CompTIA A+ 220-1001 Core 1 Course Notes PDF

Summary

These are course notes for CompTIA 220-1001 Core 1. Covering mobile devices, networking, hardware, virtualization, and troubleshooting. Written by Professor Messer.

Full Transcript

Professor Messer’s CompTIA 220-1001 Core 1 A+ Course Notes James “Professor” Messer http://www.ProfessorMesser.com Professor Messer’s CompTIA 220-1001 Core 1 A+ Course Notes Written by James “Professor” Messer Copyright © 2018 by Messer Studios, LLC http://www.ProfessorMesser.com All...

Professor Messer’s CompTIA 220-1001 Core 1 A+ Course Notes James “Professor” Messer http://www.ProfessorMesser.com Professor Messer’s CompTIA 220-1001 Core 1 A+ Course Notes Written by James “Professor” Messer Copyright © 2018 by Messer Studios, LLC http://www.ProfessorMesser.com All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher. First Edition: November 2018 This is version 1.09 Trademark Acknowledgments All product names and trademarks are the property of their respective owners, and are in no way associated or affiliated with Messer Studios LLC. “Professor Messer” is a registered trademark of Messer Studios LLC. “CompTIA” and “A+” are registered trademarks of CompTIA, Inc. Warning and Disclaimer This book is designed to provide information about the CompTIA 220-1001 A+ certification exam. However, there may be typographical and/or content errors. Therefore, this book should serve only as a general guide and not as the ultimate source of subject information. The author shall have no liability or responsibility to any person or entity regarding any loss or damage incurred, or alleged to have incurred, directly or indirectly, by the information contained in this book. Contents 1.0 - Mobile Devices 1 1.1 - Laptop Hardware 1 1.2 - Laptop Displays 2 1.3 - Laptop Features 2 1.4 - Mobile Devices 3 1.5 - Mobile Device Connections 4 1.5 - Mobile Device Accessories 4 1.6 - Mobile Device Connectivity 5 1.6 - Configuring Email on Mobile Devices 6 1.7 - Mobile Device Synchronization 7 2.0 - Networking 8 2.1 - Introduction to IP 8 2.1 - Common Network Ports 9 2.2 - Network Devices 10 2.3 - Installing a SOHO Network 12 2.3 - Configuring a SOHO Firewall 12 2.4 - 802.11 Wireless Standards 13 2.4 - Wireless Network Technologies 14 2.4 - Cellular Network Technologies 15 2.5 - Network Services 16 2.6 - An Overview of IPv4 and IPv6 17 2.6 - Assigning IP Addresses 18 2.6 - Using IP Addresses 18 2.7 - Internet Connection Types 20 2.7 - Network Types 20 2.8 - Network Tools 21 3.0 - Hardware 22 3.1 - Copper Network Cables 22 3.1 - Fiber Network Cables 23 3.1 - Video Cables 24 3.1 - Multipurpose Cables 25 3.1 - SATA Drive Cables 26 3.1 - PATA Drive Cables 26 3.1 - SCSI Drive Cables 27 3.1 - Adapters and Converters 28 3.2 - Connectors 29 3.3 - Overview of Memory 29 3.3 - Memory Technologies 31 3.4 - Storage Devices 31 3.4 - RAID 32 3.5 - Motherboard Form Factors 33 3.5 - Motherboard Expansion Slots 34 3.5 - Motherboard Connectors 34 3.5 - BIOS 35 3.5 - BIOS Options 35 3.5 - BIOS Security 36 3.5 - Installing BIOS Upgrades 36 3.5 - CPU Features 37 3.5 - CPU Cooling 38 3.5 - Expansion Cards 38 3.6 - Peripherals 39 3.7 - Computer Power 40 3.8 - Custom Computer Systems 41 3.9 - Common Devices 42 3.10 - SOHO Multifunction Devices 43 3.11 - Laser Printers 44 3.11 - Laser Printer Maintenance 44 3.11 - Inkjet Printers 45 3.11 - Inkjet Printer Maintenance 45 3.11 - Thermal Printers 46 3.11 - Thermal Printer Maintenance 46 3.11 - Impact Printers 46 3.11 - Impact Printer Maintenance 46 3.11 - Virtual and 3D Printers 47 4.0 - Virtualization and Cloud Computing 47 4.1 - Cloud Models 47 4.1 - Cloud Services 48 4.2 - Client-side Virtualization 49 5.0 - Hardware and Network Troubleshooting 50 5.1 - How to Troubleshoot 50 5.2 - Troubleshooting Common Hardware Problems 51 5.3 - Troubleshooting Hard Drives 52 5.4 - Troubleshooting Video and Display Issues 53 5.5 - Troubleshooting Laptops 54 5.5 - Troubleshooting Mobile Devices 54 5.5 - Device Disassembly Best Practices 55 5.6 - Troubleshooting Printers 56 5.7 - Troubleshooting Networks 57 Introduction The CompTIA A+ certification requires a broad set of knowledge, and it covers more topics than many industry certifications. It’s no surprise that the A+ certification has become one of the most sought-after industry certifications by both aspiring technologists and employers. I hope this book helps you with your “last mile” of studies before taking your exam. There’s a lot to remember, and perhaps some of the information in this book will help jog your memory while you’re sitting in the exam room. Best of luck with your studies! - Professor Messer The CompTIA A+ Certification CompTIA’s A+ certification is considered to be the starting point for information technology professionals. Earning the A+ certification requires the completion of two exams and covers a broad range of technology topics. After earning the CompTIA A+ certification, an A+ certified professional will have an understanding of computer hardware, mobile devices, networking, operating systems, security techniques, and much more. The current series of the A+ certification is based on the successful completion of the 220-1001 and the 220-1002 exams. You must pass both exams to earn your CompTIA A+ certification. This book provides a set of notes for the 220-1001 Core 1 exam. The 220-1001 Core 1 exam Much of the 220-1001 exam is about hardware, but that’s only about a third of the overall exam content. You’ll also need to know about networking, mobile devices, and how to troubleshoot all of these technologies. Here’s the breakdown of each domain on the 220-1001 exam: Domain 1.0 - Mobile Devices - 14% Domain 2.0 - Networking - 20% Domain 3.0 - Hardware - 27% Domain 4.0 - Virtualization and Cloud Computing - 12% Domain 5.0 - Hardware and Network Troubleshooting - 27% Study Tips Exam Preparation Taking the Exam Download the exam objectives, Use your time wisely. You've got 90 minutes and use them as a master checklist: to get through everything. http://www.ProfessorMesser.com/objectives Choose your exam location carefully. Use as many training materials as possible. Some sites are better than others. Books, videos, and Q&A guides can all provide a Get there early. Don't stress the journey. different perspective of the same information. Manage your time wisely. It's useful to have as much hands-on as possible, You've got 90 minutes to get through everything. especially with network troubleshooting and Wrong answers aren't counted against you. operating system command prompts. Don't leave any blanks! Mark difficult questions and come back later. You can answer the questions in any order. Professor Messer’s CompTIA A+ 220-1001 Course Notes http://www.ProfessorMesser.com 1.1 - Laptop Hardware Laptop Storage Screen SSD (Solid-state drive) LCD (Liquid Crystal Display) All memory, no moving parts Light and high-resolution Silent, fast access time, less latency Very, very fragile - Get a good case! 2.5 inch and 1.8 inch form factors Resolutions are fixed Hybrid drive (SSHD) Changes to native resolution may look Solid-state hybrid drive blurry or not as crisp Flash memory and hard drive storage Laptop power – AC adapters SSD caches the hard drive data Auto-switching or fixed input Magnetic disk Converts AC to DC Traditional spinning drive platters Input voltage - 110 volts / 220 volts Replacing Laptop Storage DC jack on the laptop Can be very modular Specific to the power supply type Two screws and the drive slides out Laptop power - batteries All internal Lithium Ion (Li-ion) Open a cover on the back Common in consumer electronics Open the entire laptop No “memory effect” Laptop memory Charging the battery diminishes capacity SO-DIMM Laptop frame Small Outline Dual In-line Memory Module Plastic Micro-DIMM Lightweight, mobile Micro-Dual In-line Memory Module Durable, difficult to break Memory used in laptops and mobile devices Inexpensive, cost-effective Smart card reader Metal Integrated card reader More durable than plastic Built into the laptop Can be more difficult to repair External reader Speaker USB connected Self-contained - Portable audio Optical drive Not the highest quality - Very small Too large for today’s portable devices Often stereo (L/R) - May include a subwoofer! Becoming difficult to find System board Often removable Proprietary Replace with other media Built to fit Read and write CD-RW/CD-ROM and DVD-RW/DVD- Replacement isn’t easy ROM Swap the entire board In a portable device Most components are on the system board Video Cards CPU Often built into the processor Designed for mobility Not upgradable Power management Sometimes part of the system board Integrated features Again, not upgradable Memory controller, video controller Some laptops have upgradable video cards Not very upgradable Not the slimline models Replaceable, but not upgradeable Often slower than desktops Size and heat are disadvantages © 2018 Messer Studios, LLC Professor Messer’s CompTIA 220-1001 A+ Course Notes - Page 1 http://www.ProfessorMesser.com 1.2 - Laptop Displays Portable LCD Microphone Liquid crystal display - Light shines through liquid crystals Built-in to the laptop - Useful for video calls Advantages Not good for non-casual use Lightweight Analog or USB microphones can help Relatively low power and relatively inexpensive Fluorescent vs. LED backlighting Disadvantages LED-backlit LCD display Black levels are a challenge Backlight is LEDs instead of florescent Requires separate backlight LEDs around the edge of the screen Florescent, LED, etc. / Difficult to replace An array of LEDs behind the screen OLED on laptops CCFL - Cold Cathode Fluorescent Lamp Organic Light Emitting Diode Higher voltage and power needed Organic compound emits light when Added thickness to the display receiving an electric current No longer a common backlight Thinner and lighter Backlight and inverter Flexible and mobile - no glass needed LCD displays need a backlight No backlight - The organic compound provides the light Florescent lamp to LCD display to your eyes Not quite ready for laptops Some laptops have inverters - Turn DC into AC Organic materials degrade over time Verify backlight - Look closely Decayed images can remain on the screen May need to replace the LCD inverter or display More costly and power hungry than LCD Choose carefully Wi-Fi antennas Digitizer Multiple antennas - WiFi main and aux and Bluetooth Use a pen-like device as input - Useful for graphical input Antenna wires wrap around the laptop screen Becoming more common on laptop / tablets / hybrids Laptop webcam Touchscreen Video capture - Built-in camera and microphone Merge laptop and tablet input Usually includes both audio and video No keyboard required, but often still available Specialized drivers and software Many options for input - Use the best one for the job 1.3 - Laptop Features Dual displays Screen brightness Toggle Fn keys Control the backlight Secondary functions Secondary function keys Toggle between LCD / external monitor / both More light, more power LCD switch Conserve your battery The “refrigerator door” effect Keyboard backlight Physical switch on older systems An option on many laptops Internal magnetic switch on newer portable systems See in the dark Set functionality in the BIOS or utility Secondary function control Wireless control Intensity Control your wireless signal Duration Airplane mode, secure areas Disable Look for a status light Touch pad Physical switch or function key Enable and disable May include 802.11, Bluetooth, and cellular Avoid inadvertent mouse clicks and movements Look for the symbol or status light Screen orientation Volume settings Rotate the screen Another function key Useful on rotating tablet / laptops May be a standalone key Landscape to portrait Often includes a mute option Fn key or hotkey Physical dial or button Different across manufacturers May see visual feedback © 2018 Messer Studios, LLC Professor Messer’s CompTIA 220-1001 A+ Course Notes - Page 2 http://www.ProfessorMesser.com 1.3 - Laptop Features (continued) Media options Rotating / removable screens Control audio and video from your keyboard Combine a laptop keyboard with a tablet screen No mouse clicking Presentation display Play, stop, rewind, fast forward May include a stylus for input Mute, volume GPS Listen for GPS signals May also be associated with airplane mode or other wireless settings Docking station Docking station Use external keyboard and mouse Extend existing laptop interfaces Add additional functionality Desktop adapter cards Avoid cable issues Port replicator Similar to a docking station Does not have an expansion card option Physical laptop locks Keep your laptop from walking away The bad guys are good at this Connect to a solid object Nothing moves Laptops include metal-reinforced locking slots Connect to the lock 1.4 - Mobile Devices Tablets Virtual reality Single-screen touch computers Replace reality with a computer-generated version iOS, Android, etc. Input from the real world interacts Larger than ~7 inches diagonal with the virtual world Designed for touch input Many different application Virtual keyboards, drawing interfaces Gaming, industrial design, art Application support Enhanced video and image viewing Productivity, games, utility, etc. Augmented reality Specialized applications Overlay a virtual augmentation with the physical world Media - Take pictures, watch movies The computer provides additional detail Smart Phones Used in medical, travel, gaming Mobile communication e-Readers Voice, email, text, instant message, pictures, video Specialized device ~ 3.5 inches to 6 inches diagonal Book reading - Some music, some apps Media viewer - Music, movies, videos Electronic paper Mobile applications Black and white screen Maps, travel information Performs well in direct light Other apps Exceptionally long battery life Productivity, games, specialized apps, etc. Network access - WiFi, cellular Wearable technology GPS Smart watches In-car navigation (and non-car) An extension of your phone and body Requires a view of the sky - Need to receive GPS signal Fitness monitors Periodic updates required Track heart rate, steps, sleep patterns, and more Over the air and memory card © 2018 Messer Studios, LLC Professor Messer’s CompTIA 220-1001 A+ Course Notes - Page 3 http://www.ProfessorMesser.com 1.5 - Mobile Device Connections Micro-USB and mini-USB EU standardized on Micro-USB Common now worldwide Older devices may use Mini-USB Slightly larger USB-C 24-pin double-sided USB connector Used for both hosts and devices Mini-B Micro-B Micro-B USB-C Acts as a USB 3.1 / USB 2.0 connection Plug Plug Plug Plug Only the interface is different Includes an analog audio option Headset support through a 3.5 mm jack Lightning Apple proprietary 8-pin digital signals Lightning plug iPhone, iPad, iPod devices Some advantages over Micro-USB Higher power output for phones and tablets Bluetooth Can be inserted either way High speed communication over short distances Simpler design, more durable PAN (Personal Area Network) Tethering Connects our mobile devices Physically connect a device to your mobile phone Smartphones Use the Internet/data connection Tethering Headsets and headphones Enable Internet access from almost anywhere Health monitors May require service or configuration by wireless carrier Automobile and phone integration Proprietary mobile interfaces Smartwatches Early mobile technology was all about cables External speakers One cable for power Hotspot A completely different cable for data Turn your phone into a WiFi hotspot Every manufacturer was different - Intentionally Your own personal wireless router The EU changed things Extend the cellular data network to Common external power supply for all data-enabled all of your devices mobile phones sold in the European Union Dependent on phone type and provider NFC (Near Field Communication) May require additional charges and data costs Send small amounts of data wirelessly over a limited area IR (Infrared) Built into your phone Included on many smartphones, tablets, and Payment systems, transportation, in-person information smartwatches exchange Not really used for file transfers and printing Access token, identity “card” Control your entertainment center Short range with encryption support Almost exclusively IR 1.5 - Mobile Device Accessories Headsets Game Pads Hands-free audio - Earphones and microphone Gaming console feel - Mobile phone or tablet Wired Connect with Bluetooth - Wireless connectivity Connects to TRRS connector (Tip-Ring-Ring-Sleeve) Extra battery packs / battery chargers Wireless - Bluetooth headsets Power is key - And in short supply Speakers Swappable battery pack Mobile audio - Battery powered Carry an extra or two Wireless connection - Bluetooth link External USB chargers Stereo sound - Small package Phones and tablets And any other USB devices © 2018 Messer Studios, LLC Professor Messer’s CompTIA 220-1001 A+ Course Notes - Page 4 http://www.ProfessorMesser.com 1.5 - Mobile Device Accessories (continued) Protective covers Memory / microSD Screen protector Increase storage capacity of smartphone or tablet Avoid scratches Common on Android devices May be difficult to install Not available on iOS devices Device protector MicroSD cards Wrap the entire device Small form factor, with increasing capacities Waterproofing options are available Can create problems for docking stations Credit card readers Phone or tablet becomes a point of sale terminal Connections to audio/mic TRRS jack Great for small and mobile businesses Uses the Internet link for approvals Immediate feedback Additional features Email receipts Sign with your finger SD memory card microSD memory card 1.6 - Mobile Device Connectivity Wireless / cellular data network Bluetooth pairing process Your phone has an Internet connection Enable Bluetooth on both devices Use your mobile provider network Android and iOS: Settings / Bluetooth Take advantage of this connectivity Set devices to discoverable mode Hotspot May require key sequence on Bluetooth device Turn your phone into a WiFi Router Select discovered device You may have to pay extra phone charges Many devices may appear! Other devices connect to your phone via WiFi Enter or confirm PIN Wireless / cellular data network Should be the same on both devices Tethering Test connectivity Anchored to your mobile device Devices should now communicate Connect your laptop via USB or Bluetooth Your phone is a radio Single connection Baseband radio processor May require additional services from phone provider A network interface for your radio Wireless / cellular data network This isn’t WiFi or Bluetooth Airplane mode - One button turns off all radios Has its own firmware and memory Cellular, WiFi, Bluetooth, NFC, etc. Quite proprietary You can re-enable individual features without enabling cellular features Real-time operating system Useful when the airplane has WiFi Everything happens very quickly as needed Wireless networks The firmware can be updated Enable and disable cellular, WiFi, Over the air (OTA) and Bluetooth independently Invisible to the end user Airplanes, conserve battery Phone updates iOS - Settings / Cellular PRL updates Preferred Roaming List Android - Settings / Wireless & network settings CDMA networks (i.e., Verizon, Sprint) Bluetooth Allows your phone to connect to the right tower Short-range personal area network (PAN) Can be updated over the air (OTA) About 10 meters PRI updates Connect different devices Product Release Instructions Mouse, keyboard, headset, computer, Radio settings - ID numbers, network codes, automobile, speakers country codes, etc. Once paired, devices work together Also updated over the air Connect and disconnect automatically © 2018 Messer Studios, LLC Professor Messer’s CompTIA 220-1001 A+ Course Notes - Page 5 http://www.ProfessorMesser.com 1.6 - Mobile Device Connectivity (continued) IMEI VPN International Mobile Station Equipment Identity Turn your phone into a VPN endpoint Identifies a physical mobile device Important for secure communication Every phone has a different IMEI Integrated into the phone OS Can be used to allow or disallow access No additional software required IMSI May require some additional setup International Mobile Subscriber Identity Detailed configuration settings Identifies the user of a mobile network May support multifactor authentication Can be provisioned in the SIM card RSA SecureID Swap the SIM to move between phones 1.6 - Configuring Email on Mobile Devices Email configurations Microsoft Exchange Retrieving mail - POP3, IMAP Enterprise email Sending mail - SMTP Not a service for the home Corporate email - Microsoft Exchange More than just email Integrated providers Contacts, Calendars, Reminders iCloud, Google, Exchange Online, Yahoo Integrates with mobile device database Integrated contacts, calendars, etc. Retrieving mail messages Post Office Protocol 3 (POP3) Configuration options Used for downloading mail to local mail client Email, server, domain, username, password Downloads and (optionally) deletes from server Integrated message encryption with S/MIME Configuration information Secure/Multipurpose Internet Mail Extensions Name of POP3 server Encrypt and digitally sign Username and password Commercial email providers Network ports Gmail Defined by your mail provider Google email, splits inbox into tabs, IMAP4, POP3 POP3: tcp/110 Exchange Online (hosted email) SSL (Secure Socket Layer) settings - POP3S: tcp/995 IMAP4 and POP3 support Internet Message Access Protocol (IMAP4) iCloud Mail - Apple Mail, IMAP4 support only Access mail on a central server, Yahoo Mail - IMAP4 and POP3 support Mail is usually stored on the server Supports folders and server-side searching Configuration information Name of IMAP server Username and password Network ports Defined by your mail provider IMAP: tcp/143 SSL (Secure Socket Layer) settings - IMAPS: tcp/993 Sending email SMTP - Simple Mail Transfer Protocol Send mail from a device to a mail server IMAP and POP Or between mail servers incoming mail server You usually must send from a local or trusted device configuration settings Authentication usually required May be different credentials than the incoming mail Port numbers SMTP (no authentication, relatively unused): tcp/25 SMTP SMTP with authentication: tcp/587 outgoing mail server configuration settings © 2018 Messer Studios, LLC Professor Messer’s CompTIA 220-1001 A+ Course Notes - Page 6 http://www.ProfessorMesser.com 1.7 - Mobile Device Synchronization Synchronizing your data Synchronize to the desktop No single desktop Application requirements - OS and disk space Many different devices Operating System Complete mobility Mac, Windows Access anything from anywhere Synchronize to the desktop Many different types of data Relatively modern versions Email, calendar, apps, etc. Memory - Relatively minimal All devices must stay synchronized Storage space Most of it is invisible to us Enough to store backups, video, pictures Mutual authentication You’ll need quite a bit The client and server must authenticate iOS with each other Apple iTunes - syncs everything in the phone Data Types Creates full backups on the computer Contacts Android Applications Syncs online with Google Use third-party apps like doubleTwist Email to transfer movies and music Pictures, music, video Synchronize to the automobile Calendar Connect to your automobile over Bluetooth or wired cable Bookmarks Extends the phone functionality into the vehicle Documents Display maps, control phone calls, play music Location data Big display screen, keep hands on the wheel Social media data iOS CarPlay, Android Auto eBooks Synchronizes contact information, music, and other Passwords details Shares phone information in real-time Synchronize to the cloud This could be a security issue in a rental car Completely hands-off No physical cables, no local files Synchronization connections May be integrated into your iOS Exchange or Gmail USB - Proprietary (30-pin or 8-pin Lightning) Choose provider network and/or Wi-Fi USB-C 802.11 wireless Apple iOS Mobile network Sync all data types to iCloud Complete backup and recovery Android USB Micro-B Android USB-C Configure your Google account 802.11 wireless Mobile network Apple 8-pin USB Standard USB Micro-B Lightning USB-C Apple 30-pin Type-A © 2018 Messer Studios, LLC Professor Messer’s CompTIA 220-1001 A+ Course Notes - Page 7 http://www.ProfessorMesser.com 2.1 - Introduction to IP A series of moving vans UDP - User Datagram Protocol Communication Efficiently move large amounts of data Use a shipping truck The network topology is the road Ethernet, DSL, cable system The truck is the Internet Protocol (IP) We’ve designed the roads for this truck The boxes hold your data Boxes of TCP and UDP UDP – User Datagram Protocol Connectionless Inside the boxes are more things No formal open or close to the connection Application information “Unreliable” delivery Server No error recovery Client No reordering of data or retransmissions Ethernet Ethernet No flow control Ethernet Payload Header Trailer Ethernet Header IP IP Payload Ethernet Trailer Sender determines the amount of data transmitted Ethernet Ethernet IP TCP TCP Payload Header Trailer Speedy delivery The IP delivery truck delivers from Ethernet Ethernet IP TCP HTTP data Header Trailer one (IP) address to another (IP) address TCP and UDP Every house has an address, Transported inside of IP every computer has an IP address Encapsulated by the IP protocol Boxes arrive at the house / IP address Two ways to move data from place to place Where do the boxes go? Different features for different applications Each box has a room name OSI Layer 4 Port is written on the outside of the box The transport layer Drop the box into the right room Multiplexing Lots of ports Use many different applications at the same time IPv4 sockets - Server IP address, protocol, TCP and UDP server application port number Client IP address, protocol, client port number TCP – Transmission Control Protocol Connection-oriented Non-ephemeral ports – permanent port numbers A formal connection setup and close Ports 0 through 1,023 Usually on a server or service “Reliable” delivery Recovery from errors Ephemeral ports – temporary port numbers Can manage out-of-order messages or retransmissions Ports 1,024 through 65,535 Determined in real-time by the client Flow control The receiver can manage how much data is sent Port numbers TCP and UDP ports can be any number between 0 and 65,535 TCP - Transmission Control Protocol Communication Most servers (services) use non-ephemeral (not-temporary) port numbers This isn’t always the case It’s just a number. Port numbers are for communication, not security Service port numbers need to be “well known” TCP port numbers aren’t the same as UDP port numbers © 2018 Messer Studios, LLC Professor Messer’s CompTIA 220-1001 A+ Course Notes - Page 8 http://www.ProfessorMesser.com 2.1 - Common Network Ports FTP – File Transfer Protocol SMB - Server Message Block tcp/20 (active mode data), tcp/21 (control) Protocol used by Microsoft Windows Transfers files between systems File sharing, printer sharing Authenticates with a username and password Also called CIFS (Common Internet File System) Some systems use a generic/anonymous login Using NetBIOS over TCP/IP Full-featured functionality udp/137 - NetBIOS name services (nbname) List, add, delete, etc. udp/138 - NetBIOS datagram service (nbdatagram) tcp/139 - NetBIOS session service (nbsession) SSH - Secure Shell Encrypted communication link - tcp/22 Direct over tcp/445 (NetBIOS-less) Looks and acts the same as Telnet Direct SMB communication over TCP without the NetBIOS transport Telnet Telnet – Telecommunication Network - tcp/23 AFP (Apple Filing Protocol) File services in macOS Login to devices remotely tcp/548 Console access Works with SLP (Service Location Protocol) In-the-clear communication tcp/427 and udp/427 Not the best choice for production systems Populates the list of available devices SMTP - Simple Mail Transfer Protocol File management Server to server email transfer - tcp/25 Copy, move, delete files Also used to send mail from a device to a mail server DHCP - Dynamic Host Configuration Protocol Commonly configured on mobile devices Automated configuration of IP address, subnet mask and email clients and other options Other protocols are used for clients to receive email udp/67, udp/68 IMAP, POP3 Requires a DHCP server DNS - Domain Name System Server, appliance, integrated into a SOHO router, etc. Converts names to IP addresses - udp/53 Dynamic / pooled www.professormesser.com = 162.159.246.164 IP addresses are assigned in real-time from a pool These are very critical resources Each system is given a lease and must renew Usually multiple DNS servers are in production at set intervals DHCP reservation HTTP and HTTPS Addresses are assigned by MAC address Hypertext Transfer Protocol - tcp/80 in the DHCP server Communication in the browser Quickly manage addresses from one location And by other applications In the clear or encrypted - HTTPS - tcp/443 LDAP (Lightweight Directory Access Protocol) Supported by nearly all web servers and clients tcp/389 POP / IMAP Store and retrieve information in a network directory Receive emails from an email server Commonly used in Microsoft Active Directory Authenticate and transfer SNMP - Simple Network Management Protocol POP3 - Post office Protocol version 3 - tcp/110 Gather statistics from network devices Basic mail transfer functionality Queries: udp/161 IMAP4 Traps: udp/162 Internet Message Access Protocol v4 - tcp/143 v1 – The original Includes management of email inbox Structured tables, in-the-clear from multiple clients v2 – A good step ahead RDP - Remote Desktop Protocol Data type enhancements Share a desktop from a remote location over tcp/3389 Bulk transfers, still in-the-clear Remote Desktop Services on many Windows versions v3 – A secure standard Can connect to an entire desktop Message integrity or just an application Authentication, encryption Clients for Windows, macOS, Linux, Unix, iPhone, Android, and others © 2018 Messer Studios, LLC Professor Messer’s CompTIA 220-1001 A+ Course Notes - Page 9 http://www.ProfessorMesser.com 2.1 - Common Network Ports (continued) Protocol Port Name Descrip/on FTP tcp/20, tcp21 File Transfer Protocol Sends and receives files between systems SSH tcp/22 Secure Shell Encrypted console access Telnet tcp/23 TelecommunicaCon Network Insecure console access SMTP tcp/25 Simple Mail Transfer Protocol Transfer email between mail servers DNS udp/53, tcp/53 Domain Name System Convert domain names to IP addresses HTTP tcp/80 Hypertext Transfer Protocol Web server communicaCon HTTPS tcp/443 Hypertext Transfer Protocol Secure Web server communicaCon with encrypCon POP3 tcp/110 Post Office Protocol version 3 Receive email into a email client IMAP4 tcp/143 Internet Message Access Protocol v4 A newer email client protocol RDP tcp/3389 Remote Desktop Protocol Graphical display of remote devices NetBIOS udp/137 NetBIOS name service Register, remove, and find Windows services by name NetBIOS udp/138 NetBIOS datagram service Windows connecConless data transfer NetBIOS tcp/139 NetBIOS session service Windows connecCon-oriented data transfer SMB tcp/445 Server Message Block Windows file transfers and printer sharing AFP tcp/548 Apple Filing Protocol Mac OS file transfers SLP tcp/427, udp/427 Service LocaCon Protocol Find Mac OS services by name DHCP udp/67, udp/68 Dynamic Host ConfiguraCon Protocol Automate the IP address configuraCon process LDAP tcp/389 Lightweight Directory Access Protocol Directory services SNMP udp/161 Simple Network Management Protocol Gather metrics and manage network devices 2.2 - Network Devices Network Interface Card (NIC) Bridge The fundamental network device Imagine a switch with two to four ports Every device on the network has a NIC Makes forwarding decisions in software Computers, servers, printers, routers, switches, phones, Connects different physical networks tablets, cameras, etc. Can connect different topologies Specific to the network type Gets around physical network size limitations / Ethernet, WAN, wireless, etc. collisions Often built-in to the motherboard Distributes traffic based on MAC address Or added as an expansion card A modern bridge is a wireless access point Many options Bridges wired Ethernet to wireless Single port, multi-port, copper, fiber Switches Repeater Bridging done in hardware Receive signal, regenerate, resend Application-specific integrated circuit (ASIC) No forwarding decisions to make Forwards traffic based on data link address Common use Many ports and features Boost copper or fiber connections The core of an enterprise network Convert one network media to another May provide Power over Ethernet (PoE) Extend wireless network reach Multilayer switch - Includes routing functionality Hub Unmanaged switches “Multi-port repeater” Very few configuration options Traffic going in one port is repeated to every other port Plug and play Everything is half-duplex Fixed configuration Becomes less efficient as network speeds increase No VLANs 10 megabit / 100 megabit Very little integration with other devices Difficult to find today No management protocols Low price point Simple is less expensive © 2018 Messer Studios, LLC Professor Messer’s CompTIA 220-1001 A+ Course Notes - Page 10 http://www.ProfessorMesser.com 2.2 - Network Devices (continued) Managed switches Cable modem VLAN support Broadband Interconnect with other switches via 802.1Q Transmission across multiple frequencies Traffic prioritization Different traffic types Voice traffic gets a higher priority Data on the “cable” network Redundancy support DOCSIS (Data Over Cable Service Interface Specification) Spanning Tree Protocol (STP) High-speed networking External management 4 Mbits/s through 250 Mbits/s are common Simple Network Management Protocol (SNMP) Gigabit speeds are possible Port mirroring Multiple services Capture packets Data, voice Routers DSL modem Routes traffic between IP subnets ADSL (Asymmetric Digital Subscriber Line) Makes forwarding decisions based on IP address Uses telephone lines Routers inside of switches sometimes called Download speed is faster than the upload speed “layer 3 switches” (asymmetric) Often connects diverse network types ~10,000 foot limitation from the central office (CO) LAN, WAN, copper, fiber 52 Mbit/s downstream / 16 Mbit/s upstream are common Wireless access point (WAP) Faster speeds may be possible if closer to the CO Not a wireless router A wireless router is a router and a WAP Patch panels in a single device Combination of punch-down blocks and RJ-45 connectors WAP is a bridge Runs from desks are made once Extends the wired network Permanently punched down to patch panel onto the wireless network Patch panel to switch can be easily changed Makes forwarding decisions No special tools based on MAC address Use existing cables Wireless LAN controllers Power over Ethernet Centralized management of WAPs Power provided on an Ethernet cable A single “pane of glass” One wire for both network and electricity Management functions Phones, cameras, wireless access points Deploy new access points Useful in difficult-to-power areas Performance and security monitoring Power provided at the switch Configure and deploy changes to all sites Built-in power - Endspans Report on access point use In-line power injector - Midspans Usually a proprietary system PoE switch The wireless controller is paired Power over Ethernet with the access points Commonly marked on the switch or interfaces Can also be cloud-based Manage the console from anywhere Ethernet over Power (EOP) Also called Power-line communication (PLC) Firewalls IEEE standard 1901 Filters traffic by port number 500 megabits per second OSI layer 4 (TCP/UDP) Standard includes links to the premise, intra-building Some firewalls can filter through OSI layer 7 networking, vehicles, smart energy devices, and more Can encrypt traffic into/out of the network Protect your traffic between sites Can proxy traffic A common security technique Most firewalls can be layer 3 devices (routers) Usually sits on the ingress/egress of the network © 2018 Messer Studios, LLC Professor Messer’s CompTIA 220-1001 A+ Course Notes - Page 11 http://www.ProfessorMesser.com 2.3 - Installing a SOHO Network The SOHO router NIC configuration An all-in-one device Wired Modem, router, switch, wireless AP, firewall, etc. May not have many options Routing and switching Ports configured for auto speed and duplex Routing to the outside world Speed: 10/100/1000 WAN / DSL port Duplex: Half/Full Switching local devices Wireless One VLAN / LAN1, LAN2, LAN3, LAN4, etc. Enable/disable Not much to configure End-user device configuration Routes and switches by default Automatic Auto speed and duplex Access point settings DHCP addressing Enable/disable frequencies 2.4 GHz and/or 5 GHz End-user device configures based on router Available options will depend on the wireless standard IP address used Subnet mask Default gateway Configure an SSID DNS servers May need a separate SSID for each frequency Security mode IoT configurations WPA2, preferably Internet of Things Pre-shared key or Enterprise Home automation, mostly wireless Security is an issue Channel / channel bandwidth Automatic / other nearby networks Devices Thermostat IP addressing Light switches WAN interface Security cameras Automatically assigned via DHCP from the ISP Door locks May require authentication Voice-enabled smart speakers / digital assistants LAN interface Almost all devices communicate outbound Internal IP address and subnet mask of the router No special port-mapping or DHCP address range for other devices NAT configurations required DNS server addresses 2.3 - Configuring a SOHO Firewall Firewall and DMZ ports Configuring NAT Every SOHO router is also a firewall For SOHO devices, this is automatic No external device can directly access the internal Source NAT, also called PAT (Port Address Translation) network All internal devices are translated to This normally can’t be disabled a single external address DMZ ports can be configured to Port forwarding allow unrestricted access 24x7 access to a service hosted internally This is almost always a bad idea Web server, gaming server, security system, etc. Consider creating more specific port forwarding rules External IP/port number maps to an internal IP/port Or perhaps don’t allow any access Does not have to be the same port number NAT (Network Address Translation) Also called Destination NAT or Static NAT It is estimated that there are over 20 billion devices Destination address is translated from a connected to the Internet (and growing) public IP to a private IP IPv4 supports around 4.29 billion addresses Does not expire or timeout The address space for IPv4 is exhausted Port forwarding There are no available addresses to assign How does it all work? Network Address Translation This isn’t the only use of NAT NAT is handy in many situations © 2018 Messer Studios, LLC Professor Messer’s CompTIA 220-1001 A+ Course Notes - Page 12 http://www.ProfessorMesser.com 2.3 - Configuring a SOHO Firewall (continued) UPnP (Universal Plug and Play) Wireless channels and encryption Allows network devices to automatically Configure for the highest encryption possible configure and find other network devices WPA2-AES Zero-configuration Choose WPA2 over WPA Applications on the internal network can WEP is not an appropriate option open inbound ports using UPnP Check your devices No approval needed Not all of them may allow for the highest encryption Used for many peer-to-peer (P2P) applications Use an open frequency Best practice would be to disable UPnP Some access points will Only enable if the application requires it automatically find good frequencies And maybe not even then Whitelist/blacklist Content filtering, IP address ranges Or a combination Whitelisting Nothing pass through the firewall unless it’s approved Very restrictive Blacklisting Nothing on the “bad list” is allowed Specific URLs Domains IP addresses MAC filtering Media Access Control The “hardware” address Managing QoS (Quality of Service) Limit access through the physical hardware address Change the priority of your traffic Keeps the neighbors out Voice is high, World of Warcraft is low Additional administration with visitors Or vice-versa Easy to find working MAC addresses Prioritize applications, ports, or MAC addresses through wireless LAN analysis A feature of high-end SOHO routers MAC addresses can be spoofed Free open-source software Be careful You could accidentally cause applications to slow down Security through obscurity 2.4 - 802.11 Wireless Standards Wireless Standards 802.11b Wireless networking (802.11) Also an original 802.11 standard - October 1999 Managed by the IEEE LAN/MAN Operates in the 2.4 GHz range Standards Committee (IEEE 802) 11 megabits per second (Mbit/s) Many updates over time Better range than 802.11a Check with IEEE for the latest Less absorption problems The Wi-Fi trademark More frequency conflict Wi-Fi Alliance handles interoperability testing Baby monitors, cordless phones, 802.11a microwave ovens, Bluetooth One of the original 802.11 wireless standards 802.11g October 1999 An “upgrade” to 802.11b - June 2003 Operates in the 5 GHz range Operates in the 2.4 GHz range 54 megabits per second (Mbit/s) 54 megabits per second (Mbit/s) Smaller range than 802.11b Same as 802.11a (but a little bit less throughput) Higher frequency is absorbed by objects in the way Backwards-compatible with 802.11b Many rules-of-thumb calculate 1/3rd Same frequency conflict problems as 802.11b the range of 802.11b or 802.11g © 2018 Messer Studios, LLC Professor Messer’s CompTIA 220-1001 A+ Course Notes - Page 13 http://www.ProfessorMesser.com 2.4 - 802.11 Wireless Standards (continued) 802.11n 802.11ac The update to 802.11g, 802.11b, and 802.11a Approved in January 2014 October 2009 Significant improvements over 802.11n Operates at 5 GHz and/or 2.4 GHz Operates in the 5 GHz band 40 MHz channel widths Less crowded, more frequencies 600 megabits per second (Mbit/s) (up to 160 MHz channel bandwidth) 40 MHz mode and 4 antennas Increased channel bonding - Larger bandwidth usage 802.11n uses MIMO Denser signaling modulation - Faster data transfers Multiple-input multiple-output Eight MU-MIMO streams Multiple transmit and receive antennas Twice as many streams as 802.11n Nearly 7 gigabits per second Maximum Maximum Maximum theore4cal theore4cal Frequencies MIMO streams throughput throughput (per stream) (total) 802.11a 5 GHz Not applicable 54 Mbit/s 54 Mbit/s 802.11b 2.4 GHz Not applicable 11 Mbit/s 11 Mbit/s 802.11g 2.4 GHz Not applicable 54 Mbit/s 54 Mbit/s 802.11n 5 GHz and/or 2.4 GHz 4 MIMO 150 Mbit/s 600 Mbit/s 802.11ac 5 GHz 8 MU-MIMO 866.7 Mbit/s ~6.8 Gbit/s 2.4 - Wireless Network Technologies 802.11 technologies Bluetooth Frequency High speed communication over short distances 2.4 GHz or 5 GHz (and sometimes both) PAN (Personal Area Network) Channels Connects our mobile devices Groups of frequencies, numbered by the IEEE Smartphones Non-overlapping channels would be necessary Tethering and file transfers Bandwidth Headsets and headphones Amount of frequency in use Health monitors 20 MHz, 40 MHz, 80 MHz, 160 MHz Automobile and phone integration Smartwatches 802.11 channel bandwidths External speakers 802.11a - 20 MHz 802.11b - 22 MHz Near field communication (NFC) Two-way wireless communication 802.11g - 20 MHz Builds on RFID, which is mostly one-way 802.11n Payment systems 20 MHz or 40 MHz Major credit cards (two contiguous 20 MHz bonded channels) Online wallets In 2.4 GHz, a 40 MHz channel uses much of the available bandwidth Bootstrap for other wireless NFC helps with Bluetooth pairing 802.11ac 40 MHz for 802.11n stations Access token, identity “card” 80 MHz required for 802.11ac stations Short range with encryption support 160 MHz optional (contiguous channels or non- contiguous bonded channels) © 2018 Messer Studios, LLC Professor Messer’s CompTIA 220-1001 A+ Course Notes - Page 14 http://www.ProfessorMesser.com 2.4 - Wireless Network Technologies (continued) RFID (Radio-frequency identification) Z-Wave It’s everywhere Proprietary home automation networking Access badges Internet of Things (IoT) Inventory/Assembly line tracking Control lights, locks, garage doors, etc. Pet/Animal identification Wireless mesh networking Anything that needs to be tracked Nodes can hop through Radar technology other nodes on Radio energy transmitted to the tag the way to the destination RF powers the tag, ID is transmitted back Uses the ISM band Bidirectional communication Industrial, Scientific, Some tag formats can be active/powered and Medical Zigbee 900 MHz frequencies in the US Internet of Things networking No conflicts with 802.11 Open standard - IEEE 802.15.4 PAN Alternative to WiFi and Bluetooth Longer distances than Bluetooth Less power consumption than WiFi Mesh network of all Zigbee devices in your home Light switch communicates to light bulbs Tell Amazon Echo to lock the door Uses the ISM band Industrial, Scientific, and Medical 900 MHz and 2.4 GHz frequencies in the US 2.4 GHz Spectrum for 802.11 - North America IEEE Channel # 1 6 11 20 MHz 2412 MHz 2482 MHz 5 GHz Spectrum for 802.11 - North America IEEE Channel # 36 40 44 48 52 56 60 64 68 72 76 80 84 88 92 96 100 104 108 112 116 120 124 128 132 136 140 144 149 153 157 161 165 169 173 177 20 MHz 40 MHz 80 MHz 160 MHz UNII-1 UNII-2 UNII-2 UNII-3 5150 MHz 5250 MHz 5350 MHz 5470 MHz 5725 MHz 5825 MHz 5925 MHz Available channels New channels added in April 2014 Previously indoor channels, usable outdoors aFer April 2014 Frequencies not available for 802.11 2.4 - Cellular Network Technologies Cellular networks 3G technology Mobile devices 3rd Generation “Cell” phones Introduced in 1998 Separate land into “cells” Upgraded data connectivity over 2G Antenna coverages a cell with certain frequencies Incremental 3G updates improved speeds 2G networks Usually several megabits per second GSM - Global System for Mobile Communications Bandwidth improvement allowed new functionality CDMA - Code Division Multiple Access GPS Poor data support Mobile television Originally used circuit-switching Video on demand Minor upgrades for some packet-switching Video conferencing © 2018 Messer Studios, LLC Professor Messer’s CompTIA 220-1001 A+ Course Notes - Page 15 http://www.ProfessorMesser.com 2.4 - Cellular Network Technologies (continued) 4G and LTE Moving to 5G Long Term Evolution (LTE) Update to 4G - Rollout in late 2018 and 2019 A “4G” technology Worldwide launches in 2020 Converged standard (GSM and CDMA providers) Significant performance improvements Based on GSM and At higher frequencies EDGE (Enhanced Data Rates for GSM Evolution) May not be as significant at lower frequencies Standard supports download rates of 150 Mbit/s Technology updates LTE Advanced (LTE-A) Additional frequencies Standard supports download rates of 300 Mbit/s Improved data transmission methods 2.5 - Network Services Web server Proxy server Respond to browser requests An intermediate server Using standard web browsing protocols - HTTP/HTTPS Client makes the request to the proxy Pages are built with HTML, HTML5 The proxy performs the actual request Web pages are stored on the server The proxy provides results back to the client Downloaded to the browser Useful features Static pages or built dynamically in real-time Access control, caching, File server URL filtering, content scanning Centralized storage of documents, spreadsheets, Mail server videos, pictures, and any other files Store your incoming mail Standard system of file management Send your outgoing mail SMB (Server Message Block), Usually managed by the ISP or the Apple Filing Protocol (AFP), etc. enterprise IT department The front-end hides the protocol A complex set of requirements Copy, delete, rename, etc. Usually one of the most important services Print server 24 x 7 support Connect a printer to the network Authentication server Provide printing services for all network devices Login authentication to resources May be software in a computer Centralized management Computer is connected to the printer Almost always an enterprise service May be built-in to the printer Not required on a home network Network adapter and software Usually a set of redundant servers Uses standard printing protocols Always available SMB (Server Message Block), Extremely important service IPP (Internet Printing Protocol), SIEM LPD (Line Printer Daemon) Security Information and Event Management DHCP server Logging of security events and information Dynamic Host Configuration Protocol Security alerts Automatic IP address configuration Real-time information Very common service Log aggregation and long-term storage Available on most home routers Usually includes advanced reporting features Enterprise DHCP will be redundant Data correlation Usually running on central servers Link diverse data types DNS server Forensic analysis Domain Name System Gather details after an event Convert names to IP addresses And vice versa Distributed naming system The load is balanced across many different servers Usually managed by the ISP or enterprise IT department A critical resource © 2018 Messer Studios, LLC Professor Messer’s CompTIA 220-1001 A+ Course Notes - Page 16 http://www.ProfessorMesser.com 2.5 - Network Services (continued) Syslog All-in-one security appliance Standard for message logging Next-generation firewall, Unified Threat Diverse systems, consolidated log Management (UTM) / Web security gateway Usually a central logging receiver URL filter / Content inspection Integrated into the SIEM Malware inspection, spam filter, CSU/DSU, router, switch, You’re going to need a lot of disk space firewall, IDS/IPS, bandwidth shaper, VPN endpoint No, more. More than that. Endpoint management server WORM drive technology Manage all devices from one pane of glass Write Once Read Many - DVD-R Software installations, driver installations, software Protect important security logs updates, security patches, remote troubleshooting IDS and IPS Requires an agent on the device Network-based Intrusion Detection System / Server sends the commands Intrusion Prevention System Agent executes the commands Intrusions Legacy and embedded systems Exploits against operating systems, applications, etc. Legacy systems Buffer overflows, cross-site scripting, other Another expression for “really old” vulnerabilities May also be “really important” Detection vs. Prevention Learning old things can be just as important as learning Detection – Alarm or alert the new things Prevention – Stop it before it gets into the network Embedded systems Purpose-built device Not usual to have direct access to the operating system Alarm system, door security, timecard system 2.6 - An Overview of IPv4 and IPv6 IP addressing IPv6 addresses IPv4 is the primary protocol for everything we do Internet Protocol v6 - 128-bit address You probably won’t configure anything else 340,282,366,920,938,463,463,374,607,431,768,211,456 IPv6 is slowly appearing addresses (340 undecillion) IPv4 addresses 6.8 billion people could have Internet Protocol version 4 5,000,000,000,000,000,000,000,000,000 addresses each OSI Layer 3 address Networking with IPv4 IP Address, e.g., 192.168.1.165 IPv4 addresses format Every device needs a unique IP address Subnet mask, e.g., 255.255.255.0 192. 168. 1. 131 Used by the local device to determine its subnet 11000000. 10101000. 00000001. 10000011 The subnet mask isn’t (usually) transmitted across the network 8)bits = 1)byte = 1)octet Default gateway, e.g., 192.168.1.1 The router that allows you to communicate 32)bits)=)4)bytes outside of your local subnet The default gateway must be an IP address on the local subnet IPv6 addresses format fe80::5d18:652:cffd:8f52 fe80:0000:0000:0000:5d18:0652:cffd:8f52 fe80 : 0000 : 0000 : 0000 : 5d18 : 0652 : cffd : 8f52 1111111010000000: 0000000000000000: 0000000000000000: 0000000000000000: 0101110100011000: 0000011001010010: 1100111111111101: 1000111101010010 16-bits = 2-bytes = 2-octets 128-bits-=-16-bytes © 2018 Messer Studios, LLC Professor Messer’s CompTIA 220-1001 A+ Course Notes - Page 17 http://www.ProfessorMesser.com 2.6 - An Overview of IPv4 and IPv6 (continued) DNS servers Something has to translate between names We remember names and IP addresses professormesser.com, google.com, youtube.com Domain Name Services Internet routers don’t know names You configure TWO DNS servers in your IP configuration Routers only know IP addresses That’s how important it is 2.6 - Assigning IP Addresses DHCP Automatic Private IP Addressing (APIPA) IPv4 address configuration used to be manual A link-local address IP address, subnet mask, gateway, DNS servers, No forwarding by routers NTP servers, etc. IETF has reserved 169.254.0.1 through 169.254.255.254 October 1993 - The bootstrap protocol - BOOTP First and last 256 addresses are reserved BOOTP didn’t automatically define everything Functional block of Some manual configurations were still required 169.254.1.0 through 169.254.254.255 BOOTP also didn’t know when an IP address Automatically assigned might be available again Uses ARP to confirm the address isn’t currently in use Dynamic Host Configuration Protocol IPv6 link-local addresses Initially released in 1997, updated through the years A non-routable local network address Provides automatic address / IP configuration for Will only work on the local subnet almost all d

Use Quizgecko on...
Browser
Browser