You are on page 1of 15

Tables & Charts

Network topologies Topology Star Bus Ring Mesh Description All nodes connect to a single central device All nodes connect to a common backbone Advantage Inexpensive & easy Simple & less cables Disadvantage If hub fails, network down; maximum nodes = 1024 If backbone fails, network down; both ends must be terminated Expensive; difficult to troubleshoot; proprietary hardware Expensive; complicated; difficult to troubleshoot

Each node is connected to two No collisions; less signal other device degeneration Each node connects to every other device Redundancy & fault tolerance

Common networking standards Standard 802.3 802.5 802.11 FDDI Description Ethernet Token ring Wireless networks Fiber Distributed Data Interface Speed 10, 100, 1000 Mbps 4, 16 Mbps 1, 11, 54 Mbps 100 Mbps Access Method CSMA/CD Token passing CSMA/CA Topology physical star, logical bus physical star, logical ring cellular Media UTP, STP, fiber optics STP Atmosphere Fiber optics

Token passing dual ring

Ethernet specifications Designation 10BASE-T 10BASE-FL 100BASE-TX Cable Type Cat3 UTP MMF Cat5 UTP, Cat5e FTP Max Length 100 m 2000 m 100 m 412 m (half duplex) 2000 m (full duplex) 100 m 25 m 550 m (50u) 275 m (62.5u) Speed 10 Mbps 10 Mbps 100 Mbps 100 Mbps (half duplex) 200 Mbps (full duplex) 1 Gbps 1 Gbps 1 Gbps Connector RJ45 ST RJ45 Topology star star star Standard IEEE 802.3i IEEE 802.3j IEEE 802.3u IEEE 802.3u IEEE 802.3ab IEEE 802.3z IEEE 802.3z

100BASE-FX

Micro MMF

SC

star, pointpoint

1000BASE-T 1000BASECX 1000BASESX

Cat5e / Cat6 UTP (4 pairs) Twinax STP Micro MMF

RJ45 HSSDC SC

star star, pointpoint point-point

1000BASELX 10 GBASESR 10 GBASELR 10 GBASEER

SMF or MMF MMF MMF MMF

550 m (MMF) 5000 m (SMF) 300 m 10,000 m 40,000 m

1 Gbps 10 Gbps 10 Gbps 10 Gbps

SC, LC 850nm serial LAN 1310nm serial LAN 1550nm serial LAN

point-point point-point point-point point-point

IEEE 802.3z IEEE 802.3ae IEEE 802.3ae IEEE 802.3ae

Wireless networking technologies Standard IEEE 802.11 Legacy IEEE 802.11b WiFi IEEE 802.11a WiFi IEEE 802.11g WiFi IEEE 802.11n WiFi Bluetooth Infrared IEEE 802.16 WiMax Data Speed 2 Mbps 11 Mbps 54 Mbps 54 Mbps 540 Mbps 2 Mbps 100 kbps~ 16 Mbps 75 Mbps Frequency 2.4 GHz 2.4 GHz 5 GHz 2.4 GHz 2.4 GHz 2.45 GHz 100 GHz ~ 1000 THz 2 GHz ~ 11 GHz, 66 GHz Transmission Type FHSS or DSSS DSSS with CCK OFDM >20 Mbps: OFDM, <20 Mbps: DSSS with CCK MIMO FHSS Baseband BPSK Topology Point-point Point-point Point-point Point-point Point-point Scatternet Point-point LOS Point-point Cellular Range 30 m 30 m 30 m 30 m 50 m 10 m 1m 30 km

The Open Systems Interconnect reference model No 7 Layer Application Function network application services and processes encryption, formatting, compression, translation establishes maintains, manages network connections and sessions end-end error recovery, connectivity, flow control routing, forwarding of packets; sequencing of datagram Unit data Protocols/Services FTP, TFTP, HTTP, SMTP, SMB, NCP, Telnet, NTP, File & Print, DNS ASCII, JPEG, GIF, TIFF, MIDI, MPEG, MIME, Quicktime RPC, ZIP, SCP, SQL, NetBIOS, NFS, ASP, LDAP, SSL, SMB TCP, SPX, UDP, NBP, NCP. NetBEUI, SCTP IP, IPX, ARP, RARP, DHCP, BootP, ICMP, RIP, BGP, OSPF, IPSec Devices gateway

6 5 4

Presentation Session Transport

data data segments

gateway gateway gateway router, brouter

Network

packets

Data Link

encoding/decoding of packets into bits; frame synchronization, error checking electrical, mechanical, lightwave, radio frequency, media specifications

frames

MAC, LLC, PPP, ATM, frame relay, 802.11b/g, L2TP, FDDI Ethernet, WiFi, Token Ring, BRI, RS232, V.35

switch, bridge hub, NIC, WAP

Physical

bits

Physical media types Medium Twisted pair Coaxial cable Fiber optic cable Description Consists of multiple insulated wires that are twisted together in pairs to prevent crosstalk Consists of a center conductor surrounded by a plastic jacket with braided shield Consists of a center glass core surrounded by glass cladding and other protective materials Types UTP, STP, ScTP 75, 50 SMF , MMF Remarks Cat3(16MHz), Cat5(100MHz), Cat5e(100MHz), Cat6(250MHz) RG-58 (thinnet), RG-8(thicknet), RG62(ARCnet) 8~10um(SMF), 50~62.5um(MMF), 125um(clad), EMI immune

Types of media connectors Connector RJ11 RJ45 F-type BNC ST SC LC MT-RJ IEEE 1394 USB Description Registered Jack modular connector (6P2C) Registered Jack modular connector (8P8C) F-type coaxial connector (75) Bayonet Nut Coupling (50) Straight Tip fiber optic connector Subscriber/Square Connector Local Connector (SFF) Mechanical Transfer Registered Jack (SFF) FireWire (i.Link) Universal Serial Bus (1.1 & 2.0) Lock Method snap-in snap-in screw-on bayonet bayonet snap-in snap-in snap-in snap-in snap-in Usage telephone equipments, PBX twisted pair ethernet, PoE, ISDN, T1, token ring broadband cable, CATV, CCTV thin ethernet, RF applications fiber optic ethernet fiber optic gigabit ethernet fiber optic gigabit ethernet fiber optic ethernet digital devices, consumer electronics digital devices, computer peripherals Bell Labs, Amphenol AT&T IBM Lucent AMP Apple, Sony, Samsung, Matshusita, IBM, JVC, HP, Compaq, Lucent, Microsoft, Intel, NEC, Philips Developed by Bell Telephone Labs Bell Telephone Labs

Network connectivity devices

Device Hub Switch Bridge Router Gateway

Purpose Connects all nodes in a network together; transmissions received in 1 port are rebroadcast to all ports Connects all nodes/segments in a network together; filters and forwards packets; isolate collision domains

Operation Layer 1 Layer 2

Remarks concentrator (passive), repeater (active), MAU multiport bridge, configure VLANs wired or wireless Brouter, IOS connection to ISP, PABX PCI, USB, PCMCIA, built-in M/B T1, T3; V.35 interface BRI TA infrastructure mode, WiFi POTS (V.92), xDSL, cable media converter, DIX/AUI port blocking, packet filtering, proxy server, DMZ

Connects 2 network segments with dissimilar media types; Layer 2 isolate collision domains within a segment Connects 2 networks with different topologies; maps nodes & routes packets; isolates broadcast domains Connects 2 networks with different protocols or technologies; could be hardware or software An expansion card installed in a device to connect/interface to the network; particular to media & protocol A 2 in 1 device used to connect a digital carrier to the network equipment; provides diagnostics & buffering The terminal adapter used to connect to the internet via ISDN technology A device used to connect mobile PCs to a wired network wirelessly via RF technology A device that changes digital to analog signal and vice versa; modulator/demodulator A device that transmits or receives analog or digital signals; allows a NIC to connect to a different media type A stand-alone device or software used to protect networks from spyware, hackers, worms, phising, trojans Layer 3 Layer 4, 5, 6, 7 Layer 1, 2

NIC

CSU/DSU ISDN adapter WAP Modem Transceiver Firewall

Layer 1, 2 -

Classful IP addressing Class Range Default Subnet No of Subnets No of Hosts/Subnet 255.0.0.0 126 16,384 2,097,152 16,777,214 65,534 254

Class A 1.0.0.0 ~ 126.0.0.0

Class B 128.0.0.0 ~ 191.0.0.0 255.255.0.0 Class C 192.0.0.0 ~ 223.0.0.0 255.255.255.0

Reserved IP address blocks CIDR address block 0.0.0.0/8 10.0.0.0/8 14.0.0.0/8 Description Network or wire address Private network (Class A) Public data network Reference

RFC 1700 RFC 1918 RFC 1700

39.0.0.0/8 127.0.0.0/8 128.0.0.0/16 169.254.0.0/16 172.16.0.0/12 192.0.2.0/24 192.88.99.0/24 192.168.0.0/16 198.18.0.0/15 223.255.255.0/24 224.0.0.0/4 240.0.0.0/4 255.255.255.255

Reserved

RFC 1797

Localhost (Loop back address) RFC 1700


Reserved -

Zeroconf , APIPA Private network (Class


Documentation and example code

RFC 3927 RFC 1918 RFC 3330 RFC 3068 RFC 1918 RFC 2544 RFC 3330 RFC 3171 RFC 1700
-

IPv6 to Ipv4 relay Private network (Class C)


Network benchmark tests Reserved

Multicasts (former Class D)


Experimental (former Class E) Broadcast

Physical and logical addressing Version Length MAC 48 bits Notation Hexadecimal Dotteddecimal Hexadecimal Delimiter Colon ( Dash (-) Dots (.) , Separation 8-bit hexadecimal digits (2 hex) 8-bit binary coded decimal digits Supports 12x10 combinations 4.3x10 addresses
38 9 9

Example 00:50:DA:C3:8A:F9

IPv4 IPv6

32 bits 128 bits

207.142.131.235 2001:0DB8:0::0::1428:57AB

Colon (

16-bit hexadecimal 3.4x10 digits (4 hex) addresses

Rules of subnetting No 1 2 3 4 B bits => 2; R bits => 2 Usable subnets created = 2 - 2 Usable hosts per subnet = 2 - 2 Decimal value of the number of bits borrowed = increment of the subnets
R B

Rule

Commonly used well-known ports

Port 20 21 22 23 25 53 69 80 110 119 123 143 443

Name FTP FTP SSH Reliable transfer of data; uses TCP Provides flow control; uses TCP

Function

Executes command and moves files; remote login protocol; uses TCP

TELNET Connects a remote computer to a server; uses TCP SMTP DNS TFTP HTTP POP3 NNTP NTP IMAP4 HTTPS Delivers emails between email servers; sending of emails; uses TCP Translates hostnames to IP addresses; uses TCP (zone transfers), UDP (queries) Simple transfer of data; uses UDP Opens a browser connection to a webpage; uses TCP Delivers emails between a mail server and client; receiving of emails; uses TCP Views and writes news articles for newsgroups; uses TCP Sets computer clock to standard time; uses UDP Downloads emails; stores and searches messages from newsgroups; receiving of emails; uses TCP Allows browsers and servers to authenticate and encrypt network packets; uses SSL; uses TCP

Switching type comparison Resource Dedicated path? Available bandwidth? Could Bandwidth be wasted? Store-and-forward transmission Each packet follows the same route? Call setup When can congestion occurs? Charge? Circuit Switching Packet Switching yes fixed yes no yes required at set-up per minute no dynamic no yes no not required at every packet per packet

Network protocols Protocol IPX/SPX NetBEUI AppleTalk TCP/IP Routing RIP, SAP, NLSP unroutable version1: unroutable; version2: RTMP RIP, OSPF Addressing 12-digit hexadecimal 24-bit address 32-bit address Naming Interoperability

server names only: 64 characters, Windows, Linux no special characters; NDS NetBIOS or computer names; WINS version1: NBP; version2: IP naming DNS, ARP, RARP Windows ethernet: ELAP, token ring: token talk Windows, UNIX, Linux,

Mac, Novell

Digital transmission hierarchies Carrier Channels T1 T3 E1 E3 J1 J3 24 672 32 480 24 480 Data Rate 1.544 Mbps North American 44.736 Mbps 2.048 Mbps European 34.368 Mbps 1.544 Mbps Japanese 32.064 Mbps Format

Optical carriers Level OC-1 OC-3 Data Rate 51.84 Mbps 155.52 Mbps

OC-12 622.08 Mbps OC-24 OC-48 1.244 Gbps 2.488 Gbps

xDSL technologies Type ADSL SDSL HDSL IDSL CDSL Distance 18,000 ft 12,000 ft 12,000 ft 18,000 ft 18,000 ft Downstream 1.544 Mbps ~ 6.1 Mbps 1.544 Mbps(US), 2.048 Mbps(EU) 1.544 Mbps (2p), 2.05 Mbps (3p) 128 kbps 1.544 Mbps 640 kbps ~ 2.2 Mbps 1.6 Mbps ~ 53 Mbps Upstream 126 kbps ~ 640 kbps 1.544 Mbps(US), 2.048 Mbps(EU) 1.544 Mbps (2p), 2.05 Mbps (3p) 128 kbps <1.544 Mbps 270 kbps ~ 1.1 Mbps 1.5 Mbps ~ 2.3 Mbps Characteristic Use Most popular; used for web access and multimedia streaming WAN connection from company network server to phone company WAN connection from company network server to phone company Transmits data only; similar to ISDN BRI Used in home and small business; no splitter; known as G.lite Same as ADSL ATM networks using fiber optic cable

RADSL n/a VDSL 4500 ft

TCP/IP protocol suite Name TCP UDP FTP SFTP TFTP HTTP HTTPS SMTP POP3 IMAP4 Telnet SSH ICMP ARP RARP NTP NNTP SCP LDAP IGMP LPR Meaning Transmission Control Protocol User Datagram Protocol File Transfer Protocol Secure File Transfer Protocol Trivial File Transfer Protocol HyperText Transfer Protocol HyperText Transfer Protocol Secure Function Enables two hosts to establish connection and exchange network data; connection-oriented; guaranteed delivery of packets Enables two hosts to establish connection and exchange network data; connectionless, unreliable, less overhead Downloads or uploads files between hosts; performs directory operations; also offers authentication security Transfer of files with SSH to provide encryption, public key authentication, and file compression; similar to FTP Facilitates file transfer between computers; uses lesser bandwidth and faster speed; similar to FTP; used in firmware downloading Transfer files or web pages from web server to client web browser; uses lesser bandwidth and supports both text and graphics Allows browsers and servers to authenticate and encrypt network packets using SSL; secure version of HTTP

Simple Mail Transfer Protocol Uses a spooled or queued method to deliver or send emails Post Office Protocol version 3 Internet Message Access Protocol version 4 Telephone Network Secure Shell Internet Control Message Protocol Address Resolution Protocol Reverse Address Resolution Protocol Network Time Protocol Network News Transfer Protocol Secure Copy Protocol Lightweight Directory Access Protocol Internet Group Multicast Protocol Line Printer Remote Used to retrieve email files from the email server; can be used with or without SMTP Used to retrieve email files from the email server; similar to POP3 but with added features; supports Kerberos A terminal emulation program that connects remote computers to a server; execute a commands using command prompt A suite of protocols used to log into another computer on the network, execute commands, and secure transfer of files Provides network layer management and control by sending datagrams and control messages; works with IP Resolves network addresses (IP) into hardware addresses (MAC); uses address resolution cache table built into every NIC Uses host MAC address to discover its IP address Sets computer clock to a standard time source usually a nuclear clock Used for the distribution, inquiry, retrieval, and posting of news articles and newsgroup forum messages Safe and secure copying of files between a local and remote computer; similar to SFTP A session layer protocol that provides directory services and access to x.500 information directories A network layer protocol used to report multicast group membership to adjacent routers A printer protocol used to print across different NOS platforms

Network services and protocols Name DNS DHCP NAT ICS WINS SNMP NFS Meaning Domain Name System Dynamic Host Configuration Protocol Network Address Translation Internet Connection Sharing Windows Internet Naming Service Simple Network Management Protocol Network File System Function Translates and resolves IP addresses into host names or the reverse Allows a client device to request and obtain a unique IP address and other parameters from a server automatically Allows a local network to use one set of IP address for internal or in-house traffic and a different set for external or internet traffic Connects multiple computers on a local network to the internet through a single connection and IP address; uses NAT Resolves a host NetBIOS name or computer name into an IP address; used in legacy Windows Monitors the network and network devices; sends messages to different parts of the network; uses MIB Permits network users to access and used shared files; allows different computer platforms to share files and disk space Connects networking devices using an Ethernet cable; no configuration or DHCP required Shares files, directories, and services; message format used by DOS; allows UNIX/Linux and Windows machines to share files A file sharing protocol used with TCP/IP to permit non-apple computers to access apple servers Processes LPR print jobs, queues, and prints files Provides file and print services to SMB clients; runs on UNIX and Linux The core of Citrix presentation server that enables Windows or UNIX server to run an application for multiple users simultaneously A popular public domain UNIX-based web server

Zeroconf Zero Configuration SMB AFP LPD Samba ICA Apache Server Message Block Appletalk File Protocol Line Printer Daemon Independent Computing Architecture -

Remote access protocols and services Name RAS PPP SLIP Meaning Remote Access Service Point-Point Protocol Serial Line Internet Protocol Function Used for client remote access to a network Used to establish an internet connection between serial point-to-point links; provides for dial-up connnections to networks Used to connect to the internet via a dial-up modem; older, slower, less reliable than PPP Uses PPP over Ethernet to connect an ethernet LAN user to the internet using an ADSL or cable modem; users share a broadband connection A form of encryption that provides a tunnel for secure connections over the internet; used to create VPN A private, secure, point to point connection from a company LAN to the remote users and wireless nodes using the internet

PPPoE PPP over Ethernet PPTP VPN Point-Point Tunnel Protocol Virtual Private Network

RDP

Remote Desktop Protocol

connects a client to a network via a terminal server and uses authentication to establish connection to run applications and printers remotely

Security protocols Name IPSec L2TP SSL WEP WPA AES PGP 802.1x Meaning Internet Protocol Security Layer 2 Tunneling Protocol Secure Sockets Layer Wired Equivalent Privacy WiFi Protected Access Advanced Encryption Standard Pretty Good Privacy Function Provides authentication and encryption over the internet; works with IPv4 and IPv6; used to secure VPN Supports non-TCP/IP protocols VPN over the internet; combines the best features of PPTP and L2F Uses a private key to encrypt data that is transferred over the SSL connection; service independent and can secure different network applications Encrypts and protects data packets over radio frequencies; does not offer end-end security Offers improved data encryption and user authentication using the wireless devices MAC address; uses TKIP encryption A cryptographic cipher that uses Rijndael algorithm An encryption utility based on public key encryption designed to encrypt email transmissions Method for passing EAP over both wired and wireless networks; provides authentication services for wireless networks not using PPP

Authentication protocols Name CHAP MSCHAP PAP RADIUS Kerberos EAP Challenge Handshake Authentication Protocol Microsoft Challenge Handshake Authentication Protocol Password Authentication Protocol Remote Authentication Dial-in User Service Extensible Authentication Protocol Function Uses a hashed algorithm MD5 that provides client response encryption; weak and one-way authentication protocol Has two versions used in Windows systems that offers more security; version1 not compatible with version2 The weakest authentication protocol that sends username and password in clear text over the network to be verified by RAS An industry standard that provides authentication, authorization, and accounting services A fully-fledge security system that uses secret key cryptography A general protocol often used by a wireless devices to connect to a RADIUS server; TLS uses certificates such as smart cards

Routing protocols Name Meaning Function

RIP

Routing Information Protocol

Finds the quickest route between two computers; offers a maximum of 16 hops between routers before deciding that a packet is undeliverable A descendant of RIP that increases its speed and reliability; much used on the internet; accepts 256 hops between routers A propriety protocol from Cisco that takes bandwidth, latency, reliability, and current traffic load into consideration A distance vector protocol that uses polling to retrieve routing information Used to span autonomous systems in the internet; used at the edge of networks; designed to supersede EGP A link state routing protocol that was designed to reduce wasted bandwidth associated with RIP Used by Appletalk to ensure that all routers in the network have consistent routing information

OSPF Open Shortest Path First IGRP EGP BGP NLSP RTMP Interior Gateway Routing Protocol Exterior Gateway Protocol Border Gateway Protocol Netware Link Services Protocol Routing Table Maintenance Protocol

Network operating system versions Vendor Novell Microsoft Apple Releases Netware 3.x, 4.x, 5.x, 6.x Windows NT, Windows 2000, Windows Server 2003 Mac OS X, AppleShare IP

UNIX/Linux SCO ACE, RedHat

Server operating systems basic capabilities Operating System UNIX/Linux Client Support multi-user, multitasking; GUI multi-user, multitasking; GUI multi-user, multitasking; GUI multi-user, multitasking; GUI Authentication etc/password; NIS authentication; LDAP File & Print Services LPD/LPR; FAT16, FAT32, NTFS, Ext2, Ext3; NFS Interoperability Windows, Linux, Netware, Mac OS Windows, Linux, Netware, Mac OS Windows, Linux, Netware, Mac OS Windows, Linux, Netware, Mac OS

Netware Windows Mac OS

user password; keys stored in FAT16, FAT32, NTFS, NDS; eDirectory NFS, AppleShare domain username/password; AD kerberos mechanism; keychain; OD LPD/LPR; FAT16, FAT32, NTFS UNIX-type file system, AppleShare IP

TCP/IP utilities Utility config Operating System NetWare Function displays IP stack configuration Switches

ifconfig winipcfg ipconfig ping tracert

UNIX/Linux Windows 95/98 Windows NT/2000/XP Windows/UNIX/Linux/Netware Windows 2000/XP/2003

displays IP stack configuration displays IP stack configuration displays IP stack configuration, release/renew DHCP IP address, flush/register DNS verifies end-to-end network connectivity; uses ICMP echo packets traces routes to internet sites based on the number of hops and displays time taken traces routes to internet sites based on the number of hops and displays time taken displays protocol statistics and current TCP/IP network connections a b e r o s n p a A c n r R S s a g s N a d t exit /all /renew /release /flushdns /registerdns t a n l f i r v d h j w

traceroute UNIX/Linux netstat Windows/UNIX/Linux/Netware

nbtstat

displays protocol statistics and current TCP/IP Windows/UNIX/Linux/Netware network connections using NetBIOS over TCP/IP Windows/UNIX/Linux/Netware Windows 2000/XP/2003 UNIX/Linux Windows/UNIX/Linux/Netware Windows NT/2000/XP displays and/or modifies IP to physical address translation tables; displays current ARP cache queries a DNS name server; used to troubleshoot DNS and verify DNS resolution nslookup equivalent enables a computer to function as a terminal working from a remote computer used to connect to file or print share

arp nslookup dig telnet netuse

a e f l t

Tools for network cabling and troubleshooting Tool Wire crimper Punchdown tool Media tester/certifier Tone generator Usage Used to affix an UTP/STP cable to a modular connector or plug Used to affix several cables to a punchdown block or a patch panel found in wiring cabinets Used to test continuity or polarity of cables, trace shorts along the line; cant be used on live/active wires Used along with a probe to verify cable continuity, identify wiring faults, determine line voltage and polarity; can be used in active wires

Common network implementation Implementation Firewall Proxy server Purpose security security, performance Characteristics/Benefits Permits/denies public traffic based on various filtering rules; protection from internet threats A firewall method that caches web content for improved network performance; establish VPN for remote users Remarks ACL, DMZ web proxy, ip proxy

Antivirus software VLAN

security, maintenance security, performance cost, flexibility

Software used to search/remove malicious programs on viruses, worms, network computer hard drives; prevents infection trojan horses Better bandwidth management; reduced administration costs; well-defined groups; improved network security A private network based on TCP/IP which resides behind a firewall; cheaper, versatile, flexible information sharing static/dynamic; VTP, DTP -

Intranet

Extranet

Extension of a corporate intranet; exchange data security, versatility between suppliers/customers; secure corporate purchasing fault-tolerance, load balancing A group of redundant mirrored servers; high availability and scalability; minimized network downtime

Clustering

Network security implementation Implementation Port blocking Packet filtering Authentication Encryption Purpose intrusion detection intrusion detection access control data protection Impact on network slows down slows down none slows down Remarks firewalls, proxy servers firewalls, proxy servers NOS logon server IPSec, PKI, PGP, Kerberos, DES

Characteristics of fault-tolerance Item Power Link redundancy Storage Services Implementation UPS, SPS; backup generators, cooling fans, processors; surge suppressor; line conditioners Backup links: ISDN, dial-up; microwave wireless radios; secondary ISP; clustering Hardware or software RAID; SCSI hard disks; data warehousing Mission critical servers and equipments: gateways, routers, switches; SAN clusters, MSOS

Disaster recovery Backup/restore schemes; offsite storage: NAS, SAN; hot/cold spares; hot, warm, cold sites

Types of RAID Level RAID 0 RAID 1 RAID 0+1 RAID 5 RAID 10 No of drives 2 2 4 3 4 Description disk stripping without fault tolerance disk mirroring/duplexing a mirror of stipes stripping with parity stripe of mirrors

Backup types Type full/normal incremental differential Description backs up all data; longest time to backup backs up files changed or added since the last backup; faster to backup; uses more tapes backs up files changed or added since the last full backup; faster to restore; uses lesser tapes Clears archive bit? Y Y N N Sets to restore full only full + every incremental full + last differential -

mirror/copy backs up all data; used to make offsite copies;

Types of backup tape drives Drive QIC Travan DAT Mammoth Description Quarter Inch Cartridge; formats: 3.5", 5.25" Enhancement of QIC; formats: TR4, TR5 Capacity 20 GB, 50 GB 4/8 GB, 10/20 GB Data Transfer Speed 60 kbps, 125 kbps 1 Mbps, 1.83 Mbps

Digital Audio Tape; formats: DDS (Digital Data Storage), DLT 40 GB (DDS), 160 GB 4.8 Mbps, 20 (Digital Linear Tape) (DLT) Mbps An 8mm backup format used in computer systems; AIT (Advanced Intelligent Tape) 10/20 GB, 20/40 GB 3 Mbps, 6 Mbps

Troubleshooting strategy No 1 2 3 4 5 6 7 8 Step Identify the symptoms Identify the affected area Establish what has changed Select the most probable cause Implement a solution and action plan Test the result Recognize the effects of the solution Document the solution and process

IEEE Standards

Standard 802.1 802.2 802.3 802.4 802.5 802.6 802.7 802.8 802.9 802.10 802.11 802.12 802.13 802.14 802.15 802.16 802.17

Description Internetworking Logical Link Control (LLC) Ethernet (CSMA/CD) Token bus LAN Token ring LAN Metropolitan Area Network (MAN) Broadband technical advisory Fiber optic Integrated voice/data Network Security Wireless Networks Demand Priority (100VG-Any LAN) Not used Cable modem Wireless personal area network Broadband wireless access Resilient packet ring

You might also like