itcanbesoftwarerunningonacomputerorserverorasastandalonepieceof
hardware.Themainfunctionoftheapplicationlayerfirewallistoanalyzetrafficbeforepassingittoagateway
point.Anetworklayerfirewallissometimesreferredtoasapacketfilterandthesewilloperateatthenetworklayer.
Thedeviceswillnotallowpacketstopassthefirewallunlesstheymatchtherulesetasconfiguredbythefirewall
administrator.Networklayerfirewallscanbeeitherstatefulorstateless.
Statefulvs.StatelessStatefulfirewallsmaintainpertinentinformationaboutanyactivesessionstheyhave
willspeedpacketprocessingusingthisinformation.ThismightincludesourceanddestinationIPaddress,UDPor
TCPports,andotherdetailsabouttheconnectionsuchasthesessioninitiation,typeofdatatransferandsoforth.
WithStatefulprocessingifapacketdoesnotmatchacurrentlyestablishedconnection,itwillbeevaluated
accordingtotherulesetfornewconnections.Ifitdoesmatchitwillbeallowedtopasswithoutneedingtobe
comparedtotherulesetsinuse.Statelessfirewallstreatallofthepacketsonthenetworkinisolationand
independentlyfromalloftheothertrafficonthewire.Theyhavenowaytoknowifanygivenpacketispartofan
existingconnection,istryingtoestablishanewconnection,orisjustaroguepacket.
ScanningServicestheprocessthatisusedbyallfirewallstoreviewthepacketsthatarepassingthrough
them.Sometimestheywilljustreviewtheheaderinformationortheymaybeconfiguredtolookatthedataas
well.Moreadvancedfirewallsmightalsocombinevirusdetectionand/orotherformsofmalwaredetectionaspart
oftheirscanningprocesstohaltthetransmissionofsuspectpacketsthroughthedevice.
ContentFilteringgenerallyusedattheapplicationleveltorestrictorpreventaccesstowebsitesthatarenot
approvedforworkuse,toblocksiteswithobjectionablematerial,oronacorporateblacklistforonereasonor
another.Contentcouldbefilteredinmanydifferentwaysfromsuspectkeywords,imagesonthesite,downloadable
filespresent,orsitecontentlabelingasdefinedbythewebsitehostitself(e.g.anadultsitethatdefinesitselfas
suchthecontentfilterwouldreviewthesitecontentlevelandapplythefilter).
SignatureIdentificationamethodofindentifyingcertaintypesoftrafficbasedonaknownbehaviorofthat
traffic.Afirewallwouldknowbasedonthesignaturedefinitioncomparisonwhetherthetrafficshouldbeallowedto
passaspermitted(e.g.httptrafficorDNStraffic)orwhethertodenytraffic(e.g.repeatedattemptstoconnectto
multiplesystemsfrommultiplesessions,appearingasapossibleDistributedDenialofService(DDoS)attack.
Zonesdemarcationpointsfromonenetworktypetoanother.Networksinternaltoacompanyareconsidered
internalzonesorintranets.Anetworkexternaltotheinternalnetworkisgenerallyconsideredtheinternetor
externalzones.Ifthereisanetworkthatthecompanymanagesthatisnotapartoftheinternalintranetbutisin
placebetweentheintranetandtheinternetthisiscalledthedemilitarizedzoneortheDMZ.Themainpurposeof
thiszoneistoactasanadditionallayerofsecuritybufferbetweentheintranetandtheinternet.
Domain6.3:NetworkAccessSecurity
ACL(AccessControlList)AnACLisatableinanoperatingsystemornetworkdevice(suchasarouter)that
deniesorallowsaccesstoresources.
MACFilteringThismethodcontrolsaccessbasedontheuniqueMACaddressassignedtoallnetwork
devices.
IPFilteringThismethodcontrolsaccessbasedontheIPaddresses(orarangeofaddresses)ofnetwork
devices.
SSLVPN(SecureSocketsLayervirtualprivatenetwork)ThisisaVPNthatrunsonSSLandisaccessible
viahttpsoverawebbrowser.ItallowsuserstoestablishsecureremoteaccesssessionsfromvirtuallyanyInternet
connectedbrowser.UnlikeatraditionalVPN,thismethoddoesnotrequiretheuseofIPSec.Thebenefitofthis
solutionisthatitallowsclientstoaccessacorporatenetworkfromnearlyanywherewhichisnotpracticalwitha
typicalVPN.
VPN(VirtualPrivateNetwork)AVPNisanetworkthatuses
apublictelecommunicationinfrastructure,suchastheInternet,to
provideremoteofficesorindividualuserswithsecureaccessto
theirorganization'snetwork.AVPNworksbyusingtheshared
publicinfrastructurewhilemaintainingprivacythroughsecurity
proceduresandtunnelingprotocolssuchastheLayerTwo
TunnelingProtocol(L2TP)orIPSec.Ineffect,theprotocols,by
encryptingdataatthesendingendanddecryptingitatthe
receivingend,sendthedatathrougha"tunnel"thatcannotbe"entered"bydatathatisnotproperlyencrypted.
L2TP(Layer2TunnelingProtocol)L2TPisanextensionofthePointtoPointTunnelingProtocol(PPTP)
usedonVPNs.L2TPmergesthebestfeaturesoftwoothertunnelingprotocols:PPTPfromMicrosoftandL2Ffrom
CiscoSystems.Asatunnellingprotocol,L2TPdoesnotincludeencryption,butisoftenusedwithIPsecprovideVPN
connectionsfromremoteuserstoaremotenetwork.
IPSec(InternetProtocolSecurity)IPsecisaprotocolsuitethatensuresconfidentiality,integrity,and
authenticityofdatacommunicationsacrossapublicnetworkbyauthenticatingandencryptingeachIPpacketofa
datastream.IPSECismadeoftwodifferentprotocols:AHandESP.AH(Authenticationheader)isresponsiblefor
authenticityandintegrity,whileESP(EncapsulatingSecuritypayload)encryptsthepayload.IPSecisoftenusedin
conjunctionwithL2TPonVPNs.
RAS(RemoteAccessService)RASreferstoanycombinationofhardwareandsoftwaretoenableremote
accesstoanetwork.ARASserverisaspecializedcomputerwhichaggregatesmultiplecommunicationchannels
together.Anexampleofthiswouldbeaserverthatdialupusersdialinto.Thetermwasoriginallycoinedby
MicrosoftduringtheWindowsNTeraandisnowcalledRoutingandRemoteAccessService(RRAS).
RDP(RemoteDesktopProtocol)OriginallyreleasedwithWindowsNT4.0TerminalServices,RDP4.0allowed
userstoconnecttoacomputerandremotelycontrol(AKAShadow)it.WiththereleaseofWindowsVistaand
upcomingWindowsLonghorn,version6.0willallowonetoconnecttospecificapplicationsratherthantheentire
desktopoftheremotecomputer.RemoteDesktopallowssystemsadministratorstoremotelyconnecttoauser's
computerfortechnicalsupportpurposes,orconnecttoaserverformaintenanceandadministrationpurposes.By
default,RDPusesTCPport3389.
PPPoE(PointtoPointProtocoloverEthernet)Inthepast,mostinternetuserswereconnectedtothe
internetviaaserialmodemusingPPP,however,currenttechnologieshavereplaceddialupinternetconnections
withDSLandcable,forexample.Inshort,PPPoEisanetworkprotocolforencapsulatingPPPframesinEthernet
frames.
PPP(PointtoPointProtocol)Providesastandardmeansofencapsulatingdatapacketssentoverasingle
channelWANlink.Specifically,PPPprovidesamethodforconnectingapersonalcomputertotheInternetusinga
standardphonelineandamodemusingaserialconnection(Dialup).PPPreplacedSLIPasthestandardfordialup
connectionsasitsupportsmoreprotocolsthanjustTCP/IP.
VNC(VirtualNetworkComputing)VNCmakesitpossibletointeractwithacomputerfromanycomputeror
mobiledeviceontheInternet.UnlikeMicrosoft'sRDP,VNCofferscrossplatformsupportallowingremotecontrol
betweendifferenttypesofcomputers.Popularusesforthistechnologyincluderemotetechnicalsupportand
accessingfilesonone'sworkcomputerfromone'shomecomputer,orviceversa.
ICA(IndependentComputingArchitecture)ICAisaproprietaryprotocolforanapplicationserversystem,
designedbyCitrixSystems.ProductsconformingtoICAareCitrix'sWinFrame,CitrixXenApp(formerlycalled
MetaFrame/PresentationServer),andCitrixXenDesktopproducts.ThesepermitordinaryWindowsapplicationsto
berunonaWindowsserver,andforanysupportedclienttogainaccesstothoseapplications.BesidesWindows,ICA
isalsosupportedonanumberofUnixserverplatformsandcanbeusedtodeliveraccesstoapplicationsrunningon
theseplatforms.ThereisawiderangeofclientssupportedincludingWindows,Mac,Unix,Linux,andvarious
Smartphones.
Domain6.4:MethodsofUserAuthentication
PKI(PublicKeyInfrastructure)Apublickeyinfrastructure(PKI)isthecombinationofsoftware,encryption
technologies,processes,andservicesthatenableanorganizationtosecureitscommunicationsandbusiness
transactions.PKIusesapublicandaprivatecryptographickeypairthatisobtainedandsharedthroughatrusted
authority.Thepublickeyinfrastructureprovidesforadigitalcertificatethatcanidentifyanindividualoran
organizationanddirectoryservicesthatcanstoreand,whennecessary,revokethecertificates.
KerberosInventedbyMIT,thisprotocolhasbeenevolvingintheUnixworldforoveradecadeandhasbecome
astandardinWindowsoperatingsystems.Kerberosisanetworkauthenticationprotocolwhichutilizessymmetric
cryptographytoprovideauthenticationforclientserverapplications.ThecoreofaKerberosarchitectureistheKDC
(KeyDistributionServer)thatservesasthetrustedthirdpartyandisresponsibleforstoringauthentication
informationandusingittosecurelyauthenticateusersandservices.Inorderforthissecuritymethodtowork,itis
paramountthattheKDCisavailableandsecure.Theclocksofallhostsinvolvedmustbesynchronizedaswell.
AAAAAAcommonlystandsforauthentication,authorizationandaccounting.
RADIUS(RemoteAuthenticationDialInUserService)RADIUSisanetworkingprotocolthat
providescentralizedAuthentication,Authorization,andAccounting(AAA)managementandprovidesa
methodthatallowsmultipledialinNetworkAccessServer(NAS)devicestoshareacommonauthentication
database.RADIUSisoftenusedbyISPsandenterprisestomanageaccesstotheInternetorinternal
networks,andwirelessnetworks.Microsoft'sanswertocorporatewirelesssecurityistheuseofRADIUS
authenticationthroughitsInternetAuthenticationServices(IAS)product.
TACACS+(TerminalAccessControllerAccessControlSystem)TACACS+isaproprietaryCisco
securityapplicationthatprovidescentralizedvalidationofusersattemptingtogainaccesstoarouteror
networkaccessserver.TheTACACS+protocolprovidesauthenticationbetweenthenetworkaccessserver
andtheTACACS+daemon,anditensuresconfidentialitybecauseallprotocolexchangesbetweenanetwork
accessserverandaTACACS+daemonareencrypted.WhereasRADIUScombinesauthenticationand
authorizationinauserprofile,TACACS+separatesthetwooperations.AnotherdifferenceisthatTACACS+
usestheTransmissionControlProtocol(TCP)whileRADIUSusestheUserDatagramProtocol(UDP).
802.1X802.1XisanIEEEStandardforportbasedNetworkAccessControl(PNAC).Thisstandardisdesignedto
enhancethesecurityofwirelesslocalareanetworks(WLANs)byprovidinganauthenticationframeworkthatallows
ausertobeauthenticatedbyacentralauthority.Itisusedforsecuringwireless802.11accesspointsandisbased
ontheExtensibleAuthenticationProtocol(EAP).
CHAP(ChallengeHandshakeAuthenticationProtocol)AtypeofauthenticationprotocolusedonPPP
connections.CHAPusesa3wayhandshakeinwhichtheauthenticationagentsendstheclientprogramakeytobe
usedtoencrypttheusernameandpassword.CHAPnotonlyrequirestheclienttoauthenticateitselfinthe
beginning,butsendschallengesatregularintervalstomakesuretheclienthasn'tbeenreplacedbyanintruder.
MSCHAP(MicroSoftChallengeHandshakeAuthenticationProtocol)ThisisMicrosoft'sversionofCHAP
andisaonewayencryptedpassword,mutualauthenticationprocessusedinWindowsoperatingsystems.Likethe
standardversionofCHAP,MSCHAPisusedforPPPauthentication,butisconsideredbysometobemoresecure.
MSCHAPv2wasreleasedtosolvemanyoftheproblemsanddeficienciesofthefirstversion.
EAP(ExtensibleAuthenticationProtocol)EAPisanextensiontothePointtoPointProtocol(PPP)was
developedinresponsetoanincreasingdemandtoprovideanindustrystandardarchitectureforsupportof
additionalauthenticationmethodswithinPPP.EAPisanauthenticationframework,notaspecificauthentication
mechanismthatistypicallyusedonwirelessnetworks.Itprovidessomecommonfunctionsandnegotiationof
authenticationmethods,calledEAPmethods.Thereareroughly40differentmethodsdefined.Commonlyused
methodscapableofoperatinginwirelessnetworksincludeEAPTLS,EAPSIM,EAPAKA,PEAP,LEAPandEAPTTLS.
WhenEAPisinvokedbyan802.1XenabledNetworkAccessServer(NAS)devicesuchasan802.11WirelessAccess
Point,modernEAPmethodscanprovideasecureauthenticationmechanismandnegotiateasecurePairwise
MasterKey(PMK)betweentheclientandNAS.ThePMKcanthenbeusedforthewirelessencryptionsessionwhich
usesTKIPorCCMP(basedonAES)encryption.StrongEAPtypessuchasthosebasedoncertificatesofferbetter
securityagainstbruteforceordictionaryattacksandpasswordguessingthanpasswordbasedauthentication
protocols,suchasCHAPorMSCHAP.
Domain6.5:IssuesThatAffectDeviceSecurity
PhysicalSecurityphysicalsecurityisjustasitsounds,locksonthedoors,cameraseverywhere,andsoforth.
Dependingonthedepthofsecurityneededtheremaybeadditionallayersofsecuritysuchasanaccessbadgethat
operatesadoorthatisadditionallycheckedbyaguard.Youmighthaveadualdoorentrancesuchasamantrap
wherethefirstdooryoubadgeopensandyouwalkthroughitanditmustcompletelyclosebeforethenextdoora
fewfeetinfrontofyoubecomesoperationaltobadethrough.
RestrictingLocalandRemoteAccessAlotoflocalaccessrestrictionwillcomefromphysicalsecurity
measuresbutyoucanalsosetsystemstonotallowlocalloginattheconsoleexceptforcertainspecificaccount
namesinthedomainorcertainspecificaccountnamesinthelocalaccountsdatabase.Withrespecttoremote
accessyoucanalsomangethesameprincipleofleastprivilegebyonlyallowingremoteaccesstojustthe
individualsthatabsolutelyneeditaspartoftheirroleresponsiblyandbydenyingeveryoneelse.Thosethatare
allowedtheaccessshouldthenstillneedtoprovideatleastausernameandpasswordinordertoauthenticateto
theremotesystem.
SecureShell(SSH)ApplicationLayerprotocolintheInternetProtocolSuitethatallowsdatatobeexchanged
usingasecurechannelbetweentwonetworkeddevicesandwasdesignedasareplacementforTelnetandother
insecureremoteshells,whichsendinformationincludingaccountnameinformationandpasswordsincleartext.
HypertextTransferProtocolSecure(HTTPS)ApplicationLayerprotocolintheInternetProtocolSuitethat
functionsonport443bydefaultandusesthestandardHypertextTransferProtocolwiththeSSL/TLSprotocolto
provideencryptionandsecureidentificationoftheserverwhichallowstheserver/clientcommunicationstobe
secured.Aneverydayexampleofthiswouldbeanytimeyoupurchasesomethingonlineandtheshoppingwebsite
takesyoufromtheregularstorefrontpagesdefinedashttp://andredirectsyoutotheirsecuredserversathttps://
SimpleNetworkManagementProtocolversion3(SNMPv3)ApplicationLayerprotocolintheInternet
ProtocolSuitethatisusedmostlyinnetworkmanagementsystemstomonitornetworkattacheddevices.Version3
providesimportantsecurityfeaturesthatthepriorversionsdidnotincludingmessageintegritythatensures
packetswerenotaltered,authenticationthatverifiesthattheinbounddataisfromanexpectedsourcesystemas
wellasencryptionforthetrafficstreamitself.
SecureFileTransferProtocol(SFTP)sometimescalledSSHfiletransferprotocolisanetworkprotocolthat
providessecured,encryptedfiletransfercapabilityoverTCPport22bydefault.
SecureCopyProtocol(SCP)ApplicationLayerprotocolintheInternetProtocolSuitethatleveragesthe
SecureShell(SSH)protocolusingTCPport22bydefaulttocopyfilesfromsystemtosystemonthesamenetwork
oracrossdifferentnetworks.
TelnetApplicationLayerprotocolintheInternetProtocolSuitethatwastraditionallyusedtoconnectdumb
terminalstomainframesystems.Todayitissometimesusedtoconnecttoheadlessnetworkequipmentsuchas
switchesandroutersbyusingacommandwindow.Itisaclientserverprotocolthatrunsonport23bydefault,and
doesnotencryptanydatasentovertheconnection.
HypertextTransferProtocol(HTTP)ApplicationLayerprotocolintheInternetProtocolSuitethatisthe
standardprotocolinuseontheWorldWideWeb.Operatingonport80bydefault,internetclientscontactaweb
serverandrequestpagesbackfromthatservertotheirwebbrowserswhichrenderthereturnedcontentfromthe
connectioncall.
FileTransferProtocol(FTP)ApplicationLayerprotocolintheInternetProtocolSuitethatusesport20for
dataconnectionsandlistensonport21.OftenFTPissetupforanonymousaccessfortheputtingandgettingof
files.EvenwhenusernameidentificationisrequiredandpasswordauthenticationisrequesttosystemsusingFTP
itisdoneviacleartext.
RemoteShell(RSH)acommandlineprogramwhichcanexecuteshellcommandsasanotheruserandon
anothercomputeracrossacomputernetwork.Allofthecommandsthataresentaredoneincleartextandany
authenticationisalsosentoverthewireunencrypted.SecureShell(SSH)isthesecurereplacementforthisutility.
RemoteCopyProtocol(RCP)aUnixbasedcommandlineutilitythatisusedtocopydatafromonesystem
toanother.Theutilitysendsunencryptedinformationoverthenetworkincludinganyapplicableaccountand
passwordinformation.IthasbeenreplacedbySecureFileTransferProtocol(SFTP)whichissometimescalledSSH
filetransferprotocol.
SimpleNetworkManagementProtocolversions1or2(SNMP)ApplicationLayerprotocolintheInternet
ProtocolSuitethatisusedforsystemmanagementandconfiguration.Version1wasoriginallyintroducedinthe
late80sanddoesnothavereallyanyapplicablesecurityfeaturesavailable.Authenticationisperformedusingthe
communitystring",whichiseffectivelynothingmorethanapasswordandthatwastransmittedincleartext.
Version2didoffersomeimprovementsinperformance,security,andconfidentialitybutitdidthisthroughaparty
basedsecuritysystemthatwasconsideredoverlycomplexanditwasnotwidelyacceptedasaresult.
Domain6.6:CommonSecurityThreats
DoS(DenialofService)ADoSattackisacommontypeofattackinwhichfalserequeststoaserveroverload
ittothepointthatitisunabletohandlevalidrequests,causeittoreset,orshutitdowncompletely.Thereare
manydifferenttypesofDoSattacksincludingSynFloodingandPingFlooding.
VirusesAComputerVirusisaprogramthatcancopyitselfandinfectacomputerwithoutthepermissionor
knowledgeoftheuser.AComputerVirushas2majorcharacteristics:theabilitytoreplicateitself,andtheabilityto
attachitselftoanothercomputerfile.EveryfileorprogramthatbecomesinfectedcanalsoactasaVirusitself,
allowingittospreadtootherfilesandcomputers.Theterm"computervirus"isoftenusedincorrectlyasacatchall
phrasetoincludealltypesofMalwaresuchasComputerWorms,TrojanHorses,Spyware,Adware,andRootkits.
Therearemanydifferentantivirusprogramsavailabletopreventandremoveviruses.Sincenewthreatsare
createdalmostconstantly,itisimportanttokeepthevirusdefinitionfilesupdatedforyoursoftware.
WormWormsarestandaloneprogramsthatdonotneedotherprogramsinordertoreplicatethemselveslikea
viruswhichreliesonuserstoinadvertentlyspreadit.VirusesandWormscanbepreventedbyinstallingantivirus
softwarewhichcanberunonservers,clients,firewallsandotherdevices.
AttackersWearen'tentirelysurewhatCompTIAisreferringtowiththistermsowewillofferageneral
definition.Thetermattackersreferstoanypersonorgroupofpeoplethatcauseharmonindividualcomputers,
networks,andtheinternet.Thiscouldincludehackers,virusandmalwarecreators,andanyoneelsewhoattempts
tointerferewithnormalcomputerandnetworkoperations.
ManintheMiddleTheseattackscanincludetheinterceptionofemail,files,passwordsandothertypesofdata
thatcanbetransferredacrossanetwork.ThisisaformofDataTheftattack.
SmurfThisisatypeofdenialofserviceattackthatfloodsatargetsystemviaspoofedbroadcastpingmessages
inanattempttocausemassivenetworktraffic.Toaccomplishthis,theattackersendsICMPechopacketsto
broadcastaddressesofvulnerablenetworkswithaforgedsourceaddresspointingtothetarget(victim)ofthe
attack.AllthesystemsonthesenetworksreplytothevictimwithICMPechoreplieswhichwilloverloadit.These
typesofattacksareveryeasytoprevent,andasaresult,arenolongerverycommon.
RogueAccessPointThistermmostoftenreferstounauthorizedaccesspointsthataredeployedwith
maliciousintent.Butingeneral,itwouldrefertoanyunauthorizeddeviceregardlessofitsintent.TypesofRogue
APscouldincludeoneinstalledbyanemployeewithoutproperconsent,amisconfiguredAPthatpresentsasecurity
risk,APfromneighboringWLANs,oroneusedbyanattacker.Topreventtheinstallationofrogueaccesspoints,
organizationscaninstallwirelessintrusionpreventionsystemstomonitortheradiospectrumforunauthorized
accesspoints.
SocialEngineering(Phishing)Socialengineeringdescribesvarioustypesofdeceptionusedforthepurpose
ofinformationgathering,fraud,orcomputersystemaccess.Phishing,aformofsocialengineering,isthefraudulent
processofattemptingtoacquiresensitiveinformationsuchasusernames,passwordsandcreditcarddetailsby
masqueradingasatrustworthyentityinanelectroniccommunicationsuchasemail,chat,orinstantmessaging.
MitigationTechniquesForthepurposesofthisguide,wecan'tcoverallofthevariousoptionstoprevent
securitybreaches,sowe'llkeepitbriefwiththefollowing:
PoliciesandProceduresanoutlineinagroup,organizationoracrossanenterprisewhichoutlinesdifferent
setsofstandardsandactions.Thesewilloftendefineacceptableuseofnetworksystemsandrepercussions
forviolations.Generallytheyaredraftedbysystemandnetworkadministratorsasanoutlineofserviceand
useandlegalwillgenerallytightenuptheactualmeaning.Managementwillultimatelyneedtofollowup
withapprovalauthorizationandwhowillactuallyenforcethem.
UserTrainingskillsthatneedtobecommunicatedtotheendusercommunitythatareusingthenetwork
resourcesandconnectedsystems.Thistrainingusuallyconsistsofrudimentaryexplanationsofexpectedand
acceptableuseandwhattheproceduresareforviolations.Additionally,itwillincludesomebasiclevelof
explanationofsecuritythreatsandhowuserinteractioncanhelpdefendthenetworkaswellasmakeit
moreatriskwhenthewrongactionsaretaken.
PatchesandUpdatesoperatingsystemupdatesandapplicationfixesthatarereleasedtoenhancesecurity
featuresortofixknownissueswithsoftware.Generally,mostofthepatchesandsomeoftheupdatesare
releasedinordertocorrectrecentlydiscoveredsecuritydeficienciesinthecode.Theseupdatesarealways
deliveredbytheapplicationownerunlessaspecificagreementismadebetweentheapplicationownerand
anothervendor.Usersandadministratorswouldgenerallydownloadtheseupdatesmanuallytoinstallonto
systemsorsetupsometypeofautomatedsystemfordeliverytomanagedsystemsanddevices.