Beruflich Dokumente
Kultur Dokumente
tio
ua
al
Ev
se
U
y
nl
O
CompTIA Network+ Certification
Support Skills (Exam N10-005)
Study Notes
G523eng ver073
Acknowledgements
Course Developer............................................................ gtslearning
Editor ....................................................................... James Pengelly
This courseware is owned, published, and distributed by
gtslearning, the world's only specialist supplier of CompTIA
learning solutions.
www.gtslearning.com
al
Ev
sales@gtslearning.com
COPYRIGHT
ua
This courseware is copyrighted 2013 gtslearning. Product images are the copyright of the
vendor or manufacturer named in the caption and used by permission. No part of this courseware
or any training material supplied by the publisher to accompany the courseware may be copied,
photocopied, reproduced, or re-used in any form or by any means without permission in writing
tio
Every effort has been made to ensure complete and accurate information concerning the material
presented in this course. Neither the publisher nor its agents can be held legally responsible for
any mistakes in printing or for faulty instructions contained within this course. The publisher
appreciates receiving notice of any errors or misprints.
se
Information in this course is subject to change without notice. Companies, names, and data used
in examples herein are fictitious unless otherwise noted.
Where the course and all materials supplied for training are designed to familiarize the user with
the operation of software programs and computer devices, the publisher urges the user to review
the manuals provided by the product vendor regarding specific questions as to operation.
y
nl
consequential damages arising out of the use or the inability to use the contents of this course.
Warning
All gtslearning products are supplied on the basis of a single copy of a course per
student. Additional resources that may be made available from gtslearning may only be used in
conjunction with courses sold by gtslearning. No material changes to these resources are
permitted without express written permission from gtslearning. These resources may not be used
in conjunction with content from any other supplier.
If you suspect that this course has been copied or distributed illegally,
please telephone or email gtslearning.
Table of Contents
Table of Contents
Course Introduction
Ev
Module 1 / Unit 1
Topologies and the OSI Model
al
Module 1 / Unit 2
Cabling and Connectors
tio
ua
Module 1 / Unit 3
Ethernet
se
y
nl
Page iii
2013 gtslearning
Table of Contents
Module 1 / Unit 4
Bridges and Switches
70
Ev
Module 1 / Summary
Network Media and Devices
85
87
al
Module 2 / Unit 1
Internet Protocol
ua
89
tio
Module 2 / Unit 2
Addressing Schemes
106
se
Module 2 / Unit 3
DHCP, APIPA, and NTP
y
nl
Module 2 / Unit 4
IPv6
129
Table of Contents
Module 2 / Summary
Addressing and Routing
149
151
Module 3 / Unit 1
Transport Protocols
153
Ev
al
Module 3 / Unit 2
Name Resolution
161
ua
tio
Module 3 / Unit 3
Internet Applications
172
se
Module 3 / Unit 4
WAN Technologies
211
y
nl
Module 3 / Unit 5
Remote Access
225
Page v
2013 gtslearning
Table of Contents
227
Module 4 / Unit 1
Security Fundamentals
229
Module 4 / Unit 2
Security Appliances
254
al
Ev
tio
ua
279
se
Module 4 / Unit 4
Installing Wireless Networks
296
y
nl
Module 4 / Summary
Network Security
Page vi
2013 gtslearning
Table of Contents
317
319
328
Ev
ua
al
352
tio
Module 5 / Unit 4
Monitoring and Management Tools
363
Module 5 / Unit 5
Network Troubleshooting
se
Module 5 / Summary
Management, Monitoring, Troubleshooting
Index
y
nl
419
Page vii
2013 gtslearning
al
Ev
ua
CompTIA website
tio
You should have the following skills and experience prior to attending the
course:
Taken and passed both CompTIA A+ Certification exams or have
equivalent knowledge and experience.
Course Outcomes
se
Optionally, you can take a prerequisites test to check that you have the
knowledge required to study this course at the gtslearning Freestyle site
accompanying this study guide (see below for details on registering).
This practical "hands-on" course will teach you the fundamental principles of
installing and supporting networks. On course completion, you will be able to:
2013 gtslearning
y
nl
Page viii
Describe the features of different network protocols and products for LANs,
WANs, and wireless networks.
tio
ua
al
Ev
Benefits of certification
se
y
nl
Indeed, CompTIA Network+ is the first step in starting a networking career, and
is recognized by Microsoft as part of their MS program. Other corporations,
such as Novell, Cisco and HP also recognize CompTIA Network+ as part of
their certification tracks.
Completing this course will help you to pursue a career in network support, in
job roles such as network administrator, network technician, network installer,
help desk technician and IT cable installer.
CompTIA offers a number of credentials that form a foundation for your career
in technology and allow you to pursue specific areas of concentration.
Depending on the path you choose to take, CompTIA certifications help you
build upon your skills and knowledge, supporting learning throughout your
entire career.
Page ix
2013 gtslearning
Study of the course can also help to prepare you for vendor-specific technical
support qualifications and act as groundwork for more advanced training.
Other qualifications available include:
Cisco Certified Network Associate (CCNA) - a foundation-level
certification of competency in Cisco networking appliance installation and
configuration.
tio
ua
al
Ev
se
U
Corporations such as Novell, Cisco, and HP also recognize CompTIA
Network+ as part of their certification tracks.
Help Desk Support Analyst - The Help Desk Analyst certification series,
administered by the Help Desk Institute (www.thinkhdi.com), certifies
learners' customer service and Help Desk management skills. Various
levels of certification are available, including Customer Support Specialist,
Help Desk Analyst and Help Desk Manager.
y
nl
Page x
2013 gtslearning
Ev
The course comes in two parts. This "Study Notes" volume contains the main
text of the course for you to refer to in class and to review at home as you
prepare for the exam. The course text is divided into several modules, each
covering a different subject area. Each module is split into a series of units
containing related topics for study. Each unit has a set of review questions
designed to test your knowledge of the topics covered in the unit.
al
At the back of the "Study Notes" volume there is an index to help you look up
key terms and concepts from the course.
tio
ua
The accompanying "Labs and References" book contains a list of the CompTIA
certification objectives (and where in the study notes you can find useful
material to prepare for each objective), tips for taking the CompTIA exams, the
practical labs for you to complete in class, answers to the end of unit review
questions, and a glossary of terms and concepts used in computer support.
se
Professor Messer has long been a web hero for CompTIA certification
students. With professionally-produced lessons covering the full exam
objectives and online forums, Professor Messer is a trusted online source for
exam information. Professor Messer uses gtslearning's CompTIA certification
courseware to develop and record his popular video training sessions. Now
you can easily follow along with his video presentations using the links
provided in this course book. You can use the links in three ways:
y
nl
1) If you have an ebook, just click the link to open the video
in your browser.
Page xi
2013 gtslearning
File and command selection - in the labs, files, applets, dialogs and other
information that is displayed on the screen by the computer is shown in
sans serif bold. For example: Click OK, Select Control Panel, and so on.
ua
al
Ev
Using the mouse - when instructed to click, use the main mouse button;
when instructed to alt-click, use the secondary button (that is, the button on
the right-hand side of the mouse, assuming right-handed use). Sometimes
you need to use both the keyboard and the mouse - for example,
Ctrl+click means hold down the Ctrl key and click the main mouse
button.
tio
Icon
se
The following symbols are used to indicate different features in the course
book:
Meaning
y
nl
ua
al
Ev
Get tests and practice exams to accompany the course at gtslearning's Freestyle site
tio
n
se
U
y
nl
O
Creating an account
3) Complete the sign-up process. You will need to validate the account using
your email address.
4) When you have validated your account, open gtsgo.to/nu4g8 and log in if
necessary.
5) Enter your enrollment key to get access to the course resources.
Page xiii
2013 gtslearning
al
Ev
tio
ua
se
This training material can help you prepare for and pass a related CompTIA
certification exam or exams. In order to achieve CompTIA certification, you
must register for and pass a CompTIA certification exam or exams. In order to
become CompTIA certified, you must:
1) Review the certification objectives at
certification.comptia.org/Training/testingcenters/examobjectives.aspx to
make sure you know what is covered in the exam.
y
nl
2) After you have studied for the certification, take a free assessment and
sample test from CompTIA at
certification.comptia.org/Training/testingcenters/samplequestions.aspx to
get an idea what type of questions might be on the exam. You can also use
gtslearning's free practice tests on Freestyle (gtsgo.to/nu4g8).
3) Purchase an exam voucher on the CompTIA Marketplace, which is located
at www.comptiastore.com.
4) Select a certification exam provider and schedule a time to take your exam.
You can find exam providers at
certification.comptia.org/Training/testingcenters.aspx
Page xiv
2013 gtslearning
Weighting
21%
23%
17%
20%
19%
al
Ev
Domain Objectives/Examples
1.1 Compare the layers of the OSI and TCP/IP models.
OSI model (Layer 1 - Physical, Layer 2 - Data link, Layer 3 Network, Layer 4 - Transport, Layer 5 - Session, Layer 6 Presentation, Layer 7 - Application) TCP/IP model
(Network Interface / Link Layer, Internet Layer, Transport
Layer, Application Layer
1.2 Classify how applications, devices, and protocols
relate to the OSI model layers.
MAC address IP address EUI-64 Frames Packets
Switch Router Multilayer switch Hub Encryption
devices Cable NIC Bridge
1.6 Explain the function of common networking
protocols.
TCP/IP suite
3.5 Describe different network topologies.
Point to point Point to multipoint Ring Star Mesh Bus
Peer-to-peer Client-server Hybrid
Unit 1.2 3.1 Categorize standard media types and associated
Cabling and properties.
Connectors Fiber (Multimode, Single mode) Copper (UTP, STP, CAT3,
CAT5, CAT5e, CAT6, CAT6a, Coaxial) Media converters
(Single mode fiber to Ethernet, Multimode fiber to Ethernet,
Fiber to Coaxial, Single mode to multimode fiber) Distance
limitations and speed limitations
3.2 Categorize standard connector types based on
network media.
Fiber (ST, SC, LC, MT-RJ) Copper (RJ-45, RJ-11, BNC, Fconnector, DB-9 [RS-232])
tio
ua
Refer To
Unit 1.1
Topologies
and the OSI
Model
se
y
nl
O
Page 1
2013 gtslearning
Module 1 / Unit 4
Module 1 / Unit 4
Hubs
Bridges
al
Ev
Switches
tio
ua
Hubs and bridges are no longer widely deployed as standalone appliances but
as their role has been taken on by more advanced devices (such as Ethernet
switches) it is important to understand what basic functions they provide.
se
Hubs
Hubs are the central point of connection for Ethernet segments configured in a
star topology. Hubs act like a repeater so that every segment receives signals
sent from any other segment. Hubs are also known as multiport repeaters (or
concentrators). They work at the Physical layer of the OSI model.
y
nl
Page 70
2013 gtslearning
Bridges
A bridge is a device that provides communications between two or more
segments. Workstations on one segment are able to communicate with those
on another segment via the bridge. Like a repeater, a bridge extends the
maximum distance of network, but it may also be used to segment the network
and reduce traffic.
Ev
ua
al
Features of Bridges
tio
A network designer should try to follow the 80:20 rule, which states
that a well-designed network will keep 80% of traffic local (on the
same segment), with only the remaining 20% of traffic needing to
pass to another segment. They need to ensure clients (resource
users) and their associated servers (resource providers) are placed
on the same segment whenever possible.
Bridges work at the data link layer since they need to understand the MAC
addresses within frames.
Most bridges are only able to link segments of the same type (for example,
Ethernet to Ethernet).
Bridges can be used to link different cable types (such as coax and twisted
pair).
se
y
nl
Page 71
2013 gtslearning
Module 1 / Unit 4
Bridge Operation
A bridge works in the following manner.
1) Computer A sends a signal to computer D. Note that the frame contains a
source hardware address of MA and a destination hardware address of MD.
2) The bridge listens to all traffic on all attached segments (this is known as
promiscuous mode) and consequently it receives the signal at port 1.
Ev
3) The bridge reads the destination in the frame and, using its port address
table, determines the port to which the network card with hardware address
MD is attached. The bridge is able to locate the hardware address MD in its
port:MAC address table and transmits the signal out of port 2 only.
tio
ua
al
se
U
Bridge operation
y
nl
An Ethernet bridge builds the port address table in memory. When the bridge
is initialized, the bridging table is empty but information is constantly added as
the bridge listens to the connected segments. The bridge can enter a particular
hardware address against a port number in the bridging table by examining the
source hardware address on frames and noting the port that received the
frame. Entries are flushed out of the table after a period to ensure the
information remains current.
Page 72
2013 gtslearning
Switches
Ethernet networks implemented with a bus or hubs rely on a contention-based
technology for accessing the network. Devices can only transmit on the
network when it is free. These opportunities become less frequent as more
devices are added to the network and the probability of collisions increases.
Ev
al
ua
tio
Switch Operation
An Ethernet (or LAN) switch performs the same sort of function as a bridge but
can provide many more ports (bridges only came with up to 4 ports). Each port
is a separate collision domain. In effect, the switch establishes a point-topoint link between any two network nodes. This is referred to as
microsegmentation. The basic mode of operation for a switch is referred to
as "store and forward". This works as follows:
se
2) The switch receives the frame into a port buffer and obtains the destination
MAC address from the Ethernet frame. The port buffer holds frames until
they can be processed. The switch can also perform error checking on the
frame using the CRC.
3) The switch uses its MAC address table to look up the port connected to the
destination MAC address.
y
nl
4) The switch uses its high speed backplane to send the frame out on port 3
for computer B to receive (creating a temporary virtual circuit).
5) None of the other connected devices (such as, computer C) see any
activity on the network while this process takes place. Therefore, these
other devices are able to transmit and receive at the same time.
Page 73
2013 gtslearning
Module 1 / Unit 4
tio
ua
al
Ev
Switch operation
se
As with a bridge though, traffic on all switch ports is in the same broadcast
domain, unless the switch is configured to use VLANs (see below).
y
nl
There are many types of switches other than Ethernet switches (or
"basic switches"). Some are used to implement WANs (ATM and
SONET switching for instance) and some are used to forward
traffic at OSI layers 3 and above. The functions of these "multilayer
switches" are covered in Unit 5.4.
If a MAC address cannot be found in the MAC address table then the switch
acts like a hub and transmits the frame out of all the ports (except for the
incoming port). This is referred to as flooding. The switch builds the MAC
address table by analyzing incoming frames for a source MAC address. It can
then add a MAC address entry against the particular port number.
Entries remain in the MAC address table for a period before being flushed.
This ensures problems are not encountered when network cards (MAC
addresses) are changed.
Page 74
2013 gtslearning
Switch Models
tio
ua
al
Ev
se
U
y
nl
The market is dominated by Cisco's Catalyst series (over 70% of sales by port)
but other notable vendors include HP (ProCurve), Nortel, Foundry, and 3Com.
29
Standalone switches can be connected together using uplink ports but this solution does not
scale well. The uplink port may run at the same speed as the standard ports or there may be an
option to use fiber optic (GBIC / SFP) connections.
Page 75
2013 gtslearning
Module 1 / Unit 4
Configuring a Switch
Some switches do not offer any configuration options or interface. These are
known as unmanaged switches. You just have to plug them in and they
operate automatically. These switches are usually inexpensive and are
intended only for home or small office use.
al
Ev
ua
tio
Autonegotiation
se
y
nl
Page 76
2013 gtslearning
ua
al
Ev
Configuring port settings on a Dell switch
tio
Diagnostics
se
U
y
nl
O
Diagnostic information on a Netgear switch
Page 77
2013 gtslearning
Module 1 / Unit 4
Ev
MAC filtering means specifying which MAC addresses are allowed to connect
to a particular port. This can be done by specifying a list of valid MAC
addresses but this "static" method is difficult to keep up-to-date and relatively
error-prone. Some switch models allow you to specify a maximum number of
permitted addresses and automatically learn a set number of valid MAC
addresses. For example, if port security is enabled with a maximum of two
MAC addresses, the switch will record the first two MACs to connect to that
port but then drop any traffic from machines with different network adapter IDs
that try to connect.
al
Port Mirroring
tio
ua
Unlike a hub, a switch forwards unicast traffic only to the specific port
connected to the intended host. This prevents sniffing of unicast traffic by hosts
attached to the same switch. There are circumstances in which capturing and
analyzing network traffic is legitimate activity however and port mirroring
provides the facility to do this. Port mirroring30 copies all packets sent to one or
more source ports to a mirror (or destination) port.
se
U
O
y
nl
Page 78
2013 gtslearning
30
Ev
al
ua
tio
Power can either be supplied over pairs 1/2 and 3/6 (referred to as Mode A or
"phantom power" as these are the ones also used for data in 10/100BASE) or
over 4/5 and 7/8 (Mode B). Gigabit Ethernet only uses the former method.
se
y
nl
31
Power is supplied as 350mA@48V and limited to 15.4W but the voltage drop over the maximum
100 feet of cable results in usable power of around 13W.
32 Various proprietary schemes were used between the ratification of 802.3af and 802.3at.
33
If an existing switch does not support PoE, a device called a power injector can be used.
Page 79
2013 gtslearning
Module 1 / Unit 4
al
Ev
ua
tio
se
U
Subnets and routing are covered in Module 2.
34
Page 80
2013 gtslearning
y
nl
VLAN
tio
ua
al
Ev
Configuring VLANs on a Dell switch using the web management interface
se
VLANs are defined by the IEEE 802.1Q standard. Cisco's proprietary InterSwitch Link (ISL) was once also widely used.
y
nl
Under 802.1Q, traffic is identified by a VLAN tag inserted in the Ethernet frame
between the Source Address and Ethertype fields. The tag contains
information about the VLAN ID (from 1 to 4094) and priority (used for Quality of
Service [QoS] functions). The Ethertype value is set to identify the frame as
802.1Q.
Page 81
36
Malware can "hop" between VLANs if it is able to exploit some configuration weakness.
2013 gtslearning
Module 1 / Unit 4
On a large network, one switch will not provide enough ports for all the hosts
that need to be connected to the network. This means that multiple switches
must be interconnected to build the network fabric. Multiple switches may also
be deployed to provide redundant links. The interconnections between
switches are referred to as trunks.
al
Ev
When VLANs are also configured on the switches, trunking means that a
VLAN can be configured across more than one switch device without having to
manually configure the VLANs on each device. The protocol governing this
data exchange would either be Cisco's VLAN Trunking Protocol (VTP) or
Generic Attribute Registration Protocol (GARP) VLAN Registration
Protocol (GVRP).
tio
ua
se
y
nl
Page 82
2013 gtslearning
Within each segment, each bridge then determines the bridge closest to the
root bridge and uses that bridge to forward frames to the root. It then blocks
ports connected to other non-forwarding bridges. Subsequently, bridges
exchange Topology Change Notifications if devices are added or removed,
enabling them to change the status of forwarding / blocked ports appropriately.
The following table shows the different states that a port can be in:
State
Forwards
Frames?
Learns
MACs?
Notes
Ev
No
No
Listening
No
No
Learning
No
Yes
ua
al
Blocking
Forwarding Yes
Yes
Disabled
No
No
tio
When all ports on all bridges are in forwarding or blocking states, the network
is converged. When the network is not converged, no communications can
take place. Under the original 802.1D standard, this made the network
unavailable for extended periods (10s of seconds) during configuration
changes. STP is now more likely to be implemented as 802.1D-2004 / 802.1w
or Rapid STP (RSTP). The rapid version creates outages of a few seconds or
less. In RSTP, the blocking, listening, and disabled states are aggregated into
a discarding state.
se
y
nl
O
Page 83
2013 gtslearning
Module 1 / Unit 4
Ev
ua
al
3) What is PoE?
Power over Ethernet - an IEEE specification for delivering power to
devices from switch ports over network cabling.
tio
se
y
nl
Page 84
2013 gtslearning
Index
Index
Where a term or phrase is abbreviated, the abbreviation is the form listed in
the index. Note that index references are made to the nearest main heading for
the topic in which the term appears.
Application Layer
Gateway ..................... 264
1000BASE ................... 56
Application Virtualization
................................... 356
Ev
1
100BASE ..................... 55
10BASE ....................... 54
10GBASE ............. 57, 196
110 Block ................... 335
Broadcast..............51, 106
Broadcast Domain .71, 80,
108
Broadcast Storm .........411
ARIN ............................. 29
al
ua
Asymmetric Encryption
................................... 283
Administrative Distance
................................... 139
ADSL.......................... 204
Agent.......................... 380
Analog .......................... 47
Analysis Engine.......... 274
ANSI............................. 35
ANSI/TIA/EIA 568 35, 328
Antenna Types ........... 299
Anti-replay .................. 230
Anti-spam ................... 270
Anti-Virus Software .... 235
Anycast ...................... 127
APIPA .................. 94, 118
Application Hardening 250
Application Layer.... 24, 28
AWG ............................. 33
Bandwidth..................... 48
Callback ......................221
CAM ..............................74
CAN ................................4
CARP ..........................370
CATV ..........................205
CERT ..........................236
Certificate Authority.....284
y
nl
Anomaly-based Detection
................................... 275
All-in-One Security
Appliance ................... 273
se
CA ...............................284
tio
Circuit-Level Firewall...264
Class (IP Addressing) ...92
Classful Addressing ....106
Client...............................7
Client-to-Site VPN .......215
Cloud ..........................190
Page 419
2013 gtslearning
Index
Compatibility
Requirements ............. 350
F-connector .................. 36
Configuration
Management ............... 319
Duplex .......................... 51
Ev
al
ua
CRC ........................ 20, 53
Fragmentation .............. 22
Frame ..................... 20, 52
CSMA ........................... 49
CSU/DSU ................... 343
dB Loss....................... 398
Deep Packet Inspection
.................................... 273
Default Gateway ........... 99
Default Ports ............... 157
Demarc ............... 334, 342
Encoding ...................... 48
Heuristics.................... 275
Environment Limitations
................................... 350
Hexadecimal............... 123
y
nl
Diagnostics ................... 77
Encapsulation .............. 17
2013 gtslearning
se
Page 420
Datagram ...................... 90
tio
tio
ua
al
Ev
se
U
y
nl
O
CompTIA Network+ Certification
Support Skills (Exam N10-005)
Labs and References
G523eng ver073
Acknowledgements
Course Developer............................................................ gtslearning
Editor ....................................................................... James Pengelly
This courseware is owned, published, and distributed by
gtslearning, the world's only specialist supplier of CompTIA
learning solutions.
www.gtslearning.com
al
Ev
sales@gtslearning.com
COPYRIGHT
ua
This courseware is copyrighted 2013 gtslearning. Product images are the copyright of the
vendor or manufacturer named in the caption and used by permission. No part of this courseware
or any training material supplied by the publisher to accompany the courseware may be copied,
photocopied, reproduced, or re-used in any form or by any means without permission in writing
tio
Every effort has been made to ensure complete and accurate information concerning the material
presented in this course. Neither the publisher nor its agents can be held legally responsible for
any mistakes in printing or for faulty instructions contained within this course. The publisher
appreciates receiving notice of any errors or misprints.
se
Information in this course is subject to change without notice. Companies, names, and data used
in examples herein are fictitious unless otherwise noted.
Where the course and all materials supplied for training are designed to familiarize the user with
the operation of software programs and computer devices, the publisher urges the user to review
the manuals provided by the product vendor regarding specific questions as to operation.
y
nl
consequential damages arising out of the use or the inability to use the contents of this course.
Warning
All gtslearning products are supplied on the basis of a single copy of a course per
student. Additional resources that may be made available from gtslearning may only be used in
conjunction with courses sold by gtslearning. No material changes to these resources are
permitted without express written permission from gtslearning. These resources may not be used
in conjunction with content from any other supplier.
If you suspect that this course has been copied or distributed illegally,
please telephone or email gtslearning.
Table of Contents
Table of Contents
CompTIA Network+ Exam Objectives
Ev
Exam Tips
Labs
ua
al
tio
134
se
Glossary
y
nl
O
Page iii
2013 gtslearning
n
tio
ua
al
Ev
se
U
y
nl
O
Ev
al
Weighting
21%
23%
ua
17%
20%
19%
tio
The following tables list where the domain objectives of the exam are covered
in this course.
Unit
Unit 1.1
Topologies and
the OSI Model
se
Domain Objectives/Examples
1.1 Compare the layers of the OSI and TCP/IP
models.
OSI model: (Layer 1 Physical, Layer 2 Data link,
Layer 3 Network, Layer 4 Transport, Layer 5
Session, Layer 6 Presentation, Layer 7 Application)
TCP/IP model (Network Interface / Link Layer,
Internet Layer, Transport Layer, Application Layer
1.2 Classify how applications, devices, and
protocols relate to the OSI model layers.
MAC address IP address EUI-64 Frames Packets
Switch Router Multilayer switch Hub Encryption
devices Cable NIC Bridge
1.3 Explain the purpose and properties of IP
addressing.
MAC address format
IPv4 vs. IPv6 (formatting)
y
nl
Unit 1.1
Topologies and
the OSI Model
Page 1
2013 gtslearning
ua
al
Ev
Domain Objectives/Examples
1.4 Explain the purpose and properties of routing
and switching.
Broadcast domain vs. collision domain
Spanning Tree Protocol VLAN (802.1q) Port
mirroring
EIGRP OSPF RIP Link state vs. distance vector vs.
hybrid Static vs. dynamic Routing metrics (Hop
counts, MTU, Bandwidth, Costs, Latency) Next hop
IGP vs. EGP Routing tables Convergence (steady
state)
1.5 Identify common TCP and UDP default ports.
SMTP 25 HTTP 80 HTTPS 443 FTP 20, 21
TELNET 23 IMAP4 143 RDP 3389 SSH
22 DNS 53 DHCP 67, 68
1.6 Explain the function of common networking
protocols.
TCP/IP suite
ARP
ICMP
DHCP NTP
tio
IGMP
TCP UDP
DNS
se
Unit
Unit 1.3 Ethernet
Page 2
2013 gtslearning
y
nl
Ev
Domain Objectives/Examples
2.1 Given a scenario, install and configure routers
and switches.
VLAN (trunking) Managed vs. unmanaged Interface
configurations (Full duplex, Half duplex, Port speeds,
MAC filtering) PoE Diagnostics VTP configuration
Port mirroring
Routing tables Interface configurations (IP
addressing)
NAT PAT Traffic filtering
QoS
al
tio
ua
Unit
Unit 1.4 Bridges
and Switches
se
y
nl
Page 3
2013 gtslearning
Ev
Domain Objectives/Examples
3.1 Categorize standard media types and
associated properties.
Fiber (Multimode, Single mode) Copper (UTP, STP,
CAT3, CAT5, CAT5e, CAT6, CAT6a, Coaxial) Media
converters (Single mode fiber to Ethernet, Multimode
fiber to Ethernet, Fiber to Coaxial, Single mode to
multimode fiber) Distance limitations and speed
limitations
Copper (Patch panel, 110 block [T568A, T568B])
Broadband over Powerline
tio
ua
al
Unit
Unit 1.2 Cabling
and Connectors
se
Page 4
2013 gtslearning
y
nl
Ev
tio
ua
al
Connectivity software
Unit
Unit 3.5 Remote
Access
Unit 4.2 Security
Appliances
Unit 5.4
Monitoring and
Management
Tools
Unit 5.2 Installing
Wired Networks
se
y
nl
Unit 5.4
Monitoring and
Management
Tools
Unit 5.1
Configuration
Management
Unit 5.4
Monitoring and
Management
Tools
Page 5
2013 gtslearning
al
Ev
Domain Objectives/Examples
5.1 Given a scenario, implement appropriate
wireless security measures.
Encryption protocols (WEP, WPA, WPA2, WPA
Enterprise) MAC address filtering Device placement
Signal strength
5.2 Explain the methods of network access
security.
Tunneling and encryption (SSL VPN, VPN, L2TP,
PPTP, IPsec, ISAKMP, TLS, TLS1.2, Site-to-site and
client-to-site) Remote access (RAS, PPPoE, PPP)
ACL (IP filtering, Port filtering)
ACL (MAC filtering)
Remote access (RDP, ICA, SSH)
ua
tio
Unit
Unit 4.4 Installing
Wireless
Networks
Unit 3.5 Remote
Access
se
2013 gtslearning
y
nl
Page 6
Exam Tips
Exam Tips
Use the following notes to prepare for and book the CompTIA certification
exam. Remember that you can use the practice exam available with this
course at gtslearning's Freestyle site (you will also need an enrollment key
from your training provider).
Ev
al
Arrive at the test center at least 15-30 minutes before the test is scheduled
(check your booking confirmation for details).
The test center administrator will demonstrate how to use the computerbased test system.
You must have two forms of ID - one with picture, both with signature,
preferably with your private address (driving license, passport, and so on).
Pens, pencils, and paper are not required! You must not attempt to write
down questions or remove anything from the exam room.
tio
ua
se
Read each question and its option answers carefully. Don't rush through
the exam as you'll probably have more time at the end than you expect.
At the other end of the scale, don't get "stuck" on a question and start to
panic. You can mark questions for review and come back to them.
As the exam tests your ability to recall facts and to apply them sensibly in a
troubleshooting scenario, there will be questions where you cannot recall
the correct answer from memory. Adopt the following strategy for dealing
with these questions:
y
nl
Page 7
2013 gtslearning
Exam Tips
Don't guess too soon! You must select not only a correct answer, but
the best answer. It is therefore important that you read all of the options
and not stop when you find an option that is correct. It may be
impractical compared to another answer.
Think your answer is wrong - should change it? Studies indicate that
when students change their answers they usually change them to the
wrong answer. If you were fairly certain you were correct the first time,
leave the answer as it is.
al
Ev
tio
ua
The exam may contain "unscored" questions, which may even be outside
the exam objectives. These questions do not count towards your score.
A score report will be generated and a copy printed for you by the test
administrator. The score report will show whether you have passed or
failed and your score in each section. Make sure you retain the report!
If 6 weeks have passed after ordering your certificate and you haven't
received it, contact questions@comptia.org
se
y
nl
If you do fail the certification test at the first attempt, then you can retake it at
your convenience. However, should you fail the test at the second, third, or
subsequent try, you will not be able to resit the exam for at least 30 days after
your last attempt. Study your score report to see which areas of the exam you
were weak on.
Page 8
2013 gtslearning
Labs
Labs
Application
Presentation
Session
Transport
Network
Data link
Physical
tio
ua
al
Ev
In this exercise you will work either in groups or as a class to match the
following list of network components and descriptions to the correct layer of the
OSI model.
Component or Description
Layer
4
Bridges
Cable
se
Compression
Database services
Directory services
Encryption
File Transfer
y
nl
Page 9
2013 gtslearning
Labs
Component or Description
Layer
3
Network medium
Routers
Switching
tio
ua
al
Ev
se
U
y
nl
Page 10
2013 gtslearning
Labs
Ev
al
3) Click the arrow symbol beside Network adapters to expand the Network
Adapter Subtree.
4) What is the name of your network card?
ua
__________________________________________________
5) Alt-click your network card and select Properties.
tio
6) Click the Driver tab and record the following information (you may need to
use the Driver Details button too):
Provider: _________________________________
Version: __________________________________
Date: ____________________________________
se
8) Look for the link speed and duplex configuration option - what is it set to?
__________________________________________________
y
nl
9) Does the adapter support advanced features, such as WoL ("wake up") or
ToE (offload)?
__________________________________________________
10) Click Cancel to the Properties dialog.
11) Select View > Show hidden devices.
Page 11
2013 gtslearning
Labs
The adapter list should refresh to show a number of other adapters, mostly
used for remote tunneling protocols (WAN Miniport) or IPv6 tunneling
(ISATAP).
12) Close Device Manager.
tio
ua
al
Ev
se
U
y
nl
Page 12
2013 gtslearning
Labs
Ev
tio
ua
al
se
U
You have 5 VMs:
y
nl
VirtualBox console
Labs
Ev
tio
ua
al
se
U
Configuring VM storage options
This tab allows you to add hard drives to the VM and to use disc images
(ISOs) in the optical drive (or share the HOST's drive).
Page 14
2013 gtslearning
y
nl
5) Click the CD icon and browse for the ISO file for "Windows XP
Professional".
Labs
ua
al
Ev
Configuring network options
tio
Selecting Internal network means that the VM can "see" only other
VMs installed on the host. The VirtualBox software creates a switch (or
a hub) for the VMs to connect to. The VMs can be put on separate
networks by giving the networks names, much like a Virtual LAN
(VLAN). The CLIENT VM is on a network named "lan".
se
You can also "install" additional adapters in a VM. This is an option we will
use later in the labs.
7) Click OK.
y
nl
A snapshot is an image of the VM's disk at a particular point. You can use
snapshots to discard the changes in a particular lab.
Page 15
2013 gtslearning
Labs
Ev
Configuring snapshots
al
ua
tio
n
U
se
The same user name and password combo is used to log on to all the
other VMs.
13) On the VM window, click the Machine menu. You can configure some
settings here (though you cannot change the installed hardware without
shutting down the VM).
y
nl
15) In the VirtualBox Manager, alt-click the Initial Config snapshot and select
Restore Snapshot.
16) Uncheck Create a snapshot of the current machine and click Restore.
During the labs you will use the Ubuntu Server Linux distribution. This is
operated at a command prompt with no GUI.
17) Double-click the LAMP VM. When the computer has booted, a "lamp login"
prompt will be displayed.
Page 16
2013 gtslearning
Labs
Ev
al
ua
You do not have to enter the password every time you use sudo.
The password gets cached for a few minutes.
tio
22) When the VM has shut down, restore its Initial Config snapshot.
se
U
y
nl
O
Page 17
2013 gtslearning
Labs
Ev
CLIENT
IP: 10.1.0.__ /24
MAC: _____________
1
SWITCH
"LAN"
ua
al
1
2
tio
GATEWAY
IP: 10.1.0.254 /24
MAC: _____________
Windows network
se
The ARP cache table contains entries for hosts that have been contacted
recently (the cache is cleared every few minutes). This reduces the frequency
of ARP broadcasts.
y
nl
This displays the ARP cache table. The only entries should be for the
network broadcast address (10.1.0.255) used to address every machine on
the local network and multicast addresses (starting 224) used by Windows'
network discovery protocols.
Remember that the VM is set to use the Windows VMs' local network and
there are no other machines on that network yet so it is not surprising that
there are no host addresses yet.
Page 18
2013 gtslearning
Labs
on the Desktop.
in
tio
ua
al
Ev
2) When the program has loaded, click the Capture Options button
the toolbar.
se
U
Wireshark capture options
3) Ensure that the adapter is set to the Intel PRO/1000 (this is the virtual
adapter driver used by VM) and that Capture packets in promiscuous
mode is checked.
y
nl
4) Click Start.
6) Watch the packet capture window while the SERVER VM boots. You won't
see any activity at first but eventually you should see some ARP activity
followed by various different types of frames.
7) Click the AutoScroll button to turn off autoscrolling then scroll to the top of
the capture.
Page 19
2013 gtslearning
Labs
You should be able to see quite clearly the results of two ARP sessions.
The first is the SERVER machine checking whether anyone owns its IP
address (10.1.0.1); there is no reply to this broadcast, as SERVER
owns the IP address 10.1.0.1
tio
ua
al
Ev
se
U
O
y
nl
8) Click each ARP frame in the top pane and expand the frame analysis in the
second pane.
Note that the frame (data link layer) simply contains source and destination
MAC addresses (note that some frames use the broadcast address) and a
protocol type field (ARP) plus a checksum (part of the trailer, which also
ensures that the frame is at least the minimum length). Note that Wireshark
decodes the OUI and that you can expand the MAC fields to decode the
multicast/broadcast bit and locally administered bit.
The ARP headers (layer 2.5 or 3-ish) contain similar information plus the
sender and target IP addresses. ARP is a very simple protocol. IP and
higher level packets often contain many more headers.
Page 20
2013 gtslearning
Labs
Also note the bottom frame. This contains the raw data in hexadecimal
format (the computers receive it as a series of 1s and 0s. When you select
information in pane 2, the relevant hex digits are selected here (and vice
versa).
9) Turn autoscrolling back on.
10) When SERVER has finished booting, press Right-Ctrl+Delete to open
the log on dialog.
Ev
al
13) When the server share has opened, switch back to SERVER and click
Stop
ua
tio
14) Click one of the SMB frames - note that additional layers of protocols are
shown in the frame analysis pane. SMB (the protocol used for file sharing
on Windows networks) makes more use of the upper network layers than
ARP (IP for logical addressing at the network layer, TCP at the transport
layer, NetBIOS at the session layer, and SMB itself to exchange the
application data).
One of the most useful options in packet analysis software is the one to
filter by different criteria. You may have noticed in the Capture Options
dialog that there was a capture filter option (to only record packets that
match the filter in the first place).
se
You can also apply filters to the captured data. You can construct complex
filter criteria by building an expression or by alt-clicking in the frame
analysis pane.
15) Select the first ARP frame and in the second pane, alt-click Address
Resolution Protocol then select Apply as Filter > Selected.
y
nl
The frames panel now shows only ARP traffic. Note the filter expression
"arp" has been added to the filter panel and that the panel is highlighted
green to show that a filter is in effect.
Page 21
2013 gtslearning
Labs
ua
al
Ev
Applying a filter
tio
17) Start another packet capture. When you are prompted to save the packet
capture, click Continue without Saving.
18) Boot the CLIENT VM. What do you notice that is different about the packet
capture?
se
20) Close Wireshark. When you are prompted to save the packet capture, click
Quit without Saving.
y
nl
In this exercise, you will investigate some of the problems that can be caused
by an incorrect MAC address.
1) Still on the GATEWAY VM, switch back to the command prompt and repeat
the arp -a command (you can press the Up arrow key to select from
previously issued commands).
2) Are there any entries? How do you explain this?
Page 22
2013 gtslearning
__________________________________________________
Labs
Ev
7) From the Start menu, select Run then type cmd and press Enter to open
a command prompt.
8) In the command prompt, check the ARP cache and note the result below:
__________________________________________________
al
ua
10) Open Explorer and enter \\SERVER\admin$ in the address bar. What
happens?
tio
__________________________________________________
11) Try \\10.1.0.1\admin$ in the address bar - does this work?
__________________________________________________
12) What do you notice about the captured frames?
__________________________________________________
13) View the ARP cache again. What do you notice about the entry?
se
__________________________________________________
__________________________________________________
y
nl
Page 23
2013 gtslearning
Labs
Ev
4) Repeat to close the SERVER and GATEWAY VMs and restore their
snapshots.
tio
ua
al
se
U
y
nl
Page 24
2013 gtslearning
Glossary
Glossary
10xBASE
The Ethernet-type networks can be subdivided into several types of network. The IEEE
802.3 standard uses the following notation to indicate Ethernet type: x-BASE-y, where
"x" indicates the data rate (in Mbps), "BASE" denotes that baseband transmission is
used and "y" either describes the maximum media distance or the cable type. More
recent standards define gigabit (1000BASE-Y) and 10 Gigabit (10GBASE-Y) speeds.
Ev
110 Block
Punch-down cross-connect format offering high density (supporting up to 300 pairs). 110
wiring blocks are used for various applications. The 110 IDC format is used in most
patch panels and wall jacks.
al
25-pair / 100-pair
Data cabling has four pairs within a single jacket. Telephone cabling often uses bundles
of color-coded 25-pair cables. These are generally unsuitable for data applications
because of excessive crosstalk.
tio
ua
568A / 568B
Termination standards defined in the ANSI / TIA / EIA 568 Commercial Building
Telecommunications Standards. 568A is mandated by the US government and for US
residential wiring but the only commercial rule is not to mix the two on the same network.
Wiring a cable with both 568A and 568B termination creates a crossover cable.
66 Block
Punch-down cross-connect used to terminate telephone wiring. Each 66 block can
terminate a single 25-pair cable.
802 Protocols
The 802 standards, published by the LAN / MAN Standards Committee of the Institute of
Electrical and Electronics Engineers (IEEE), define technologies working at the physical
and data link layers of the OSI model. These layers are subdivided into two sub-layers.
The Logical Link Control (LLC) sub-layer is used with other 802 protocols, such as 802.3
and 802.11, which are conceived as operating at a Media Access Control (MAC) sublayer and the physical (PHY) layer.
se
802.1X
Port authentication framework that requires the device to authenticate before it is
granted access to the network. 802.1X defines how devices should provide support for
Extensible Authentication Protocol (EAP).
Access Point
See: Wireless Access Point.
ADSL
See: DSL.
y
nl
Antenna
Different types of antenna can be used to focus a signal to a particular point or more
widely (omnidirectional). Many wireless devices use a simple rod-type antenna.
Glossary
Ev
al
tio
ua
Authentication
Identifying a user on a network. Authentication allows the network administrator to
control access to the network and (with some sort of rights system [authorization]) to
particular resources on the network (directories, printers, configuration, and so on).
Standard authentication consists of a user name and password (a logon). Secure
authentication requires that transmission of the logon be encrypted.
se
Backbone
A backbone is a fast link that connects the various segments of a network.
y
nl
Backup
Recovery of data can be provided through the use of a backup system. Most backup
systems provide support for tape devices. This provides a reasonably reliable and quick
mechanism for copying critical data. Backups take place under a schedule of tape
rotation, which allows for optimum efficiency of backup and restore operations and for
storage of media offsite.
Bandwidth
Bandwidth is the range of frequencies supported by a particular media type and more
generally the maximum data rate supported by a link.
Bandwidth Shaper
See: Traffic Shaping.
Baseband
Baseband transmission uses the complete bandwidth of the media as a single
transmission path. LAN signaling normally uses this transmission method and it is also
more reliable than the broadband method.
Page 154
2013 gtslearning