CompTIA Network+ Certification Exam Objectives Hey! Thanks for downloading this PDF! I’m looking forward to learning with you. If you have any questions about this, head to my website hackerbella.xyz and comment on the blog. I’m happy to help. - Allie Mellen 1.0 Networking Concepts 1.1 Explain the purposes and uses of ports and protocols. In computer networking, a port is an endpoint in a computer used for communication. Protocols and Ports Protocol Port TCP/UDP Description Applications Interesting Facts SSH 22 TCP The Secure Shell (SSH) protocol is a cryptographic network protocol that allows secure network services over an unsecured network. It uses a client-server architecture to connect an SSH client to an SSH server. Any Network Service Common: ● Remote Comman d-line ● Login ● Remote Comman d Execution SSH was meant to replace FTP (Port 21) and TELNET (Port 23), which is why it was assigned Port 22. DNS 53 UDP/TCP The Domain Name System (DNS) protocol is a detailed specification of all data structures and communication exchanges used in the Domain Name System. Human-readable Hostnames for Websites DNS functions as the phonebook for the Internet. SMTP 25 TCP The Simple Mail Transfer Protocol (SMTP) is a communication protocol for email. Email SMTP is believed to have roots in the Mail Box Protocol (disputed implementation). FTP 20, 21 TCP The File Transfer Protocol (FTP) is a network protocol to transfer computer files. It uses a client-server architecture to connect an FTP client with an FTP server. File Transfer I didn’t find anything really interesting about this one. Let me know in the comments if you do. TFTP 69 UDP The Trivial File Transfer Protocol (TFTP) is a lockstep file transfer protocol used for transferring files. Nodes Booting From a LAN As the name suggests, TFTP has a simple design and limited features, therefore it has a small memory footprint. TELNET 23 TCP The TELNET (Teletype Network) protocol is an application protocol to provide bi-directional eight-bit byte oriented communications. It is used as a method of interfacing terminal devices and terminal-oriented processes. ● ● Remote Manage ment Initial Device Setup for Network Hardware Not only does TELNET communicate over port 69, it was also developed in 1969. DHCP 67, 68 UDP The Dynamic Host Configuration Protocol (DHCP) is a network protocol used by DHCP servers to respond to queries by clients to be set up on the network. Without DHCP servers, network admins would have to manually set up every client that joins the network. Communicating network parameters DHCP is based on the Bootstrap Protocol (BOOTP). HTTP 80 TCP The Hypertext Transfer Protocol (HTTP) is a network protocol for distributed and collaborative hypermedia information systems. HTTP uses the client-server computing model and acts as a request-response protocol. For example, in this situation, a user's web browser may be the client, while the computer hosting the web application they are accessing through their browser would be the server. Data Communication on the World Wide Web HTTP development started at CERN in 1989. Yes, that CERN. HTTPS 443 TCP The Hypertext Transfer Protocol Secure (HTTPS) is the secure communication extension of HTTP. The communication protocol in HTTPS is encrypted using TLS. Secure Data Communication on the World Wide Web HTTPS is meant to provide all that HTTP does, with added authentication, privacy, and integrity through bi-directional encryption. The Simple Network Management Protocol (SNMP) is a protocol to help communicate management information for devices on the network. This can include routers, modems, switches, servers, workstations, printers, etc. Network Management and Monitoring I didn’t find anything really interesting about this one. Let me know in the comments if you do. TCP/UDP The Remote Desktop Protocol (RDP) is a network communications protocol for remote management and access. Remote Access of Windows and macOS. This protocol is proprietary and developed by Microsoft. 123 UDP The Network Time Protocol (NTP) is a network protocol to synchronize clocks between devices to within a few milliseconds of Coordinated Universal Time. Time Synchronization: Air traffic control was an early application of NTP. NTP uses the intersection algorithm to choose time servers and prevent network latency issues. SIP 506 0, 506 1 TCP/UDP The Session Initiation Protocol (SIP) is a protocol used for real-time voice, video, and messaging sessions. Communication Over Voice, Video, and Messaging SIP is lauded for having been established in the Internet community instead of the telecommunications community. SMB 445 TCP/UDP The Server Message Block (SMB) protocol is a protocol used to share files, printers, serial ports, and communications abstractions between devices. File Sharing I didn’t find anything really interesting about this one. Let me know in the comments if you do. POP 110 TCP The Post Office Protocol (POP) is a protocol that is used to retrieve email from a mail server in conjunction with SMTP. Email Retrieval The name speaks for itself. IMAP 143 TCP The Internet Message Access Protocol (IMAP) is a protocol to retrieve email from a mail server. Email Retrieval The main difference between POP and IMAP is that IMAP allows synchronization between devices and the mail server. LDAP 389 TCP/UDP The Lightweight Directory Access Protocol (LDAP) is a protocol for maintaining distributed directory information services. This is User Validation Through Storage of Usernames and Passwords LDAP was used for the basis of Microsoft Active Directory. SNMP 161 UDP RDP 338 9 NTP important to help share information about users, systems, networks, services, and applications. LDAPS 636 TCP/UDP The Lightweight Directory Access Protocol over SSL (LDAPS) is a method of securing LDAP using an SSL tunnel. User Validation Through Storage of Usernames and Passwords, Securely I didn’t find anything really interesting about this one. Let me know in the comments if you do. H.323 172 0 TCP H.323 is a series of protocols for audio-visual communication. It specifically addresses call signaling and control, multimedia transport and control, and bandwidth control. Voice and Video Conferencing Though H.323 was originally meant for videoconferencing over LAN, it quicky spread to a variety of networks including WAN and the Internet. Related Definitions ● ● ● ● ● ● ● ● ● ● Protocol ○ A protocol is a set of rules to determine how to act in a given situation. Cryptographic Protocol ○ A cryptographic protocol is a set of rules to allow secure communication under a given set of circumstances. Client-server Architecture ○ Client-server architecture is an architecture of a computer network that allows clients, or client computers, to request services from a server, or host computer. Domain Name System ○ The Domain Name System (DNS) is a decentralized, hierarchical naming system for devices connected to the Internet or a private network. Decentralized System ○ A decentralized system is one in which some components operate on local information instead of all being tied to the same source. Lockstep ○ Lockstep systems are systems that run the same set of operations at the same time in parallel so they may be fault-tolerant. This allows error detection and correction, since the outputs can be compared and corrected with at least three parallel systems. Local Area Network ○ A local area network (LAN) is a computer network that connects computers in a small (or local) area, such as a house. Transport Layer Security ○ Transport Layer Security (TLS) is a cryptographic protocol to secure communications on a computer network. Directory Service ○ A directory service is responsible for mapping network resources to network addresses. SSL Tunnel An SSL tunnel is a communications protocol used to move data from one network to another securely using SSL. Datagrams ○ Datagrams are a basic transfer unit with a header and payload section transmitted on the network. ○ ● Protocol Types ● ● ● ● ● ● ICMP ○ Internet Control Message Protocol (ICMP) is a supporting protocol for network devices. It allows them to send error messages and operational information regarding success or failure during communication with other devices. Unlike TCP and UDP, ICMP is not used for data exchange or for end-user network applications (except ping and traceroute). UDP ○ User Datagram Protocol (UDP) is a protocol to send messages to other devices on the network without the need for previous communications. UDP is fast, but not necessarily as reliable as TCP. TCP ○ Transmission Control Protocol (TCP) is a protocol to send bytes between devices on a network. It is reliable, ordered, and error-checked on delivery, unlike UDP, which is much faster but more error-prone. IP ○ Internet Protocol (IP) is the OG network communications protocol for relaying datagrams to other devices across network boundaries. The IP enables internetworking, the foundations of the Internet. Connection-oriented ○ A connection-oriented protocol is a protocol where data transmission relies on an established connection. A stream of data must be delivered in the appropriate order and a communication session has to be established before data can be sent. Connectionless ○ Connectionless communication is data transmission that does not rely on an established connection. Each data unit is addressed and routed based on the information it contains, therefore, any particular message can be sent without previous communications being established, and data units can arrive in any order. 1.2 Explain devices, applications, protocols, and services at their appropriate OSI layers. The Open Systems Interconnection (OSI) model is a standardized, conceptual model to help devices to communicate with each other. It splits communication into seven stacked layers, each of which is able to communicate with the layers above or below itself. When data is flowing through the OSI model, data on the sending device travels down, while data on the receiving device travels up. Something interesting to note: denial of service attacks target parts of the network layer. Application layer attacks target the application layer. And protocol attacks target the protocol layer. Makes sense! Layer 7: Application The application layer is the layer used to communicate with the user; applications like web browsers and email rely on the application layer for communication. Applications are not part of the application layer. They use the application layer to communicate. Layer 6: Presentation The presentation layer does just what it says: it makes data “presentable” for the application layer. Think things like data translation, encryption, and compression. Day to day, the presentation layer may need to work with the application layer or the session layer. It translates incoming data so the application layer on the device can understand it, and it also adds encryption/decryption as necessary. The presentation layer may also compress data coming in from the application layer that it will then efficiently pass on to the session layer. Layer 5: Session The session layer opens and closes sessions between devices (hence, the session layer. I’m sensing a pattern…). The session layer makes sure the session is open for as long as needed, can quickly close the session, and can synchronize data transfers with checkpoints. Checkpoints help keep everything connected - if a session layer has a checkpoint every five megabytes for a 100 megabyte file, but the file gets cut off at 44 megabytes, the session layer will reconnect and transfer starting from the 40 megabyte mark (the latest checkpoint). Otherwise, it would have to start from scratch every time a session is interrupted. Layer 4: Transport The transport layer is responsible for end-to-end communication on the network between devices; specifically, the transport layer receives and outputs data without errors. Typically, the sending device breaks down application messages into segments that are then passed on to the network layer. Contrastingly, the receiving device reassembles segments into messages, which can then be passed to the application layer. Layer 3: Network The network layer is responsible for the facilitation of data transfer between devices on different networks. The network layer is unnecessary if the devices are on the same network (more about that in the data link layer). On the sender device, the network layer is responsible for packets: it creates packets from the segments passed in from the transport layer. On the receiver device, the network layer reassembles the packets before sending them to the transport layer. The network layer is also responsible for routing, finding an optimized path to pass data through. Layer 2: Data Link The data link layer is responsible for data transfer between devices on the same network. The data link layer takes in data on the network and segments them into frames. It is also responsible for flow control and error control for devices on the network. Layer 1: Physical The physical layer is responsible for the physical equipment necessary for data transfer, things like the cables and switches. It’s also where data is converted into a bit stream. In order to properly align, the physical layer on both devices must agree on a signal convention. 1.3 Explain the concepts and characteristics of routing and switching. Properties of Network Traffic ● ● ● ● ● ● ● ● ● Broadcast Domains ○ Broadcast domains forward packets to all the machines on the network. It will only go to the machines on the network, no more than that, and they do not cross network boundaries. CSMA/CD ○ Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) is a MAC protocol for local area networking used with Ethernet technology. The Collision Detection part references a method of detecting collisions with other information being sent via transmissions from other stations. CSMA/CA ○ Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CD) is a wireless network multiple access method that allows travel of entire packets without collisions. It uses carrier sensing with nodes, which try to avoid collisions when they sense that the channel is idle. However, it is unreliable. Collision Domains ○ Collision domains are segments of the network that connect through a shared medium and are susceptible to simultaneous colliding data transmissions. This can happen for both wireless and early Ethernet networks. Protocol Data Units ○ Protocol data units (PDUs) are single units of information transmitted between devices on a computer network. This includes protocol-specific control data and user data. For TCP, the protocol data unit is a segment, while for UDP, the protocol data unit is a datagram. MTU ○ Maximum transmission units (MTUs) are the largest possible PDUs that can be transmitted through a single network layer transaction. Typically, the larger the MTU, the less overhead. However, the smaller the MTU, the less network delay. It’s a tradeoff. Broadcast ○ A broadcast is when a device is sending packets to multiple receivers at once, including all of the hosts connected to the network. This is known as all-to-all. Multicast ○ A multicast is when a device is sending packets to multiple receivers at once, but only to those that are intended recipients. This is known as one-to-many routing, or can be used for many-to-many routing. Unicast ○ A unicast is when a device is sending packets to a single receiver at once. This is known as one-to-one routing. Segmentation and Interface Properties ● ● VLANs ○ Virtual LANs (VLANs) are a group of devices in the same broadcast domain. What makes VLANs different from physical LANs is that hosts can be grouped together even if they are not connected to the same switch. Trunking (802.1Q) ○ Trunking is connecting two VLANs such that traffic may pass between them. 802.1Q is merely the trunking protocol. It is the most common trunking protocol and is standardized across vendors. ● ● ● ● ● ● ● Tagging and untagging ports ○ Tagged ports are a way of identifying that a packet belongs to the appropriate VLAN. The packets are tagged with a VLAN tag in the Ethernet frame. This is the core difference between tagged and untagged packets: tagged packets have VLAN information, untagged packets do not. Port mirroring ○ Port mirroring is where a device (Device A) on the same switch as another device (Device B) can “listen” to the incoming traffic on Device A. Device B receives a copy of every network packet seen going to Device A. Whether or not this is allowed depends solely on whether or not the switch Devices A and B are connected to supports port mirroring. Switching loops/spanning tree ○ A switching loop occurs when two endpoints are connected by more than a single Layer 2 path. This is meant to be addressed by the Spanning Tree Protocol. ○ The Spanning Tree Protocol (STP) is a layer 2 protocol to prevent loops from redundant paths in a network. It uses the Spanning Tree algorithm to ensure there are no loop paths in the network with Bridge Protocol Data Units (BPDUs), to identify redundant paths. PoE and PoE+ (802.3af, 802.3at) ○ Power over Ethernet (PoE) is a system dedicated to powering and transmitting data over twisted pair Ethernet cabling. The main difference between PoE and PoE+ is the power provided. Needless to say, PoE+ is much more. DMZ ○ The demilitarized zone (DMZ), a term taken from the military, is the physical or logical subnetwork. It is the interface between the local area network (LAN) and the Internet. This includes devices like public servers, resources, or servers. MAC Address Table ○ The MAC Address Table identifies where to forward traffic on a LAN for Ethernet switches. ARP Table ○ Address Resolution Protocol Table (ARP Table) correlates MAC addresses to corresponding IP addresses. Routing ● Routing protocols (IPv4 and IPv6) ○ Routing protocols are used to identify routes on the network, create routing tables, and make routing decisions. ○ Distance-vector routing protocols ■ Distance vector routing protocols use the hop count to determine the best route to take. This protocol will continuously send neighboring routers a copy of its routing table to make sure they are aware of the latest. ○ RIP ■ Routing Information Protocol (RIP) is a distance vector routing protocol that uses the hop count to determine the best path. ○ EIGRP ■ Enhanced Interior Gateway Routing Protocol (EIGRP) is a distance vector routing protocol able to automate routing decisions and configurations. It is only available on Cisco routers. ○ Link-state routing protocols ■ Link-state routing protocols is the yang to distance-vector routing protocols yin. Link state routing happens at every switching node in the network, where switching nodes on the Internet are also known as routers. Each node creates a map of the other nodes they are connected to and calculates the best and most logical path for the packet to take. ○ ● OSPF ■ Open Shortest Path First is a routing protocol that uses link state routing. OSPF is a common IGP used in larger enterprise networks. ○ Hybrid ■ The Hybrid Routing Protocol is a combination of distance vector routing and link state routing. It uses distance vectors for the most accurate distance metrics, but only sends routing information when there is a change in network topology. This requires less processing power than typical link-state routing. ○ BGP ■ Border Gateway Protocol (BGP) is an exterior gateway protocol for transmitting routing and reachability information between autonomous systems. Routing types ○ Static ■ Static routing is routing that requires the manual configuration of a routing entry. They are typically configured by network administrators, who add entries to a routing table. ○ Dynamic ■ In contrast, dynamic routing adapts to the existing conditions between communication circuits to avoid existing damages to the network. IPv6 Concepts ● ● ● ● ● Addressing ○ IPv6 addressing is how we interface with and find a device on the network. IP addresses get transmitted in packet headers as the source and destination of a particular packet. Tunneling ○ IPv6 tunneling is how to use the routing infrastructure from IPv4 for IPv6 traffic. Basically, this comes down to encapsulating IPv6 datagrams within IPv4 packets. Dual stack ○ Dual stack refers to creating a system where devices may run IPv4 and IPv6 simultaneously. This is particularly important as organizations transition from IPv4 to IPv6. Router advertisement ○ Router Advertisement Daemon (RADVD) is a way of automatically configuring devices joining the network for IPv6. If this is enabled, autoconfiguration of the device’s IPv6 address, subnet prefix, and default gateway can occur. If it is disabled, this must be done manually, typically by the network administrator. Neighbor discovery ○ The Neighbor Discovery Protocol (NDP) gathers information for Internet communication. This can include configuration information for local connections, domain name servers, and gateways for connecting with other systems. Performance Concepts ● ● Traffic shaping ○ Traffic shaping prioritizes bandwidth based on the type of network packet. Network packets with higher priority are ensured better network performance. QoS ○ ● ● Quality of Service (QoS) is the quantitatively measured performance of the network. It can be based on packet loss, bit rate, throughput, transmission, availability, delay, jitter, or more. DiffServ ○ Differentiated Services (DiffServ) is a networking architecture for managing network traffic and ensuring QoS. CoS ○ Class of Service (CoS) is the parameter for assigning priorities to packets on the network. Other Concepts ● ● ● ● ● ● NAT/PAT ○ Network Address Translation (NAT) is the way to remap an IP address space into another. It involves altering the network address information, which is in the IP header of the packets, while they are moving across a traffic routing device. ○ Port Address Translation (PAT) is the equivalent of NAT, but with ports. It is the way to translate ports. Port forwarding ○ Port forwarding is an application of NAT where not only is the IP address space remapped, but the port number is as well. This lets devices on the Internet connect to devices on a LAN. Access control list ○ An access control list is a list of conditions to filter network traffic. Distributed switching ○ Distributed switching is where a distributed switch acts as the sole virtual switch. It is used to maintain consistent network configurations as VMs move around several hosts. Packet-switched vs. circuit switched network ○ Packet-switched networks move data via packets. These packets can be sent in any order, as they are rearranged at the destination based on information in the packet header. In contrast, circuit-switched networks require point-to-point connections that are consistent and maintained until the data is transmitted. With circuit-switched networks, an entire channel must be dedicated to a single interaction. In contrast, packet-switched networks can maintain a single channel for multiple communications simultaneously. Software-defined networking ○ Software-defined networking (SDN) is a method of network management where the network configuration is dynamically upgraded to be the most efficient possible. THe goal is to improve network performance and monitoring. Helpful Definitions ● ● ● ● MAC ○ Medium Access Control (MAC) controls hardware that interacts wired, optical, or wireless transmissions. The data link layer is made up of the MAC layer and the logical link control (LLC) layer. Carrier wave ○ A carrier wave is used to send information at a higher frequency than the input signal, so it can allow several different carriers to transmit at once on the same transmission medium. Multiple Access Method ○ The multiple access method is a method that lets more than two terminals share one transmission method. Ethernet over twisted pair ○ ● ● Ethernet over twisted pair are twisted pair cables used for the physical layer of an Ethernet computer network. Interior Gateway Protocol ○ The Interior Gateway Protocol (IGP) is a protocol used to exchange router information. IGPs are divided into distance vector routing protocols and link-state routing protocols. Autonomous Systems ○ An autonomous system (AS) is a group of routers where their prefixes and routing policies are all controlled by the same administrator. This may be a Network Service Provider, a large business, a university, or other larger organizations. 1.4 Given a scenario, configure the appropriate IP addressing components. ● ● ● ● ● ● Private vs. public ○ A private IP address is the address a device uses to communicate within their network. ○ A public IP address is the address used to communicate publicly outside of the local network. Loopback and reserved ○ Loopback is the range of IP addresses reserved for the localhost address. It is entirely maintained on the device’s operating system. ○ Reserved IP addresses are addresses that have been reserved by the IETF and the IANA for special purposes. Default gateway ○ A default gateway is a device on the network that forwards packets to other networks and eventually on to their destination. A router is an example of a default gateway. Virtual IP ○ A Virtual IP address (VIP) is an IP address that isn’t actually for a physical network, but instead is used for things like NAT and fault tolerance. Subnet mask ○ A Subnet mask is what separates an IP address into network and host addresses. This takes the form of <network><subnet><host> to give additional subnetworks. Subnetting ○ Classful ■ Classful networks divide the IPv4 address space into five different classes: A, B, C, D, and E. ■ Classes A, B, C, D, and E ● Class A: Class A contains all addresses where the most significant bit is 0; this can accommodate 128 networks. ● Class B: Class B contains all addresses where the two most significant bits are 1 and 0; this can accommodate 65,536 addresses per network. ● Class C: Class C contains all addresses where the three most significant bits are 1, 1, and 0; this can accommodate 256 local addresses. ● Class D: Class D is reserved for multicasting and contains all addresses where the four most significant bits are 1, 1, 1, and 0. ● Class E: Class E is reserved for experimentation only and ranges from 240.0.0.0 to 255.255.255.254. ○ Classless ■ VLSM ● Variable-length Subnet Masks (VLSMs) use more than one mask for the same classful network. AKA, VLSMs subnet the subnet. ■ CIDR notation (IPv4 vs. IPv6) ● ● Classless Inter-Domain Routing (CIDR) is a method of allocating IP addresses introduced by the IETF. It was meant to replace classful networks and reduce the exhaustion of IPv4 addresses. CIDR is based on VLSM. Address assignments ○ DHCP ■ There are three different ways DHCP assigns IP addresses: ● Automatic Allocation: DHCP servers assign a permanent IP address from their dedicated IP Pools. ● Dynamic Allocation: DHCP servers assign a reusable IP address from their dedicated IP Pools. This only lasts for a set amount of time and is known as a lease. ● Static Allocation: Static allocation occurs when the network administrator manually assigns an IP address, which the DHCP server is then responsible for sending along to the client. These are permanent. ○ DHCPv6 ■ Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of DHCPv4. ■ Manual ● A manual assignment is typically completed by a network administrator, but this can be error-prone. ■ Stateless Address Autoconfiguration ● Stateless Address Autoconfiguration (SLAAC) is a way to assign IP addresses without needing a network administrator. Instead, the admin configures the router, which then sends Router Advertisement announcements to the devices on the network. This lets the devices configure themselves. ■ Stateful DHCPv6 ● Stateful DHCPv6 is a counterpart to Stateless Address Autoconfiguration that allows configuration parameters to be passed to IPv6 nodes. ■ DHCPv6-PD ● DHCPv6 Prefix Delegation (DHCPv6-PD) is used to assign a complete subnet from a DHCPv6-PD server to a DHCPv6-PD client. Instead of a single address assignment, DHCPv6-PD assigns an entire set of IPv6 subnets. ■ Stateless DHCPv6 ● Stateless DHCPv6 uses SLAAC to assign IPv6 addresses and DHCPv6 to add more parameters like DNS or NTP server addresses. ○ Static ■ Static IP addresses are IP addresses that have been manually configured, typically by a network administrator. ○ APIPA ■ Automatic Private IP Addressing (APIPA) is a way for a device on the network to discover an address on its own. When getting an IPv4 address, the device can select an address at random between 169.254.1.0 to 169.254.254.255 with a netmask of 255.255.0.0. The device sends an ARP packet for the MAC address associated with the IP address, and if it is not accepted (because the address is already taken), it will try a new IP. ○ EUI64 ■ Extended Unique Identifier (EUI64) is a way of automatically configuring IPv6 host addresses. This is meant to eliminate the need for manual configuration or DHCP, popular methods in IPv4. ○ IP reservations ■ With IP reservations, IP addresses are automatically assigned and managed without requiring addresses be set aside for exclusive use by certain devices. IP addresses are reserved and associated with a unique MAC address, so when a device requests an IP renewal, they may get the same IP. Helpful Definitions ● ● ● ● Internet Engineering Task Force ○ The Internet Engineering Task Force (IETF) is an organization that establishes standards for the Internet, especially when it comes to TCP/IP. Internet Assigned Numbers Authority ○ The Internet Assigned Numbers Authority (IANA) oversees global IP address allocation, Internet numbers, number allocation, root zone management, and other IP protocol-related systems. ARP ○ Address Resolution Protocol (ARP) is used to map IP addresses to their Ethernet addresses. ARP packets typically start a conversation between two devices. Stateful vs Stateless ○ Stateful IP addresses provide a log that certain IP addresses were assigned to a specific MAC address. ○ Stateless IP addresses are more dynamic and are used to determine a device’s IP address at the time for that particular network. 1.5 Compare and Contrast the Characteristics of Network Topologies, Types, and Technologies ● ● Wired Topologies ○ The actual physical layout of the cables that connect computers on the network. ○ Logical vs Physical ■ A logical topology is a way of visualizing the network with respect to how data flows, as opposed to what it actually may look like. ■ A physical topology is how the network is actually physically laid out, across network cables and devices. ○ Star ■ In a star topology, each device is connected to a central access point. ○ Ring ■ In a ring topology, each device is connected to the other devices in the network in a ring. This is considered an obsolete network topology. ○ Mesh ■ In a mesh topology, each device on the network connects directly to any other device on the network. In the past, this needed to be wired, which made it expensive and difficult to sacale. ○ Bus ■ In a bus topology, each device is connected linearly to the next, starting at the server and ending with the last device on the network. This is considered an obsolete network topology. Wireless Topologies ○ Mesh ■ In a mesh topology, each device on the network connects directly to any other device on the network. These connections are non-hierarchical, and this type of network self-organizes and self-configures to efficiently route data. ○ Ad hoc ■ ○ A wireless ad hoc network (WANET) is a decentralized network that does not have a defined infrastructure. Each device on the network works together to pass data based on routing algorithms and network connectivity. Infrastructure ■ An infrastructure wireless topology is centralized. Specific devices are used as access points for other devices on the network. Network Types by Spatial Scope, Michel Bakni Network Acronym Network Type Description LAN Local area network A local area network (LAN) is a network that connects devices in a small (or local) area, such as a house, over Ethernet. WLAN Wireless local area network A wireless local area network (WLAN) is a network that connects devices in a local area. It differs from a traditional LAN because it uses Wi-Fi instead of Ethernet. MAN Metropolitan area network A metropolitan area network (MAN) is a network that connects devices in a larger geographic region the size of a metropolitan area. WAN Wide area network A wide area network is a network that connects devices across a large geographic area. A WAN can connect smaller networks like MANs and LANs, so devices can communicate across vast locations. CAN Controller area network A controller area network (CAN bus) is a standard for microcontrollers that lets them communicate without a host. When a device communicates, the communication is sent to all devices, including itself. SAN Storage area network A storage area network (SAN) is a high-speed network for easy access to storage. Storage devices are presented to the host as though they are attached locally, which can be used for business continuity management. PAN ● Personal area network A personal area network (PAN) is a network for connecting an individual’s devices together. Technologies that facilitate IoT ○ Z Wave ■ Z Wave is a mesh network communications protocol that uses low-energy radio waves to help home automation devices communicate. ○ ANT+ ■ Advanced Network Topology (ANT+) is a low-power version of ANT. ANT+ and ANT are wireless network technology to allow sports sensors to communicate. The technology is owned by a division of Garmin Canada, though it is open access. ○ Bluetooth ■ Bluetooth is a well-known wireless technology that allows devices to communicate with each other at a short range. A lot of technology used every day uses Bluetooth, like Bluetooth headphones. ○ NFC ■ Near-field Communication (NFC) is a communications protocol that allows devices to communicate with each other at an incredibly short range, 1.5 inches or less. NFC is very common with touchless payment systems and some keycards. ○ IR ■ Infrared (IR) is a wireless technology used to send data through infrared radiation. It’s often used in intrusion detection, for cordless headsets, and for printers. IR cannot travel through walls, which limits its implementation capabilities. ○ RFID ■ Radio frequency identification (RFID) uses electromagnetic fields to identify objects. RFID tags contain a radio transponder that can be triggered from an electromagnetic pulse from a RFID reader, which transmits information identifying the object. RFID tags are used in a lot of applications and have faced privacy concerns. ○ 802.22 ■ IEEE 802.22 is a wireless regional area network (WRAN) standard. It uses unused sections of TV broadcast frequency to communicate, in order to give broadband access to low population density, rural areas. 1.6 Given a Scenario, Implement the Appropriate Wireless Technologies and Configurations 802.11 is the IEEE wireless networking standard. Variations differ in terms of speed, data rates, frequency, and other factors, but they are all implemented in a similar way: ad hoc or infrastructure topologies. IEEE Standard Frequency Data Rate (Mbps) Range (ft) 802.11 2.4 GHz RF 1 - 2 Mbps 20 ft 802.11a 5 GHz 54 Mbps 25 - 75 ft 802.11b 2.4 GHz 11 Mbps 150 ft 802.11g 2.4 GHz 54 Mbps 150 ft 802.11n 2.4 GHz/ 5 GHz 600 Mbps 175 ft 802.11ac 5 GHz 2.5 Gbps 175 ft Data collected from P earson. ● ● ● ● ● ● ● Cellular ○ GSM ■ The Global System for Mobile Communications (GSM) is a standard developed by the ETSI for second-generation (2G) cellular networks. It became the global standard for mobile communications with over 90% market share. ○ TDMA ■ Time-division multiple access (TDMA) is a cellular communications technology to ensure multiple individuals can use the same frequency without interference. ○ CDMA ■ Code-division Multiple Access (CDMA) is a channel access method, whereby several devices can communicate over the same channel at the same time. Frequencies ○ 2.4 GHz ■ 2.4 GHz transmits data slower, but has a large range. ○ 5.0 GHz ■ 5.0 GHz transmits data quickly, but has less range. The higher the frequency, the faster the data transmission. Its range is largely limited by its inability to pass through solid objects. Channel Bandwidth ○ Channel bandwidth changes the data transmission rate; higher bandwidth means faster connection. Channel Bonding ○ Channel bonding combines two channels with the same frequency to increase throughput. It is very common in Wi-Fi applications. MIMO/MU-MIMO ○ Multiple input, multiple output (MIMO) and multi-user, multiple output (MU-MIMO) are wireless network technology. MU-MIMO is the next evolution of MIMO, which enables devices with multiple antennas to communicate with one another. MIMO solely allowed a single antenna to communicate with another single antenna. Unidirectional/omnidirectional ○ A unidirectional network is a device that only allows data to flow in a single direction. This is commonly used in military bases, nuclear power plants, and other critical infrastructure, that need to ensure security. This is also known as a data diode. ○ An omnidirectional antenna is a type of antenna that sends equal radio power in every direction perpendicular to the antenna. This creates a donut-like radiation pattern. Site surveys ○ A wireless site survey is a way of designing a wireless network such that it will meet QoS, data rates, and coverage requirements. Helpful Definitions ● ● ETSI ○ The European Telecommunications Standards Institute (ETSI) is a standardization organization for telecommunications. Channel Access Method ○ A channel access method ensures that two devices can communicate over the same transmission medium at the same time. 1.7 Summarize cloud concepts and their purposes ● ● ● Types of services ○ SaaS ■ Software-as-a-Service (SaaS) is a form of cloud computing and a software distribution model. A third-party hosts applications for end users, typically for a subscription fee. ○ PaaS ■ Platform-as-a-Service (PaaS) is a form of cloud computing and an architecture wherein a third-party hosts a platform for end users, typically for a subscription fee. Users can develop, run, and manage business applications, all using the third-party infrastructure. ○ IaaS ■ Infrastructure-as-a-Service (IaaS) is a form of cloud computing and an architecture wherein virtualized computing resources are provided by a third-party to a user, typically for a subscription fee. Cloud delivery models ○ Private ■ Private clouds are a cloud delivery model where an organization can keep the necessary hardware locally managed. Access to applications in the private cloud can happen from anywhere, but the workloads are managed by the organization and delivered over WAN. ○ Public ■ Public clouds are a cloud delivery model where an organization uses a third-party for the physical hardware of their servers. IT staff can easily provision new cloud resources, which is why public clouds often follow a pay-as-you-go model. ○ Hybrid ■ Hybrid clouds are a h ybrid of private and public clouds. They are cloud delivery models where third-party resources are accessible, but are used to augment a private cloud. Connectivity methods ○ Cloud connectivity methods are the different ways to connect to cloud providers. ○ VPN ■ A virtual private network (VPN) gives a device an encrypted connection to a server over the Internet. ● Positives: VPNs are encrypted, and VPNs give IT admins a lot of control over who can access the network. ● Negatives: slow data speeds and increased network complexity, which means it is more difficult for IT teams to support. ○ RDS ■ ○ ● ● A remote desktop server (RDS) is a user interface for interacting with a server; all data is stored remotely, and every user interaction is sent back to the server. ● Positives: RDS has low bandwidth requirements and few servers are needed. ● Negatives: all users have the same interface, which limits customization, and there can be security concerns given that all users are accessing the same server. VDI ■ A virtual desktop infrastructure (VDI) is a dedicated space on a server for each user, much like RDS, except VDI allows for individual configuration of the user interface. ● Positives: users get a customized interface, less storage capacity is required, and applications, patches, and drivers are all managed centrally. ● Negatives: Compute requirements are high, and licensing costs are high. Security implications and considerations ○ Lack of Control ■ The biggest security implications from cloud computing seem to stem from one source: lack of control. As assets are moved to public clouds, organizations simply have less control over them. They are trusting another organization to manage their assets. ○ New, Unapproved Services ■ The cloud enables easy provisioning of new services, which means the IT department does not necessarily know or approve the cloud services a user is running. ○ Malware Infections ■ Given the amount of data organizations are storing on the cloud and the number of users accessing it, malware infections become more likely. ○ Compliance Issues ■ The cloud makes it easy to access a lot of data at once. This can pose issues for organizations that must meet HIPAA regulations, or GDPR. Relationship between local and cloud resources ○ Local Resources ■ Positives: Inexpensive, easy to use, and the data is 100% under the organizations control (for compliance and security purposes). ■ Negatives: Need to house the hardware, need to have fail safes in case the hardware fails, can potentially be stolen. The organization is entirely responsible for the security and management of the hardware. ○ Cloud Resources ■ Positives: Easily connect over the Internet, no physical storage necessary, small amounts of data can be stored for free or very low cost. ■ Negatives: Can be expensive depending on the resource usage, requires an internet connection to access, may be difficult to ensure compliance. 1.8 Explain the functions of network services ● DNS service ○ A DNS hosting service is the service that runs domain name system servers. The vast majority of domain name registrars include DNS hosting on registration. ○ Record types ■ A, AAAA ● A records are the most common kind of DNS record. They are used to translate domain names into IP addresses. Type A records are for Ipv4, while type AAAA are for IPv6. ■ ● TXT (SPF, DKIM) ● TXT records have text about a domain name, like the host, the main contact, and associated information. ● Sender Policy Framework (SPF) serves as an email authentication process to prevent spam. ● DomainKeys Identified Mail (DKIM) serves as an email authentication process so organizations may use public key cryptography to verify a message is sent from an authorized mail server. ■ SRV ● SRV records are used to state the location of a service, in three parts: service, protocol, and domain name. The actual service location is of four parts: priority, weight, port, and target. ■ MX ● Mail exchange records (MX) identify the email server associated with a particular domain name. MX records contain: the name of the email server and a number that decides preference for that server. ■ CNAME ● CNAME records are aliases for the particular domain name. ■ NS ● NS records identify which DNS servers correspond to which zone. ■ PTR ● PTR records translate IP addresses to domain names. They are often known as ‘reverse records’ from A and AAAA records. ○ Internal vs external DNS ■ An external DNS server is responsible for public DNS queries to a particular network. ■ An internal DNS server is responsible for not only the public DNS information about a particular network, but also additional information on internal hosts and services. ○ Third-party/cloud-hosted DNS ■ Third-party/cloud-hosted DNS is considered IaaS, basically a managed DNS server. They can benefit organizations by providing geographically diverse infrastructure and a reduction in cost, depending. ○ Hierarchy ■ The DNS hierarchy is responsible for managing a domain and its subdomains. It is a distributed database system in an inverted tree structure. Each domain name is an entity’s position in the DNS hierarchy. ○ Forward vs reverse zone ■ A forward lookup is when a DNS looks up the IP address of a device based on the hostname value. ■ A reverse lookup is when a DNS looks up the hostname based on the IP address. DHCP service ○ MAC reservations ■ DHCP reservations - specifically MAC reservations - ensure the IP address for the devices on your network use the same IP address consistently. ○ Pools ■ DHCP address pools are pools of IP addresses that the device managing the network can use to assign a client an address. ○ IP exclusions ■ ○ ○ ○ ○ ● ● NTP ○ IP exclusions are the IP addresses that are excluded from being assigned to client devices. Exclusions are based on which IP addresses are already assigned, therefore they will never be assigned automatically to any client devices. Scope options ■ DHCP scope is the set of IP addresses that can be assigned to client devices. The scope options include the DNS server, domain name, and gateway. Lease time ■ DHCP lease time is the time a device has to use the IP address it has been assigned. After that lease time, if the device is no longer connected, the address expires and is reassigned elsewhere. TTL ■ Time-to-live (TTL) is the set amount of time or number of hops before a packet is removed from the network. This is important for those instances where a packet gets “lost” on the network, or to track information on a packet such as how long it has been in transit. DHCP relay/IP helper ■ A DHCP relay is a host or router responsible for forwarding packets to other devices on the network. ■ IP helpers allow devices to act as a middle man to forward DHCP requests to the requested server. The Network Time Protocol (NTP) is a network protocol to synchronize clocks between devices to within a few milliseconds of Coordinated Universal Time. NTP servers are servers that help in that effort and that can be queried by other devices. This is considered a foundational network service. IPAM ○ IP Address Management (IPAM) encompasses how IP address space used in a network is planned, tracked, and managed. This typically involves the use of DNS and DHCP in tandem. Helpful Definitions ● Zone ○ A zone is a domain, not including the subdomains delegated to other DNS servers. Thanks again for downloading this PDF. I hope it was useful for you. If you have any questions about this, head to my website hackerbella.xyz and comment on the blog. I’m happy to help. - Allie Mellen