CompTIA Network+ (N10-009) Study Guide PDF
Document Details
Uploaded by EasiestBlack2043
Harvard University
CompTIA
Tags
Summary
This document is a study guide for the CompTIA Network+ (N10-009) certification exam. It covers networking concepts and provides an overview of the exam structure and content, incorporating tips for exam success.
Full Transcript
CompTIA Network+ (N10-009) (Study Notes) CompTIA Network+ (N10-009) Study Notes Introduction Introduction ○ CompTIA Network+ Certification Exam First networking certifi...
CompTIA Network+ (N10-009) (Study Notes) CompTIA Network+ (N10-009) Study Notes Introduction Introduction ○ CompTIA Network+ Certification Exam First networking certification for IT or cybersecurity entry Foundation in configuring, managing, and troubleshooting network infrastructure Designed for beginners with less than one year of IT experience or CompTIA A+ certified Assumes knowledge from CompTIA A+ exams ○ Course Structure Builds on hardware, software, and computer network basics Emphasis on enterprise network configuration, management, and troubleshooting Designed to be a full textbook replacement Use official CompTIA Network+ student guide for additional resource 1 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ Exam Overview Five Domains 23% – Networking Concepts 20% – Network Implementation 19% – Network Operations 14% – Network Security 24% – Network Troubleshooting Under each of domains are specific objectives provided in CompTIA Exam Objectives document Total of 90 minutes for up to 90 questions Including multiple choice, multiple select, and performance-based questions with varying numbers of each Scaled score of 720/900 needed to pass (75%) Exam fee required, vouchers available for purchase ○ Study Approach Not covered in order of exam objectives for better learning flow Start with basics, then move to physical infrastructure, switching, IP addressing, routing, network services, WAN connections, cloud, virtualization, security concepts and attacks, monitoring, automation, orchestration, documentation, processes, and disaster recovery, and troubleshooting concepts Specific objectives covered per section, mapped back to exam objectives 2 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Access to closed captions, variable speed playback, and downloadable study guide ○ Tips for Success Use closed captions, adjust playback speed as needed Download and use the provided study guide for note-taking Join the Facebook group or Discord server for community support Utilize Q&A support for course-related questions ○ Remember to utilize all available resources and practice exams to prepare thoroughly for the CompTIA Network+ Certification Exam Exam Tips ○ Exam Questions Read each question multiple times to understand exactly what is being asked Look out for distractors or red herrings in the answer choices ○ Keywords Pay close attention to words in questions that are bold, italicized, or in all uppercase, as they are deemed important ○ Answer Selection Base your answers on CompTIA Network+ knowledge from the course or official textbook, not personal workplace experience 3 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Best Answer Select the best answer, which is true most often or in the most cases, even if there are several potentially correct answers ○ Key Concepts Understand the key concept the test writer is asking about in each question to help you choose the right answer ○ Keyword Association Associate certain words with concepts Examples Encryption for confidentiality Hashing for integrity Redundancy and resiliency for availability ○ Term Recognition Recognize terms rather than memorizing them word for word, as there are no fill-in-the-blank questions on the exam ○ Tool Knowledge Understand what tools are used for rather than knowing specific commands or syntax ○ Question Types Expect multiple-choice or multiple-selection questions, plus a few performance-based questions (PBQs) 4 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ Vendor Neutrality Understand concepts in a vendor-neutral and generic context, not specific to any particular vendor or equipment ○ Exam Strategy Try to understand the key concept being asked, rather than fighting the exam or test questions ○ Study Plan Use a study plan to ensure you cover all material and have time for practice exams and review ○ Study Duration Aim to study intensively over a few weeks rather than spreading your study over several months, to retain information better ○ Certification Timeline Set a target date for earning your certification and plan your study schedule accordingly, focusing on completing sections daily Our Lab Environment ○ Lab Environment Premium course experience at diontraining.com includes hands-on labs Labs cover Windows desktops, servers, Linux servers, network infrastructure, and more 5 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Labs designed, built, and operated by CompTIA, integrated into diontraining.com courses CompTIA CertMaster Labs Labs mirroring real-world tasks, enhancing understanding of course materials Crucial for mastering performance-based questions (PBQs) on exams ○ Support Options Technical issues Use the "Help" tab in the lab environment to contact CompTIA for support Conceptual or Instructional issues Contact Dion Training support team via Discussions/Q&A tab or email ○ Lab Operation Tips Only one lab can run at a time Launch and exit labs properly to avoid issues Contact support promptly for a smoother learning experience ○ Labs are vital for certification and real-world readiness ○ Use labs for practice, confidence-building, and skill enhancement ○ CompTIA and Dion Training support teams are available for assistance 6 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Network Fundamentals Objectives: 1.2 - Compare and contrast networking appliances, applications, and functions 1.6 - Compare and contrast network topologies, architectures, and types 2.3 - Given a scenario, select and configure wireless devices and technologies Introduction o Network encompass a diverse range of connections extending to both wireless and wired networks Network Components ○ Clients Devices that users use to access the network (e.g., workstations, laptops, tablets) ○ Servers Provide resources to the network (e.g., email servers, file servers) ○ Hubs Older technology connecting devices but not commonly used due to limitations ○ Switches Smarter hubs that ensure security and efficient bandwidth utilization 7 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ Wireless Access Points (WAPs) Enable wireless devices to connect to a wired network using radio frequency waves ○ Routers Connect different networks, make intelligent forwarding decisions based on IP addresses ○ Firewalls Security barrier between internal network and the internet, monitor and control traffic ○ Load Balancers Distribute network/application traffic across servers, preventing bottlenecks ○ Proxy Servers Act as intermediaries between user devices and the internet, enhancing security and privacy ○ Intrusion Detection Systems (IDS) Detect unauthorized access or anomalies ○ Intrusion Prevention Systems (IPS) Detect and take action to prevent intrusion ○ Controllers Manage flow control in software-defined networking (SDN), offering flexibility and efficiency 8 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ Network-attached Storage (NAS) Devices Dedicated file storage systems providing data access to authorized clients ○ Storage Area Networks (SANs) High-speed networks for consolidated block-level data storage, enhancing accessibility ○ Media Physical materials for data transmission (e.g., copper cables, fiber optic cables) ○ Wide Area Network (WAN) Links Connect networks over large areas (e.g., between cities), essential for global connectivity ○ Key Takeaway Understanding these network components is crucial for efficient and secure data transmission in information technology, aiding in network design, management, problem-solving, and security implementation Network Resources ○ Client/Server Model Utilizes a dedicated server for centralized access to files, scanners, printers, and resources Easy administration and backup due to a central server 9 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Benefits Centralized administration Easier management Better scalability Drawbacks Higher cost Requires dedicated hardware and specialized skillset Leading model in business networks ○ Peer-to-Peer Model Direct sharing of resources among peers (laptops, desktops) Difficult administration and backup due to dispersed files on different machines Drawbacks Redundancy Complex management Scalability issues Useful for low-cost setups, exemplified by Napster a decade ago Benefits Low cost No specialized infrastructure or hardware Drawbacks Decentralized management 10 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Poor scalability for large networks Not recommended for business networks Network Geography ○ Personal Area Network (PAN) Smallest network type Covers about 10 feet or less Examples are Bluetooth and USB Connection within arm's reach ○ Local Area Network (LAN) Common in office buildings Limited distance Up to 100 meters CAT 5 cabling Can use WiFi (IEEE 802.11) or Ethernet (IEEE 802.3) Examples include Office, school, and home ○ Campus Area Network (CAN) Building-centric LAN Spans numerous buildings in an area Covers several miles Examples are College campuses, business parks, military bases 11 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ Metropolitan Area Network (MAN) Connects locations across the entire city Larger than CAN Up to 25 miles Examples are City departments, multiple campuses in a city ○ Wide Area Network (WAN) Connects geographically disparate internal networks Large geographic coverage Across states, countries, or globally Can consist of lease lines or VPNs. Examples are Internet, private connections between offices across the country ○ Important Standards PAN – Bluetooth, USB (considered personal area networks) LAN – IEEE 802.3 (Ethernet) CAN – connects multiple LANs, forming a larger network MAN – spans an entire city, connecting different locations WAN – encompasses large geographic areas, connecting internal networks globally ○ Memory Aid PAN (Personal Area Network) – arm's reach LAN (Local Area Network) – limited to about 100 meters 12 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) CAN (Campus Area Network) – spans buildings in an area MAN (Metropolitan Area Network) – across the city, up to 25 miles WAN (Wide Area Network) – geographically extensive, even global Understanding Network Geography: Practical Example Wired Network Topology ○ Network Topology Refers to the arrangement of elements in a computer network Includes links, nodes, clients, and servers ○ Diagram Types Physical Topology Describes physical cabling and device connections Represents real-world layout using floorplans Logical Topology Describes how data flows in the network Focuses on the logical connection rather than physical placement ○ Six Wired Network Topologies Point-to-Point Topology Direct connection between two devices Simple, reliable for small-scale connections Not scalable 13 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Used in WAN connections for remote offices Ring Topology Circular data path with each device connected to two others Unidirectional flow prevents collisions Creates a single point of failure situation unless there are redundant connections for failover Common in FDDI (Fiber Distributed Data Interface) for long-distance fiber optic networks Bus Topology All devices connected to a central cable (bus) Data accessible to all, but only intended recipient processes it Easy to install If the main cable fails, the network won’t work The more devices connected to the network, the more collisions will occur Older technology, not common in modern networks Star Topology Each node connected to a central point (network switch). Robust, but network depends on the central point's functionality ○ If the central point fails, the entire network fails Common in home networks 14 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Hub-and-Spoke Topology Variation of star topology with a central hub connected to multiple spokes Nodes transmit data to the hub before reaching the final destination Used in airline and telecommunications networks Less expensive for larger networks Mesh Topology Point-to-point connections between every device for redundancy Two types ○ Full mesh – every node connected to every other ○ Partial mesh – some nodes fully interconnected, others connected to one or two devices Provides robustness and redundancy but can be complex and costly Mesh Topology Formula ○ Full mesh connections formula n (n-1)/2 n is the number of nodes ○ Understanding different topologies is crucial for network design Each topology has unique advantages and disadvantages Practicality varies based on the scale and requirements of the network 15 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Wireless Network Topology ○ Infrastructure Mode Centralized wireless network with a wireless access point Similar to a star topology in a physical network Common in homes Connects to an outside provider through a cable or fiber modem Supports wireless security controls ○ Ad Hoc Mode Decentralized wireless network Operates like a peer-to-peer network No routers or access points Devices connect directly Dynamic routing decisions made on the fly Allows for dynamic joining and leaving of devices Resembling old-school chat rooms ○ Wireless Mesh Unique interconnection of different nodes, devices, and radios Creates a mesh topology for expansion and redundancy Combines various technologies for connectivity Bluetooth, WiFi, microwave, cellular, satellite Enables large-scale network access in harsh environments Uses different radio frequencies to establish reliable connections 16 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Use Cases for Wireless Mesh Post-disaster scenarios Humanitarian assistance missions Combining microwave, satellite, cellular, and WiFi for reliable and redundant networks ○ Satellite for long distances ○ Microwaves for medium ranges ○ Wireless for short distances Datacenter Topology ○ Datacenter Any facility composed of networked computers and storage that businesses and other organizations use to organize, process, store, and disseminate large amounts of data ○ Three-Tiered Hierarchy Core Layer Houses high-performance routers, merging geographically separated networks Backbone of the network Distribution/Aggregation Layer Provides boundary definition through access lists and filters Defines policies for the network at large 17 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Uses layer 3 switches for routing between subnets ○ Ensure the packets are properly routed between different subnets and VLANs Access/Edge Layer Connects endpoint devices using regular switches Used to ensure the packets are converted to frames and delivered to the correct end point devices Having 3 layers provides better Performance Management Scalability Redundancy It also helps with troubleshooting because the layers and devices provide points at which parts of the network can be isolated to determine problems and maintain the rest of the network while the isolated part is fixed Collapsed Core Network architecture where the core and distribution layers are merged into a single layer Creates a two tiered core Simplified architecture for medium to small datacenters May not be suitable for larger and more complex networks 18 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ Spine and Leaf Architecture An alternative type of network architecture that is used specifically within datacenters Focuses on communication within datacenters, particularly server farms Consists of 2 switching layers Leaf ○ Consists of all the access switches that will aggregate traffic from the different servers and then connect directly into the spine layer Spine ○ Contains switches that interconnect all the leaf layer switches into a full-mesh topology Enhances speed, and reduces latency compared to traditional three-tiered hierarchy Works well with a Software Defined Network (SDN) Can also be used in combination with the standard three-tiered hierarchy Servers in the datacenter connect to leaf layers Spine connects to the core layer of the three-tiered hierarchy ○ Traffic Flows North-South Traffic Traffic that enters (Southbound traffic) or leaves (North traffic) data center from a system outside 19 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) East-West Traffic Data flow within a datacenter Example: In a spine and leaf architecture, all data flow between servers is considered east-west traffic Prevalent with SDN, virtualization, and converged networks 20 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) OSI Model (& TCP Model Ports/Protocol) Objective 1.1: Explain concepts related to the Open Systems Interconnection (OSI) reference model Introduction ○ Open Systems Interconnect Model (OSI) Developed in 1977 by the International Organization for Standardization OSI is a reference model Used to categorize the functions of a network Useful for troubleshooting ○ Networks today operate under the TCP/IP mode ○ Layers Physical - Layer 1 Data Link - Layer 2 Network - Layer 3 Transport - Layer 4 Session - Layer 5 Presentation - Layer 6 Application - Layer 7 ○ Networks are designed to make data flow across networks 21 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ Names of data as it flows through the OSI model Bits - Layer 1 Frames - Layer 2 Packets - Layer 3 Segments - Layer 4 Data - Layer 5 Data - Layer 6 Data - Layer 7 Layer 1 (Physical) ○ Physical Layer Overview (Layer 1) First layer of the OSI model where transmission of bits across the network occurs and includes physical and electrical network characteristics Data type occurs as bits Binary bits represented as a series of 1s and 0s ○ Transition Modulation Switching between levels to represent 1 or 0 Copper Wire (Cat5/Cat6) – Uses voltage (0V for 0, +5V/-5V for 1) Fiber Optic Cable – Uses light (on for 1, off for 0) ○ Connector Standards RJ-45 Connector – Used in CAT5/CAT6 cables Wiring Standards 22 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) TIA/EIA-568A TIA/EIA-568B Crossover cables – TIA/EIA-568A on one end, and TIA/EIA-568B on the other end Straight-through cables – TIA/EIA-568B on both ends ○ Physical Topology Different physical network layouts Bus Ring Star Hub-and-Spoke Full Mesh Partial Mesh Based on how cables are physically connected ○ Synchronization Asynchronous Communication Start and stop bits for out-of-sync data transmission Synchronous Communication Real-time communication using a common time source ○ Bandwidth Utilization Broadband Divides bandwidth into separate channels (e.g., cable TV) 23 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Baseband Uses all frequency of the cable all the time (e.g., telephone) ○ Multiplexing Involves taking some limited amount of resource and using it more efficiently Allows multiple people to use a baseband connection at the same time Time Division Multiplexing (TDM) Allocates dedicated time slots Statistical Time Division Multiplexing (StatTDM) Dynamically allocates time slots based on when people need it Frequency Division Multiplexing (FDM) Divides the medium into channels ○ Layer 1 Devices Cables – media Fiber optic Ethernet Coaxial Wireless Media Bluetooth Wi-Fi Near field communication 24 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Infrastructure Devices Hubs Access points Media converters ○ Layer 1 Device Characteristics Simply repeat whatever they receive No logic or decision-making at Layer 1 Layer 2 (Data Link Layer) ○ Data Link Layer (Layer 2) Responsible for packaging bits from Layer 1 into frames and transmitting them across the network Performs error detection and correction, identifies devices using MAC addresses, and provides flow control ○ MAC Address (Media Access Control Address) A means for identifying a device physically and allowing it to operate on a logical topology A unique 48-bit physical addressing system is assigned to every network interface card (NIC) produced Written in hexadecimal numbers First 24 bits – identify the manufacturer Remaining 24 bits – identify the specific device 25 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Crucial for logical topology – identifying devices on the network ○ Logical Link Control (LLC) Provides connection services and acknowledges message receipt, ensuring controlled data flow Most basic form of flow control Limits data sent by a sender and prevents receiver overwhelm Uses a checksum to detect corrupted data frames ○ Synchronization Methods at Layer 2 Isochronous Mode Common reference clock Time slots for transmissions Less overhead Synchronous Method Devices use the same clock, with beginning and ending frames, and control characters for synchronization Asynchronous Devices reference own clock cycles No strict control over communication timing ○ Layer 2 Devices Network Interface Cards (NICs) Bridges 26 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Switches Intelligent use of logic to learn and send data to specific devices based on MAC addresses ○ Switch Operation Switches use CAM tables with MAC addresses to identify physical ports connected to devices Enables selective data transmission to specific areas in the network. Layer 3 (Network Layer) ○ Network Layer (Layer 3) Concerned with routing and forwarding traffic using logical addresses ○ Logical Addressing IP variants – common logical addressing schemes IPv4 – written in dotted octet notation which are four sets of numbers separated by dots (e.g., 172.16.254.1) IPv6 Other protocols – these were replaced by IP (Internet Protocol) AppleTalk IPX (Internetwork Packet Exchange) ○ Switching/Routing Methods Packet Switching (Routing) Data is divided into packets and then forwarded 27 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Most commonly used method Circuit Switching A dedicated communication link is established between two devices Message Switching Data is divided into messages which may be stored and then forwarded ○ Route Discovery and Selection Routers maintain routing tables for determining the best path Dynamic protocols (e.g., RIP, OSPF) enable routers to share and update route information Routing protocols help decide how data is going to flow across the network and how the routers are going to communicate that information ○ Connection Services at Layer 3 Augments Layer 2 services Involves flow control Prevents sender from overwhelming the receiver Packet reordering Ensures data packets arrive and are reassembled in the correct order 28 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ Internet Control Message Protocol (ICMP) Used for sending error messages and operational information to an IP destination PING Most commonly used ICMP Helps troubleshoot network issues by testing connectivity and response times Traceroute Traces the route of a packet through the network ○ Devices and Protocols Routers Multi-layer switches Combines Layer 2 switch and Layer 3 router features A switch is always a Layer 2 device, unless specifically mentioned that it is a multi-layer switch, then it is considered as a Layer 3 device Layer 3 protocols IPv4 IPv6 ICMP ○ IP and routers are commonly encountered Layer 3 devices in exams 29 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Layer 4 (Transport Layer) ○ Transport Layer (Layer 4) Dividing line between the upper layers and the lower layers of the OSI model Upper Layers Transport Session Presentation Application ○ Segments Data Type in Transport Layer ○ Protocols in Layer 4 TCP (Transmission Control Protocol) Connection-oriented protocol that is a reliable way to transport segments across the network With acknowledgement Uses Three-Way Handshake ○ SYN – synchronization ○ SYN-ACK – synchronization - acknowledgement ○ ACK – acknowledgement Windowing for flow control 30 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Used for all network data that needs to be assured to get to its final destination UDP (User Datagram Protocol) A connectionless protocol that is an unreliable way to transport segments (datagram) Used for audio and visual streaming No three-way handshake and less overhead No acknowledgment or retransmission ○ Remember the data types in Layer 4 for the exam Segment – data type for TCP Datagram – data type for UDP ○ TCP vs. UDP TCP Reliable ○ Uses Three-way Handshake Connection-oriented Segment retransmission and flow control through windowing Sequencing Acknowledgment of segments UDP Unreliable ○ No Three-way Handshake 31 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Connectionless No retransmission and no windowing No sequencing No acknowledgment of datagrams ○ Windowing Allows clients to adjust the amount of data in each segments during transmission Optimize throughput and bandwidth Open or close window based on retransmissions ○ Buffering Occurs when devices allocate memory to store segments if bandwidth is not readily available Buffer Temporary storage for segments Prevents overflow by clearing segments ○ Layer 4 Devices Protocols TCP and UDP Devices WAN accelerators Load balancers and firewalls 32 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Layer 5 (Session Layer) ○ Session Layer (Layer 5) Manages sessions, ensuring separate conversations to prevent data intermingling ○ Setting Up Session Checking of user credentials and assigning numbers to sessions to help identify ○ Maintaining Session Continuous data transfer between parties If connection breaks, it will require re-establishment Includes acknowledgement of data ○ Tearing Down a Session Ending a session once communication goals are achieved Mutual agreement or one party disconnects ○ Layer 5 Devices and Protocols H.323 Used for setting up, maintaining, and tearing down voice and video connections Operates over the real-time transport protocol (RTP) NetBIOS Utilized by computers for file sharing over a network Commonly associated with Windows file sharing 33 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ Layer 5 issues involve protocols and software rather than specific devices Layer 6 (Presentation Layer) ○ Presentation Layer (Layer 6) Responsible for formatting data for exchange and securing it through encryption ○ Data Formatting Formatting data by a computer to have compatibility between different devices Formats American Standard Code for Information Interchange (ASCII) ○ Text-based language to use ○ Ensures data is readable by receiving system ○ Provides proper data structures ○ Negotiates data transfer syntax for the Application Layer (Layer 7) GIFs – motion pictures JPEG – photographs PNG – Internet images Formats enable compatibility between different devices 34 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ Encryption Used to scramble data in transit to keep it secure and provide data confidentiality Transport Layer Security (TLS) Ensures secure data transfer Creates an encrypted tunnel, protecting sensitive information ○ Scripting languages in Layer 6 Control how ASCII text is displayed on the screen HTML XML PHP JavaScript ○ Standard text formats Different ways of displaying text using ones and zeros ASCII Unicode EBCDIC ○ Image formats Different graphical representations of 1s and 0s GIFs JPEGs TIFFs 35 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) SVGs PNGs ○ Movie file formats 1s and 0s formatted to create watchable videos MP4s MPEGs MOV ○ Encryption Algorithms Scrambles data to provide confidentiality and security during transit and storage TLS SSL (Secure Sockets Layer) Focus on Security Layer 7 (Application Layer) ○ Application Layer (Layer 7) Provides application-level services where users communicate with the computer Focus on lower-level applications File transfer Network transfer 36 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ Application Services Unites components for more than one network application File transfer File sharing Email ○ Low-level protocols POP3 (Post Office Protocol 3) IMAP (Internet Message Access Protocol) SMTP ( Simple Mail Transfer Protocol) Remote access Network management Client-server processes ○ Service Advertisement Applications send announcements to other devices on the network Devices advertise the services they offer Printers and file servers managed by Active Directory Self-advertising devices like wireless printers ○ Layer 7 Protocols Email Applications POP3 IMAP SMTP 37 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Web Browsing HTTP HTTPS Domain Name Service (DNS) File Transfer Protocols FTP FTPS SFTP Remote Access Telnet SSH SNMP Encapsulation and Decapsulation ○ Encapsulation Process of putting headers and sometimes trailers around data ○ Decapsulation Removing the applied encapsulation to access the original data ○ OSI Model Layers Moving down from Layer 7 to 1 – encapsulation Moving up from Layer 1 to 7 – decapsulation 38 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ Protocol Data Units (PDUs) in OSI Model A single unit of information transmitted in a computer network Terminology used for each layer is written as L(layer number) PDU ○ Example – L7 PDU for Layer 7 There are special names for the PDUs for layers 1, 2, 3, and 4 Layer 1 – Bits Layer 2 – Frames Layer 3 – Packets Layer 4 – Segments (TCP) or Datagrams (UDP) ○ TCP Header (Layer 4) 10 mandatory fields, totalling 20 bytes of information Source port Destination port Sequence number Acknowledgment numbers TCP data offset Reserved data – always set to zero Control flags ○ SYN – synchronize connection in three-way handshake ○ ACK – acknowledgment of the successful receipt of data ○ FIN (Finished) – tears down connections created by three-way handshake 39 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ RST (Reset) – used when an unexpected packet is received ○ PSH (Push) – ensures data is given priority ○ URG (Urgent) – identifies incoming data as urgent Window size TCP checksum Urgent pointer mTCP – optional ○ UDP Header (Layer 4) 8-byte header Source port Destination port Length – indicates the total packet bytes Checksum – not mandatory ○ IP Header (Layer 3) Contains various fields Version Length of IP header Type of service Total length of packet and header Identifier Flags Fragmented offset 40 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Time to live Protocol Header checksum Source IP Address Destination IP Address Options and Padding ○ Ethernet Header (Layer 2) Features a few things Destination MAC Address Source MAC address ○ MAC Address Physical address that is used to identify a network card on a local area network Processed by switches EtherType field ○ Used to indicate which protocol is encapsulated in the payload of a frame IPv4 or IPv6 VLAN Tag – optional ○ IEEE 802.1Q ○ IEEE 802.1AD 41 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) A frame being sent at Layer 2 will also contain a payload Payload ○ Data that being sent across the network ○ 42 bytes – using VLANs ○ 46 bytes – no VLANs ○ Maximum Transmission Unit (MTU) Maximum size for payload 1500 bytes for Ethernet Jumbo Frames ○ Frames larger than 1500 bytes ○ Require reconfiguring MTU ○ Data Transmission Encapsulation of data and adding header at each layer Layer 4 – source/destination ports Layer 3 – source/destination IP addresses Layer 2 – soure/destination MAC addresses Layer 1 – data transmitted as 1s and 0s Decapsulation at each intermediate device until the final host is reached Final host decapsulates to Layer 7 for application understanding Understanding the OSI Model: Practical Example 42 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Ports and Protocols Objective 1.4: Explain common networking ports, protocols, services, and traffic types Introduction ○ Port Virtual entry/exit point for communications used by software applications to exchange information ○ Protocol Set of rules and conventions for data exchange between network devices Network Port Fundamentals ○ IP address Used to direct data to the correct system in a network ○ Port A logical opening in a computer Identifies specific applications or services on a computer that represents a service or application Numbered from 0 to 65,535 ○ Three Groups of Ports Well-known ports Numbered from 0 to 1,023 Ephemeral ports (49,152-65,535) 43 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Examples ○ FTP (20, 21) ○ SMTP (25) ○ HTTP (80) ○ HTTPS (443) Registered ports Numbered from 1,024 to 49,151 Ephemeral Ports Temporary, short-lived ports for dynamic use Numbered from 49,152 to 65,535 No registration is required and anyone can use them ○ Both Well-known and Registered Ports are registered with IANA for specific applications or services ○ Data Transfer Example Client communicates with a website using IP addresses and ports Client's source IP and random ephemeral port connect to the website's destination IP and default port (e.g., 80) ○ Two-Way Communication Web server responds using its well-known port (e.g., 80) back to the client's ephemeral port Two-way communication is established between client (ephemeral port) and web server (port 80) 44 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ Ephemeral ports opened for specific tasks and closed after data transmission. ○ In subsequent communications, the client uses the well-known port (e.g., 80) but selects a new random ephemeral port ○ Communication Flow Source IP and port initiate communication Data is transmitted Ports closed when the task is completed Transmission Control Protocol (TCP) ○ Transmission Control Protocol (TCP) Fundamental protocol in the Internet Protocol Suite that governs data exchange over the internet Ensures reliable delivery of packets Error checking Data sequencing Acknowledgment Operates at the transport layer of the OSI model Breaks down larger messages into smaller packets for efficient data transfer and reassembles at the destination ○ Three-Way Handshake Initiated to establish a connection between two systems SYN (Synchronize) 45 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) SYN-ACK (Synchronize-Acknowledgement) ACK (Acknowledgement) Ensures readiness for secure data transmission ○ Error Checking and Flow Control Error checking Uses sequence numbers and acknowledgment messages Detects and retransmits lost or corrupted packets Flow control Prevents overwhelming the receiver Windowing ○ Controls the amount of data sent at a time ○ Allows dynamic adjustment based on network conditions ○ Ports Numerical identifiers for services or applications in TCP/IP suite Distinguish between different services on the same server Each connection identified by source and destination IP addresses and ports e.g., secure websites use port 443 (HTTPS) Enable multiple network applications on the same server ○ TCP's Role in Internet Communication Ensures reliability and ordered delivery between client and server Operates at the transport layer of the OSI model 46 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Utilizes packetization, acknowledgment, and error checking Three-way handshake establishes a secure connection Ports facilitate the logical differentiation of services on a single machine User Datagram Protocol (UDP) ○ User Datagram Protocol (UDP) Communication protocol used for time-sensitive transmissions on the internet Ideal for applications prioritizing speed over error checking Low latency and reduced processing overhead. Lacks error checking and recovery services like TCP Operates at the transport layer, similar to TCP Connectionless communication model ○ Packet Structure Datagrams Term for data packets in UDP Sent without prior setup of transmission channels Contains source/destination port numbers, length field, and checksum Smaller and simpler headers (8 bytes) compared to TCP (20-60 bytes) 47 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ UDP’s Stateless Nature UDP does not maintain connection state or track packets Often referred to as a "fire and forget" protocol No waiting for acknowledgments, leading to faster transfer rates ○ Reliability Trade-off UDP is less reliable due to lack of packet tracking Suitable for scenarios where speed is crucial, and packet loss is acceptable ○ Use Cases Used in applications like live broadcasts, online gaming, and VoIP calls Effective for simple request-response communications (e.g., DNS lookup) ○ UDP utilizes ports to differentiate between multiple services on the same client/server ○ UDP relies on application-level error handling due to lack of built-in error recovery ○ UDP contains a checksum in the header for minimal protection against data corruption ○ UDP is not as robust as TCP in ensuring data integrity and delivery 48 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Internet Control Message Protocol (ICMP) ○ Internet Control Message Protocol (ICMP) An integral part of the Internet Protocol Suite which is considered to be a network layer protocol for diagnosing network communication issues Not used for data transmission between systems unlike TCP and UDP Operates at the network layer of the OSI model ○ ICMP Messages Used for indicating host or service unreachability, expired time to live, and router buffer issues ○ Ping Utility Utilizes ICMP to test host reachability on an IP network Measures roundtrip time (latency) for network connection ○ ICMP Message Structure Header Type – indicates the type of ICMP message (1 byte) Code – provides additional context about the message type (1 byte) Checksum – used for error checking the message header and data (2 bytes) ○ ICMP Reliability and Design Lacks reliability mechanisms like TCP No guaranteed delivery, ordering, or error correction 49 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Designed for speed and simplicity, not data integrity or security ○ Security Concerns ICMP can be used in attacks ICMP Flood Attack ○ Overwhelms target with echo request packets, leading to Denial of Service (DoS) Attack ○ Amplified up to Distributed Denial of Service (DDoS) Attack to be effective Ping of Death ○ Exploits vulnerabilities in older systems, causing system crashes ○ Modern Security Measures Many modern systems are not vulnerable to Ping of Death due to improved security measures Network administrators may choose to block ICMP traffic for security but face challenges in troubleshooting network issues Web Ports and Protocols ○ Web Ports and Protocols Standardized rules and numerical gateways that govern data transmission and communication on the internet for websites 50 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ Two Fundamental Ports Port 80 (HTTP) HTTP (Hypertext Transfer Protocol) ○ An application layer protocol. This designed to enable communications between clients and servers ○ Uses port 80 by default ○ Foundation of data communication on the worldwide web ○ Requests and receives web content in plain text HTTP over Port 80 lacks security makes data vulnerable to eavesdropping and attacks Port 443 (HTTPS) HTTPS (Hypertext Transfer Protocol Secure) ○ Similar to HTTP but adds encryption via SSL/TLS ○ Uses port 443 ○ Encrypts data, securing it from interception or tampering ○ Importance of HTTPS (Port 443) Vital for websites handling sensitive data like banking, e-commerce, or login pages Automatic redirection from insecure HTTP (port 80) to secure HTTPS Encryption ensures secure transmission of sensitive information 51 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ Key Differences between HTTP (Port 80) and HTTPS (Port 443) Security and Encryption HTTP (port 80) – unencrypted, plain text HTTPS (port 443) – encrypted using SSL/TLS, more secure against data breaches Default Usage HTTP (port 80) – traditional, default for unsecured browsing HTTPS (port 443) – introduced later, became default for secure browsing in recent years Search Engine Optimization (SEO) and Trust HTTPS (port 443) – favored for increased security and ranked higher by search engines due to user trust and encryption Email Ports and Protocols ○ Email Ports and Protocols Govern the transmission of emails across the Internet Ensure efficient sending, receiving, and management of messages ○ Main Email Protocols SMTP (Simple Mail Transfer Protocol) The standard protocol used for sending emails over the internet Operates over port 25 ○ Default port used by email servers 52 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ Insecure because data is sent in plain text Only used for sending emails SMTPS (SMTP Secure) ○ A secure variant of SMTP ○ Not really a protocol itself, but a way to secure the SMTP protocol by transporting it via the secure socket layer or transport layer security protocols ○ Operates over ports 465 or port 587 POP3 (Post Office Protocol version 3) Used to retrieve emails from a remote server to a local client Operates over port 110 Designed to download and delete messages from the server Transmits emails in plain text (insecure) POP3S (POP3 Secure) ○ A secure variant of POP3 that overcomes the limitations of POP3 ○ Operates over port 995 via SSL/TLS IMAP (Internet Message Access Protocol) Offers more flexibility than POP3 Operates over port 143 Allows managing emails directly on the server, synchronizing across multiple devices 53 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Transmits emails in plain text (insecure) IMAPS (IMAP Secure) ○ A variant of IMAP that can provide a secure and encrypted connection by transmitting data inside of an encrypted SSL/TLS using the standard IMAP protocol ○ Operates over port 993 ○ SMTP and SMTPS are used for sending emails ○ POP3 and IMAP are both used for receiving emails IMAP offers more sophisticated email management ○ Understanding protocols ensures secure and efficient email communication ○ Configure systems with secure variants to protect against security threats File Transfer Ports and Protocols ○ File Transfer Ports and Protocols Specialized rules and procedures that are utilized for the transmission of files across networks ○ FTP (File Transfer Protocol) Oldest protocol for file transfer Ports: Port 20 – actual data transfer Port 21 – sending control commands Lack of encryption poses security risks 54 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Transmissions are sent in plain text Widely used for its simplicity across platforms ○ SFTP (Secure File Transfer Protocol) Addresses FTP security concerns Also stands for SSH File Transfer Protocol Operates on port 22 – standard port for SSH connections Encrypts data for secure file transmissions ○ TFTP (Trivial File Transfer Protocol) Basic version of FTP that lacks authentication and directory browsing Operates on port 69 Designed for sending files when minimal security is sufficient ○ SMB (Server Message Block) A network file sharing protocol that allows applications to read and write to files and request services from the server programs Operates on port 445 Predominantly used for Windows file sharing Samba A cross-platform version of SMB that exists on Linux systems Almost exclusively used inside of LANs and it is not a protocol to send data across the Internet ○ Key Considerations for Protocol Selection Align security requirements, network environment, and functionality 55 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) FTP – basic transfers (ports 20, 21) SFTP – secure transfers (port 22) TFTP – simple, unsecured transfers (port 69) SMB – Windows file sharing in LANs (port 445) Remote Access Ports and Protocols ○ Remote Access Ports and Protocols Build and manage systems and networks remotely from anywhere in the world Crucial for interconnected environments, allowing control over systems, commands, and files. ○ Remote Access Protocols SSH (Secure Shell) Protocol for secure remote login and network services over an unsecure network Operates on port 22 Provides a secure channel, strong authentication, and encrypted data communication Used by network administrators for remote control of web and server applications Telnet Early remote log-in protocol 56 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Operates on port 23 Allows remote login to another computer on the same network Transfers data in plain text, making it susceptible to eavesdropping and on-path attacks Replaced by SSH due to lack of encryption RDP (Remote Desktop Protocol) Proprietary protocol by Microsoft for graphical user interface remote connection Operates on port 3389 Allows remote access to a window system, supporting different network topologies Supports data encryption, smart card authentication, and bandwidth reduction ○ Considerations Choose the appropriate protocol based on security requirements and specific tasks SSH is recommended for secure command-line management. Telnet should be avoided due to its lack of encryption RDP is essential for secure graphical access to Windows-based systems 57 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Network Service Ports and Protocols ○ Network Services, Ports, and Protocols Fundamental services for smooth digital communication and network management Different services that ensure that the network devices can discover each other, communicate efficiently, and relay important system information to each other ○ DNS (Domain Name System) Used for translating human-friendly domain names to IP addresses Operates on ports 53 (UDP by default) for queries and responses Uses TCP for larger messages ○ DHCP (Dynamic Host Configuration Protocol) Automates the assignment of IP addresses and networking parameters to client devices Listens on port 67 (UDP) for client requests Responds on port 68 (UDP) ○ SQL Services Refers to protocols used by database servers for managing queries Microsoft SQL Server operates on port 1433 MySQL Server on port 3306 ○ SNMP (Simple Network Management Protocol) Used for collecting information and configuring network devices 58 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Operates on port 161 (UDP) for polling Operates on port 162 (UDP) for unsolicited trap messages Crucial for network diagnostics and performance monitoring ○ Syslog (System Logging) Standard for message logging allowing devices to send event messages across IP networks Syslog Server ○ Event message collector where syslog messages are sent to Operates on port 514 Uses UDP by default Can use TCP for reliability Other Network Service Ports and Protocols ○ Other Network Service Ports and Protocols Refers to different network, service, ports, and protocols that play a pivotal role in the network, time synchronization, and the establishment of communication sessions, as well as directory services Crucial for organizing and providing access to distributed information located all across the network ○ Network Time Protocol (NTP) Used to synchronize clocks of computers over a network 59 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Vital for time-dependent processes, timestamping events, transaction logging, and security protocols Operates over port 123 using the User Datagram Protocol (UDP) Example Ensures consistency between server and client times, affecting encryption and decryption functions ○ Session Initiation Protocol (SIP) Initiates, maintains, and terminates real-time sessions for voice, video, and messaging Common usage includes Voiceover IP applications for internet phone calls Operates over port 5060 (traditionally) on both UDP and TCP for unencrypted signaling Uses port 5061 using TCP with TLS (Transport Layer Security) for encrypted signaling ○ Lightweight Diectory Access Protocol (LDAP) Protocol for accessing and maintaining distributed directory information services over an IP network Used to look up personal information in email programs Ports LDAP (Insecure): Communicates over port 389 using both TCP and UDP 60 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) LDAPS (Secure): Encrypted with SSL or TLS, runs over port 636 using TCP 61 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Media and Connectors Objectives: 1.5 - Compare and contrast transmission media and transceivers 5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues Copper Media ○ IEEE 802.3 Standard Defines physical and data link layers, including MAC, for wired Ethernet networks Commonly used in Local Area Networks (LANs) ○ Twisted Pair Cables A type of wiring in which two conductors of a single circuit are twisted together Twisting reduces electromagnetic interference and crosstalk Unshielded Twisted Pair (UTP) Composed of pairs of wires twisted together without additional shielding being added to the cable Lightweight, flexible, and cost-effective Shielded Twisted Pair (STP) Includes shielding for better EMI protection More expensive, bulkier, and more difficult to install 62 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Categories CAT 5 CAT 5e CAT 6 CAT 6a CAT 7 CAT 8 ○ Coaxial Cables A fundamental part of networking and broadcasting for decades Consists of single copper conductor at its core, with insulating layer and conductive shield RG-6 Used to support faster internet speed in most residential installations Standard for modern coaxial cable Supports up to 1 Gbps at up to around 300-meter distance RG-59 Older standard for coaxial cables Not commonly used anymore Direct Attach Copper (DAC) Cables Fixed assembly copper cabling for short distances Connects switches, routers, or servers 63 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Supports up to 100 Gbps at short distances Twinaxial Cable Often a component of DAC assembly Considered as another specialized form of cabling Two insulated copper conductors Used in SFP+ and QSFP applications Supports 10 Gbps to 100 Gbps, up to 100 meters ○ Plenum vs. Non-Plenum Cables Plenum – Fire-retardant, suitable for air circulation spaces Non-Plenum – Less fire-resistant, used where fire risk is lower Plenum meets strict fire safety standards of NFPA and NEC ○ It is important to remember the basic speed and distance for each type of cable CAT 5 – 100 Mbps at 100 meters CAT 5e – 1Gbps at 100 meters CAT 6 – 1Gbps at 100 meters; 10 Gbps at 55 meters CAT 6a – 10 Gbps at 100 meters CAT 7 – 10 Gbps at 100 meters CAT 8 – 10-25 or 40 Gbps at 30 meters RG-6 – 1 Gbps at 300 meters Twinaxial – 10 Gbps or more at 10 meters DAC – 100 Gbps at 15 meters (active cables); 100 Gbps at 7 meters (passive cables) 64 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ Importance of Copper Media Versatile and robust for various networking needs Lower cost, easier to install and maintain Remains vital in network infrastructure Copper Network Connections ○ Registered Jack (RJ-X) A standard telecommunication network interface RJ-11 and RJ-45 Crucial for voice and data networks Use twisted pair cables ○ Radio Guide (RG-X) Series for coaxial cables, used in high-speed internet, television, and radio connections Commonly used cables RG-6 – for cable TV RG-59 – for older applications ○ Connectors RJ-11 Standard for telephone wiring 6P2C configuration (6 positions, 2 conductors) Smaller size Not suitable for high-speed data transmission 65 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) RJ-45 Standard for data networks (Ethernet) 8P8C configuration (8 positions, 8 conductors) Widely used for computers, switches, routers in local area networks Compatible with CAT 5 to CAT 8 cables – supporting higher bandwidths with higher CAT numbers F-Type Connector Screw-on connector used with RG-6 and RG-59 coaxial cables Standard for cable TV, satellite, and cable internet connections BNC Connector (Bayonet Neill-Concelman) Coaxial connector with a secure bayonet locking mechanism Used with RG-6 or RG-59 coaxial cables "Push and twist" style connector Common in professional video connections and radio frequency applications Introduced in the 1940s, often erroneously called British Naval Connector ○ Application Specifics RJ-11 – for voice-based communication networks (telephones) RJ-45 – for data devices in data networks (computers, printers, switches, routers) 66 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) F-Type – for coaxial cables in cable TV, satellite, and cable internet connections BNC – for professional video connections and radio frequency applications Building a Copper Cable: Demonstration Fiber Media ○ Fiber Media Transmits data using light, not electrical impulses Offers significant advantages over traditional copper media-based networks ○ Advantages of Fiber Media Immunity to EMI Light-based transmission is not affected by electromagnetic interference (EMI) Doesn’t require shielding like copper cables Longer transmission distances with minimal signal loss Fiber optic cables can span hundreds of miles Suitable for local connections and transcontinental data transmission 67 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Higher data transfer speeds Can reach speeds beyond 10 Gbps ○ Drawbacks Cost Fiber media is more expensive than copper Complexity Requires specialized tools and training for installation and repair ○ Two Main Types of Fiber Optic Cables Single-Mode Fiber (SMF) Designed for long-distance communication Small glass core allows light to travel in a single path without dispersion ○ 8.3 to 10 microns in diameter Preferred for backbone installations and connections over vast areas Yellow sheath For long-range transmissions with higher bandwidth Multi-Mode Fiber (MMF) Tailored for shorter distances ○ 2 kilometers to 1 mile Larger fiber core size allows light to travel in multiple paths ○ 50 to 100 microns 68 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Suitable for connecting servers to switches within buildings or campuses Aqua blue or orange sheath For internal network infrastructures, offering cost-effectiveness and ease of installation Fiber Network Connections ○ Fiber Network Connections Created by connecting a fiber optic cable to two different devices ○ Fiber Connectors Enable a quicker connection and disconnection from the network Two different sets of connectors on the cable: For transmission side For receive side Types: SC Connector (Subscriber Connector) ○ Square shape with push-pull design ○ Widely used in single-mode fibers ○ Common in telecommunications and data networking ○ Used in FTTH deployments for reliability and ease of use LC Connector (Lucent Connector) ○ Compact size with push-pull mechanism 69 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ Favored in high-density applications like data centers ○ Often shipped as paired cables for transmit and receive sides ○ Features high-precision alignment, ensuring efficient data transmission and minimized potential data loss ST Connector (Straight Tip Connector) ○ Round shape with twist-lock mechanism Critically important when operating in any kind of environment where movement or vibrations might occur ○ Reliable connection, commonly used in multi-mode fiber optics ○ Well-suited for outdoor applications due to its durability MTRJ Connector (Mechanical Transfer-Registered Jack) ○ Small, rectangular design housing transmit and receive fibers ○ Suitable for space-constrained applications like office LANs ○ Offers high-density capabilities with an RJ-style latch mechanism ○ Offers cost-effective solution for densely populated network environments 70 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) MPO Connector (Multi-fiber Push On Connector) ○ Designed for multiple fibers in a single connector ○ Essential in high-density applications such as data centers and high-speed networks ○ Enables quick and efficient connections, crucial for rapid scalability ○ Each type of connector can be polished or shaped ○ Back Reflection Occurs when a portion of transmitted light in a fiber optic cable reflects back toward the source, potentially degrading the signal Minimizing back reflection is crucial for maintaining signal integrity and optimizing data transmission ○ Polish Types: PC (Physical Contact) Style Having slight curvature in the fiber face to lower back reflection over standard straight-cut fiber Provides the least effective reduction in back reflection Best suited for short-distance or lower-speed data transmissions UPC (Ultra Physical Contact) Style Having dome-shaped end-face for better core alignment Offers lower back reflection than PC style Suitable for general broadband applications 71 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) APC (Angled Physical Contact) Style Uses an 8-degree angled polish to greatly reduce back reflection Lowest amount of back reflection Well-suited for high bandwidth and long-distance applications, such as undersea cable networks ○ Regular updates on connectors and standards are essential for efficient network design and maintenance Transceivers ○ Transceiver A device capable of both transmitting and receiving data Blend of "transmitter" and "receiver" Utilizes specific protocols for data transmission and reception ○ Protocols Set of rules governing data transmission and reception Main protocols: Ethernet ○ Family of networking technologies for LANs, MANs, and WANs ○ Facilitates communication and data transfer ○ Defines physical standards, electrical standards, and data formats 72 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) ○ Supports various data rates and media types Fibre Channel (FC) ○ High-speed network technology that connects computer data storage to servers inside storage area networks ○ Handles large data volumes quickly and reliably ○ Supports optical fiber and copper-based media ○ Key features: High throughput Low latency Advanced data integrity ○ Transceiver Functions Converts data between different protocols Enables communication between Ethernet and Fibre Channel networks Converts media types in Layer 1 (e.g., fiber to copper, copper to fiber) ○ Form Factors SFP (Small Form Factor Pluggable) A compact hot pluggable optical module Can be pulled in or pulled out without turning off the associated router or switch Up to 4.25 Gbps SFP+ Faster version of SFP 73 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Up to 16 Gbps QSFP (Quad Small Form Factor Pluggable) Up to 40 Gbps QSFP+ Slightly faster version of QSFP Up to 41.2 Gbps QSFP28 Up to 100 Gbps QSFP56 Up to 200 Gbps ○ QSFP modules are faster than SFP modules ○ Transceivers convert light signals to electrical impulses 74 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Distribution Systems Objectives: 2.4 - Explain important factors of physical installations 5.5 - Given a scenario, use the appropriate tool or protocol to solve networking issues Cable Distribution Systems ○ Cable Distribution System Overview Organized system connecting network backbone to end users via distribution frames Design should be hierarchical for logical and functional placement within buildings ○ Components of Cable Distribution Systems Demarcation Point Location at which the Internet Service Provider (ISP) connection ends, and network infrastructure and cabling actually begins Marks entrance of WAN into facility Responsibility shifts to organization beyond this point Main Distribution Frame (MDF) Primary starting point for interior cabling distribution Houses main point of presence router and backbone switch ○ Backbone switch connects all network components 75 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Intermediate Distribution Frame (IDF) Branches out from MDF to serve smaller areas Contains edge switches for local connections Cable Trays ○ A unit or assembly of units that form a rigid structural system to securely support the cables and raceways Horizontal – installed in drop ceilings or beneath raised floors Vertical – vertical cross-connect, minimizing vertical cable crossings between floors Racks Hold network equipment for efficient space management Various types: ○ 2-post – for lighter equipment/patch pannels/network cabling ○ 4-post – for heavier equipment ○ Wall-mounted – space-saving solution for smaller equipment ○ Rack enclosures – for high-value equipment Patch Panels Organize and facilitate connections within network infrastructure 76 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Utilize both sides ○ Front – network jacks (RJ-45 network ports) ○ Back – 110 punchdown block 110 Block ○ A type of punchdown block used for both voice and data applications that rely on CAT 5 or newer copper-based networks ○ Installed using a punchdown tool Preferred over direct connections for network maintenance and port protection Fiber Distribution Panels Facilitate fiber connections without punchdown blocks Uses SC, LC, ST, or MTRJ Can act as a converter for types of fiber connection ○ Cable Distribution Process Computer connected to wall jack using straight-through patch cable (copper or fiber) Wall jack terminates cable into punch down block Cable runs through walls, ceilings, or raised floor, across cable trays to intermediate distribution frame Cable terminated into patch panel's punch down block 77 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Another patch cable connects patch panel to open port on edge switch in intermediate distribution frame For fiber instead of copper, switch, patch panel, and wall jack replaced with fiber counterparts Process breaks up long cable run into multiple pieces for flexibility and ease of repair Troubleshooting and repair facilitated by multiple connection points, avoiding full cable reruns for minor issues Wiring a Network Demonstration Testing a Network Demonstration Power Distribution Systems ○ Power Distribution Systems Crucial for consistent and reliable power delivery ○ Uninterruptible Power Supply (UPS) An electrical apparatus that provides emergency power during main power failures Offers surge protection and line conditioning Typically lasts 15 to 30 minutes Installed at the bottom of each rack in data centers 78 https://www.DionTraining.com CompTIA Network+ (N10-009) (Study Notes) Some data centers use larger UPS systems supporting multiple racks or the entire facility ○ Power Distribution Unit (PDU) A specialized device that distributes electric power to network components and computing equipment Advanced power strips with power monitoring and control features May be rack-mounted or in large cabinets for rows of servers Provides surge protection but not full protection against complete power loss ○ Generators Installed outside data centers for longer-term power during outages Powered by diesel, gasoline, or propane Paired with UPS or battery backup for seamless power transition Automatic transfer switch shifts power between UPS and generator ○ Power Load Management Critical for preventing circuit overloads and ensuring efficient power usage Careful calculation and monitoring of power loads on circuits New equipment installations require assessing power impact and