Comparison of IPv4 and IPv6 Basic Comparison Description IPv4 IPv6 Address 32 bits long (4 bytes). Address is composed of a network and a host portion, which depend on address class. Various address classes are defined: A, B, C, D, or E depending on initial few bits. The total number of IPv4 addresses is 4… Read more »
Posts Categorized: CompTIA Network+
Two-Factor or Multi-Factor Authentication (2FA or MFA) CompTIA Security+ Objective 4.1 and CompTIA Network+ Objective 4.2 What is two-factor or multi-factor authentication (2FA or MFA)? Multifactor authentication ensures that a user is who they say they are. The more factors are used to determine the identity of a person, the greater the reliability of the authenticity…. Read more »
Why Network+ Certification? Network+ is offered by the Computing Technology Industry Association (CompTIA) which is the top vendor-neutral provider of IT certs. Some of you might be thinking, “Why take CompTIA Network+ first and not jump into Cisco Certified Network Associate certification (CCNA) path right away?”. While you could jump straight into the CCNA path,… Read more »
Follow @ASM_Educational Taking a Network+ exam? Follow us on Facebook and ask us about our study group. The (Open Systems Interconnection) OSI has been developed by International Organization for Standardization (ISO). The OSI model provides a framework for creating and implementing networking standards and devices and describes how network applications on different computers can communicate… Read more »
Follow @ASM_Educational Taking a Network+ exam? Follow us on Facebook and ask us about our study group. WiFi is not an acronym but a brand name created by a marketing firm that’s meant to serve as an interoperability seal for marketing efforts. WiFi technology however provides wireless Internet access via the use of radio waves… Read more »
Follow @ASM_Educational Taking a Network+ exam? here are some network types you should know. What is a LAN ? A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of inter-connected workstations and personal… Read more »
Follow @ASM_Educational When you buy brand new switches all we need connect the PC to switch port and then PC can talk to each other ; but I can take a Switch like Cisco Switch and create a few VLAN ; such as (Here is general Idea of VLAN) VLAN 10 = Publishing VLAN… Read more »
Follow @ASM_Educational (Domain Name System) The Internet’s system for converting alphabetic names into numeric IP addresses. For example, when a Web address (URL) is typed into a browser, DNS servers return the IP address of the Web server associated with that name. In this made-up example, the DNS converts the URL www.company.com into… Read more »
Follow @ASM_Educational From Wikipedia A. Cable Tester- A cable tester is an electronic device used to verify the electrical connections in a cable or other wired assembly. Generally, a cable tester consists of: 1. A source of electric current 2. A volt meter 3. A switching matrix used to connect the current… Read more »
Follow @ASM_Educational From Wikipedia Type Description Function A Address Record Returns a 32-bit IPv4 address, most commonly used to map hostnames to an IP address of the host,but it is also used for DNSBLs, storing subnet masks in RFC 1101, etc. CNAME Canonical Name Record Alias of one name to another: the… Read more »
Follow @ASM_Educational ComputerCableStore When talking about cable pinouts we often get questions as to the difference in Straight-through, Crossover, and Rollover wiring of cables and the intended use for each type of cable. These terms are referring to the way the cables are wired (which pin on one end is connected to which pin… Read more »
Source mc mcse Certification Resources DoS (Denial of Service) – A DoS attack is a common type of attack in which false requests to a server overload it to the point that it is unable to handle valid requests, cause it to reset, or shut it down completely.
Source mc mcse Certification Resources Physical Security – physical security is just as it sounds, locks on the doors, cameras everywhere, and so forth.
User authentication is the verification of an active human-to-machine transfer of credentials required for confirmation of a user’s authenticity; the term contrasts with machine authentication, which involves automated processes that do not require user input. Source mc mcse Certification Resources PKI (Public Key Infrastructure) – A public key infrastructure (PKI) is the combination of software,… Read more »
Source mc mcse Certification Resources ACL (Access Control List) – An ACL is a table in an operating system or network device (such as a router) that denies or allows access to resources.
Source mc mcse Certification Resources Cable Testers – Cable testers are electronic devices used to test a cable’s integrity by checking for opens and shorts which can cause connectivity problems.
Source mc mcse Certification Resources Application Layer vs. Network Layer – An application layer firewall works at the application layer of a protocol stack.
Source mc mcse Certification Resources Crosstalk Symptoms: Slow network performance and/or an excess of dropped or unintelligible packets. In telephony applications, users hear pieces of voice or conversations from a separate line.
Source mc mcse Certification Resources Gather Information on the Problem In a contact center network, problems are typically discovered and reported by one of the following types of users:
Source mc mcse Certification Resources Bandwidth – is the average number of bits that can be transmitted from the source to a destination over the network in one second.
Source mc mcse Certification Resources Quality of Service – (QoS) is a set of parameters that controls the level of quality provided to different types of network traffic.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology.
Multilayer Switch – A multilayer switch (MLS) is a computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers.
Hub – A physical layer network device used to connect multiple Ethernet devices together.
Vertical Cross Connect – is a location within a building where cables originate and / or are terminated, reconnected using jumpers or pass throughs or are connected to patch panels or other similar devices where the locations are from upper or lower floors in the building.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Peer to Peer – A peer to peer network is one in which lacks a dedicated server and every computer acts as both a client and a server.
Ethernet – Ethernet is the most widely-installed local area network ( LAN) technology.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Frame Relay – Frame relay is a secure, private network that utilizes a logical path or “virtual circuit” to allocate bandwidth for high performance transmissions.
568A and 568B – The number 568 refers to the order in which the individual wires inside a CAT 5 cable are terminated.
Cable Types :
Wireless networks allow computers to comunicate without the use of cables using IEEE 802.11 standards, also known as Wi-Fi.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Introduction To Network
[bs_icon name=”glyphicon glyphicon-chevron-right”] The Purpose and Properties of Routing
Common IPv4 and IPv6 Routing Protocols
Proper Use of Addressing Technologies
Identify the Following Address Formats
Traceroute – A command-line troubleshooting tool that enables you to view the route to a specified host. This will show how many hops the packets have to travel and how long it takes. In Windows operating systems, the command used is “tracert”.
Common Networking Protocols
Here are the steps for troubleshooting a network
Identify Commonly Used TCP/UDP Ports