You are on page 1of 10

Trexp Computer Professionals

ebooks resource center [NETWORK PLUS EXAM CRAM FOR TO GO EXAM WRITING]

Trexp Computer Professionals int’l Zambia


Plot No 520 kafubu Road 217 area
Box 80689
Livingstone Zambia
Email:trexppcrepairs@gmail.com
Cell:+260979379198
+260955379198

UDP NOTES AND MORE NETWORK


PLUS STUFF IN SUMMARY FORM
READY FOR AN EXAM CONSIDER THIS.
- UDP (User Datagram Protocol) is a communications protocol that offers a limited
amount of service when messages are exchanged between computers in a network that uses the
Internet Protocol (IP). UDP is an alternative to the Transmission Control Protocol (TCP) and,
together with IP, is sometimes referred to as UDP/IP. Like the Transmission Control Protocol,
UDP uses the Internet Protocol to actually get a data unit (called a datagram) from one computer
to another. Unlike TCP, however, UDP does not provide the service of dividing a message into
packets (datagrams) and reassembling it at the other end. Specifically, UDP doesn't provide
sequencing of the packets that the data arrives in. This means that the application program that
uses UDP must be able to make sure that the entire message has arrived and is in the right order.
Network applications that want to save processing time because they have very small data units
to exchange (and therefore very little message reassembling to do) may prefer UDP to TCP. The
Trivial File Transfer Protocol (TFTP) uses UDP instead of TCP.

UDP provides two services not provided by the IP layer. It provides port numbers to help
distinguish different user requests and, optionally, a checksum capability to verify that the data
arrived intact.

In the Open Systems Interconnection (OSI) communication model, UDP, like TCP, is in layer 4,
the Transport Layer.

NETWORK+EXAM NOTES

Network+ Cram Notes & Guide


Trexp Computer Professionals
ebooks resource center [NETWORK PLUS EXAM CRAM FOR TO GO EXAM WRITING]

Welcome to Network+ Cram Notes! This brief guide should assist you in your path to Network+ certification, offering
insight into the kind of key points frequently tested on the exam. Many obscure facts show up time and time again,
and though they will seldom be found useful “in real life,” CompTIA continues to test on these points. Therefore, you
should have a strong, working knowledge of the information in this Sneak Peek guide; the information in here can be
considered as a “cram” guide and not a complete study guide, so it is still recommended that you read our study guide
before reading this Sneak Peek.

The best way to utilize these Network+ cram notes is to read it several times, especially right before the exam itself. It
is definite that you will find questions on the exam that cover points found only in the cram notes, so make sure you
can understand and comprehend each individual point – it could be the one that makes the difference between a
passing and failing score (but let’s hope not).

Topologies

 Associate easy management, centralization, and Ethernet (802.3) with the Star topology (each node has a
media connection to a hub).

 Associate fail/chokepoints, terminating ends (terminators), and tokens with the Token Bus and Token Ring
topologies.

 Remember that the Mesh topology provides the most redundancy because every node has a direct

connection to every other node. Ad-hoc mode in Wireless networks features this kind of topology, though it is not
physical per se.

 Another name for a Mesh network is a "peer-to-peer network;" this terminology is not exclusive to file
sharing, either.

 10Base2 is usually a kind of Token Bus network, while 10BaseT is usually in the form of a Star network.

 On Token networks, data is passed from each node physically connected between two communicating

hosts. Therefore, a break in a token bus or ring network could lead to total network failure. In comparison, a
break in a Star network media would only lead to the lack of availability of the host connected to the hub.

[edit section] Media

 Plenum grade cabling provides protection from the elements, and in particular, fire. Non-plenum-cabling (i.e.

most cabling) does not provide such protection. Plenum cabling is usually employed in places where the risk of
fire hazard is more common, such as the ceiling or between stories in a building. It is also used in mission-critical
applications.
Trexp Computer Professionals
ebooks resource center [NETWORK PLUS EXAM CRAM FOR TO GO EXAM WRITING]

 Normal 10/100/1000BaseT or TX cable has a maximum length of 100 meters, but this can be extended with
the use of a powered hub or a simple repeater.

 EMI : Electromagnetic interference also called RFI, can be radiated or conducted. It is any electromagnetic
energy released by an electronic device that disrupts the operation or performance of another device. EMI is
produced by many sources commonly found in an office environment, including fluorescent lights, photocopiers,
and motors such as those used in elevators. EMI is also produced by natural atmospheric or solar activity, which
can interfere with satellites, GPS devices and radio transmissions. Fiber optic cabling does not experience EMI
because fiber optic cabling uses light rather than electrical current to send a signal.

 Category 5 UTP cable

 "Patch" cable is used to connect a node to a router, switch or hub.

 Crossover, or XO, cables allow for a direct node-to-node connection without the use of a hub or
switch, or are used to connect two hubs or switches that don't have specific ports for that function.

 XO and patch cables look similar, but the RJ45 patch cable plug has wires in the same order at
both ends, whereas an XO cable has the wires on pins 1,2 and 3,6 swapped. When looking at the RJ45
from the top (so that your looking at the gold contacts, not the plastic tab or the end), pin 1 is on the left.

[edit section] Equipment

 Modems are typically designated V.XX, and most modern modems are V.90 or higher

 Active hubs (powered) act as repeaters, strengthening signal "on the wire" so the signal can travel farther.
Passive hubs are not powered and cannot strengthen a signal.

 Servers provide resources such as applications, printer access, etc. for users via workstations or PC's.

 Static routing requires the most administrative overhead because administrators must constantly update the
routing tables. Dynamic routing is done at the switch or route, and requires no intervention from the
administrator.

 Every NIC has a unique physical MAC address.

 Modems, CSU/DSUs and network cards have hardware loopback capability for testing purposes.
Trexp Computer Professionals
ebooks resource center [NETWORK PLUS EXAM CRAM FOR TO GO EXAM WRITING]

[edit section] TCP/IP and Related Technologies

 Remember your common ports!

 Trojan horses (backdoors) tend to use uncommon, high-range TCP/UDP ports like TCP 27374 or
UDP 12345. An open connection to such a port usually indicates that a Trojan horse or backdoor is
connected through that port.

 Port numbers are specific to their respective protocols; for example, TCP and UDP port 21 offer
different services on many servers.

 If a service isn't working and the server is behind a NAT, it is likely that the NAT is blocking
requests on the service port.

 IPv4 addresses are 32 bits, or four 8-bit octets, in the form X.X.X.X. IPv6 addresses are 128 bits and utilize
hexadecimal numbering.


 Subnets allow a single physical network segment to be sub-networked into multiple logical network
segments. For example, a subnet mask of 255.255.255.128 could create two subnetworks, one from 192.168.1.0
to 192.168.1.127 and the other from 192.168.1.128 to 192.168.1.255. In other words, Subnetting changes the
configuration of an IP network so that it treats the node and network number differently.

 A private IP address is used only within a LAN. It cannot be used to identify a unique node on the wider

Internet or WAN. A public IP address can be used to identify such a node. In many network setups, private IP
addresses are employed “behind the NAT” while the gateway connected to the NAT owns the public IP address
for the whole network.

 ARP maps Layer 3 Network IP addresses to Layer 2 Data Link MAC addresses. RARP does the opposite.

 To establish a connection to or from a specific service or server (file, web, etc.), a “port” for communication
must be opened on the server so that outside nodes can connect and communicate with the server. For
example, suppose you add HTTP over SSL (HTTPS) capacity to an existing, working web server, and your
clients can not connect via HTTPS. The port for communication (TCP 443) is probably being blocked by your
router to the Internet or some other firewall.
Trexp Computer Professionals
ebooks resource center [NETWORK PLUS EXAM CRAM FOR TO GO EXAM WRITING]

 The DHCP service allows for automatic IP address and IP information assignment to Windows, Mac and
Unix clients. Without a DHCP server, you would need to manually configure the IP address information on each
node.

 UDP and IP are connectionless protocols. TCP is connection-oriented.

 The broadcast address for a node to send a packet to all other nodes on the network is 255.255.255.255.

[edit section] Tools

 Wire media testers test the integrity of media that utilize electronic signal. Optical media testers (fiber
media testers) test the integrity of media that uses an optical signal.

 Crimpers are used to crimp (attach) connectors to media, such as a standard RJ-45 connector to CAT5
ethernet cabling.

 Loopback testing refers to the testing of the output of a network device, such as a NIC or modem.

 Punch-down tools are used to attach media to outlets or patch panels.

 A Reflectometer is used to find kinks (breaks) in media.

 Tone generators are used to identify media by tone as well as verify the integrity of a connection.

[edit section] WAN

 High-speed WAN connections that use fiber-optic cabling are least vulnerable to "vampire" tapping (packet
sniffing) and are secure.

 An ISDN BRI connection has two 64 Kbps "B" channels for a total connection speed of 128 Kbps.

 An ISDN PRI has a throughput of 1.5 Mbps.

 The IANA determines the ownership and usage of Public Network (Internet) IP addresses.

 POTS, or dialup, utilizes a modem for an easily available, affordable, but slow connection to the Internet.
Trexp Computer Professionals
ebooks resource center [NETWORK PLUS EXAM CRAM FOR TO GO EXAM WRITING]

[edit section] Redundancy and Fault Tolerance

 Fault tolerance refers to the ability of the network/system to maintain availability and service even when
some components of the network fail.

 Redundancy can come in the form of multiple servers performing the same function. A redundant email
system might feature two servers both running the same email software so if one fails, the other remains running.

 RAID is used to ensure redundancy and fault tolerance. RAID 0 provides disk striping, RAID 1 provides disk
mirroring and fault tolerance, and RAID 5 provides disk striping with parity.

 Disk striping allows a disk drive to span across multiple physical or logical disks for increased performance
however offers no additional fault protection, actually lowers fault tolerance level.

 Disk mirroring allows for a disk drive to have an exact replica in the form of another logical or physical disk
drive.

[edit section] Remote Access and Tunneling

 Kerberos is a security suite that utilizes “tickets” for authentication. It is best known for its role in UNIX
authentication though it is oftentimes used in Windows-based authentication these days as well.

 PPP is used in the majority of home dial-up connections as it provides easy remote access over TCP/IP,
which allows for home access to the resources of the Internet.

 PPTP is a tunneling version of PPP.

 IPSec is a standardized framework for securing Internet Protocol (IP) communications by encrypting and/or
authenticating each IP packet in the data stream. It is a Network layer feature that allows for encryption between
remote hosts. It is used in L2TP. IPsec is an obligatory part of IPv6, and is optional for use with IPv4.

 SSL, or Secure Sockets Layer, allows for the encryption of data between remote hosts on the Internet and is
commonly employed with HTTP, where it is known as HTTP over SSL with the common prefix “https”

[edit section] Operating Systems and Networking

 Remember that Microsoft Windows networking tends to support the TCP/IP suite as well as NetBIOS (and
therefore NetBEUI)

 Active Directory is Microsoft's version of LDAP

 Novell tends to support IPX/SPX, though they are moving away from this
Trexp Computer Professionals
ebooks resource center [NETWORK PLUS EXAM CRAM FOR TO GO EXAM WRITING]

 Nix operating systems (Unix and Linux) tend to support TCP/IP

 Unix operating systems support NetBIOS and the Windows Browser Service through an open source suite
known as SAMBA

 RAS is an almost Microsoft-exclusive remote access (dial-in networking) service

 Newer versions of Windows (including XP) have a built-in Firewall suite that mainly works to block traffic on
certain ports rather than analyze actual traffic

[edit section] Review Tables

Review Table: Media Information

Media Name Cable Type Max Length Speed Connector


10Base2 Coaxial 185m. 10 Mbps. BNC
10BaseT CAT 3+ Twisted pair 100 m. 10 Mbps RJ45
10BaseFL Fiber optic 2000 m. 10 Mbps ST
100BaseTX CAT5 Twisted pair 100 m. 100 Mbps RJ45
100BaseFX Fiber optic 2000 m. 100 Mbps ST or SC
1000BaseT AKA "Gigabit Ethernet" CAT5 Twisted pair 100 m. 1000 Mbps RJ45
X GBase (etc.) Fiber optic or laser 2000 - 5000 m. Variable SC

Review Table: OSI Model

Name of
Associate With Examples
Layer
1 Physical Media, topologies Repeaters or wires and cabling
2 Data Link 802.3 Ethernet, MAC sublayer, LLC Sublayer NIC, Switch, ARP protocol
3 Network Routing, Internetworking, Subnetting, connection-less IP protocol, router
4 Transport End-to-end connection, connection-oriented TCP protocol, tunneling
5 Session Connection management, quality of service Encrypted tunneling, Duplex
Translation from "networking" packets to computer- Encryption, compression, character
6 Presentation
understandable data conversion
Everything else, including most human applications and HTTP, FTP, POP3 protocols; database,
7 Application
readable formats flow control, etc.

Review Table: Frame Type Numbers

Standard
Association Examples Status
Number
Trexp Computer Professionals
ebooks resource center [NETWORK PLUS EXAM CRAM FOR TO GO EXAM WRITING]

802.1 Internetworking General standard that covers other ones Active


LLC (sub-layer of Layer 2 Data Acts as translator between higher-layer and physical
802.2 Inactive
Link) layer
Allows multiple access and automatic collision detection,
802.3 Ethernet CSMA/CD Active
key features of a standard Ethernet network
802.4 Token Bus LAN Defines standards for a token bus topology network Disbanded
802.5 Token Ring LAN Defines standards for a token ring topology network Inactive
MAN (Metropolitan Area Wide-scale network over a large metropolitan area,
802.6 Disbanded
Network) between LAN and WAN, limited geographically
802.7 Broadband technology Standards for WAN via high-speed broadband Disbanded
802.8 Fiber Optic technology Defines standards for connections via fiber optic media Disbanded
802.9 Voice and Data Standards for Voice over IP Disbanded
Largely unused standards defining network security
802.10 Security Disbanded
options
Wireless Local Area Network
(WLAN) Defines standards for connecting via wireless; includes
802.11 Active
802.11a, b, g, and now n

802.12 Demand Priority Working Group Communications over an HP designed network Disbanded
802.14 Cable Modem Working group Standards defining cable modem options Disbanded
Wireless Personal Area Network Standards defining local wireless network options -
802.15 Active
(WPAN) Working Group 802.15.1=Bluetooth 802.15.4=ZigBee
Broadband Wireless Access High speed, increased distance wireless options
802.16 Active
Working Group (WMAN) (WiMax)- 802.16e=Mobile
Resilient Packet Ring Working
802.17 Optical fiber network communications bandwidth Active
Group
Radio Regulatory Technical Group working with 802.11, .15, .16, .20, .21, .22
802.18 Active
Advisory Group standards
Coexistence Technical Advisory Group working with the coexistence of different networks
802.19 Active
Group in the same area without interfering with one another
Mobile Broadband Wireless
802.20 High speed wireless options Active
Access (MBWA) Working Group
Media Independent Handoff Working with handoffs/interoperability between wireless
802.21 Active
Working Group networks
Wireless Regional Area Working
802.22 Use unused TV frequencies for wireless networks Active
Group (WRAN)

Review Table: Common Port Numbers

Port Number Name and/or Use

TCP 20&21 FTP


Trexp Computer Professionals
ebooks resource center [NETWORK PLUS EXAM CRAM FOR TO GO EXAM WRITING]

TCP 22 SSH

TCP 23 Telnet

TCP 25 SMTP (Sendmail)

UDP 53 DNS

UDP 69 TFTP

TCP 80 HTTP

TCP 110 POP3

UDP 123 NTP

TCP 443 SSL

Review Table: IP Addressing

Type Range Default Subnet Reserved Range


Class A 1.0.0.0 - 126.254.254.254 255.0.0.0 10.0.0.0 - 10.254.254.254
Loopback 127.0.0.0 - 127.254.254.254 N/A 127.0.0.0 - 127.254.254.254 (All reserved)
Class B 128.0.0.0 - 191.254.254.254 255.255.0.0 172.16.0.0 - 172.31.254.254
Class C 192.0.0.0 - 223.254.254.254 255.255.255.0 192.168.0.0 - 192.168.254.254

Review Table: 10 protocols to remember of the TCP/IP suite

Name Layer Function


TCP 4 Transport Connection-oriented, guaranteed delivery
IP 3 Network Connectionless, unreliable delivery; used to establish TCP connections and for addressing
ARP 2 Data Link Translates IP addresses into MAC physical addresses
FTP 7 Application Transferring files
RIP 3 Network Used for routing between different inter-networks
HTTP 7 Application Web pages and web sites
UDP 4 Transport Connectionless, unreliable, quick, best-effort delivery
ICMP 3 Network Networking troubleshooting with tools like PING, TRACERT
Trexp Computer Professionals
ebooks resource center [NETWORK PLUS EXAM CRAM FOR TO GO EXAM WRITING]

POP3 7 Application Used to receive Email


SMTP 7 Application Used to send Email

Establishing VLAN memberships

The two common approaches to assigning VLAN membership are as follows:

Static VLANs
Dynamic VLANs

Static VLANs are also referred to as port-based VLANs. Static VLAN assignments are created
by assigning ports to a VLAN. As a device enters the network, the device automatically assumes
the VLAN of the port. If the user changes ports and needs access to the same VLAN, the
network administrator must manually make a port-to-VLAN assignment for the new connection.

Dynamic VLANs are created through the use of software. With a VLAN Management Policy
Server (VMPS), an administrator can assign switch ports to VLANs dynamically based on
information such as the source MAC address of the device connected to the port or the username
used to log onto that device. As a device enters the network, the device queries a database for
VLAN membership. See also FreeNAC which implements a VMPS server.

[edit] Protocol Based VLANs

In a protocol based VLAN enabled switch, traffic is forwarded through ports based on protocol.
Essentially, the user tries to segregate or forward a particular protocol traffic from a port using
the protocol based VLANs; traffic from any other protocol is not forwarded on the port. For
example, if you have connected a host, pumping ARP traffic on the switch at port 10, connected
a Lan pumping IPX traffic to the port 20 of the switch and connected a router pumping IP traffic
on port 30, then if you define a protocol based VLAN supporting IP and including all the three
ports 10, 20 and 30 then IP packets can be forwarded to the ports 10 and 20 also, but ARP traffic
will not get forwarded to the ports 20 and 30, similarly IPX traffic will not get forwarded to ports
10 and 30.

[edit] VLAN Cross Connect

VLAN Cross Connect (CC) is a mechanism used to create Switched VLANs, VLAN CC uses
IEEE 802.1ad frames where the S Tag is used as a Label as in MPLS . IEEE does not
recommend this model as it violated the basic bridging principles.

You might also like