Follow @ASM_Educational Taking a Network+ exam? Follow us on Facebook and ask us about our study group. The (Open Systems Interconnection) OSI has been developed by International Organization for Standardization (ISO). The OSI model provides a framework for creating and implementing networking standards and devices and describes how network applications on different computers can communicate… Read more »
Posts Tagged: Network+
Follow @ASM_Educational Taking a Network+ exam? Follow us on Facebook and ask us about our study group. WiFi is not an acronym but a brand name created by a marketing firm that’s meant to serve as an interoperability seal for marketing efforts. WiFi technology however provides wireless Internet access via the use of radio waves… Read more »
Remote Desktop Protocol (RDP) RDP is a Microsoft-designed technology that allows two computers to share a GUI using a network connection. RDP is a proprietary technology initially built by Microsoft that allows two computers to exchange a graphical user interface (GUI) using a standardized network connection. This article explains the meaning of RDP, how it… Read more »
Multi-Protocol Label Switching (MPLS) MPLS – short for Multi-Protocol Label Switching – is a now-aging network routing system that transfers data between nodes using labels that denote predetermined pathways instead of network addresses that refer to the nodes themselves. This article explains how MPLS works, its types, and the core architecture. What Is MPLS (Multi-Protocol… Read more »
Load Balancing Load Balancing Definition: Load balancing is the process of distributing network traffic across multiple servers. This ensures no single server bears too much demand. By spreading the work evenly, load balancing improves application responsiveness. It also increases availability of applications and websites for users. Modern applications cannot run without load balancers. Over time, load… Read more »
IMAP Protocol IMAP stands for Internet Message Access Protocol. It is an application layer protocol which is used to receive the emails from the mail server. It is the most commonly used protocols like POP3 for retrieving the emails. It also follows the client/server model. On one side, we have an IMAP client, which is a… Read more »
HTTP The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. This is the foundation for data communication for the World Wide Web (i.e. internet) since 1990. HTTP is a generic and stateless protocol which can be used for other purposes as well using extensions of its request methods, error… Read more »
File Transfer Protocol (FTP) The full form of FTP is File Transfer Protocol. It is a standard internet protocol provided by TCP/IP which is used for transmitting the files from one system to another system. The main purpose of FTP is for transferring the web page files from one system to the computer which acts… Read more »
Difference between Private and Public IP addresses What is an IP Address? An IP address (Internet Protocol address) is a numerical identifier, such as 192.0.2.1, that is associated with a computer network that communicates using the Internet Protocol. An IP address is used for two purposes: identifying a host or network interface, and addressing a… Read more »
How to prepare for CompTIA Network + Job? Questions Answers 1. What are the different layers of the OSI model, and can you explain each one? The OSI model has seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application. Each layer is responsible for specific functions in network communication. 2. What is subnetting,… Read more »
Server Message Block Protocol (SMB) The Server Message Block (SMB) Protocol is a Microsoft Windows protocol that allows users to share files, printers, and serial ports across a network. SMBv2 is the most recent version released with Windows Vista and has undergone more revisions under Windows 7. The IBM-developed Server Message Block protocol is a… Read more »
What is VPN in Computer Network? VPN stands for Virtual Private Network. It allows you to connect your computer to a private network, creating an encrypted connection that masks your IP address to securely share data and surf the web, protecting your identity online. A virtual private network, or VPN, is an encrypted connection over the… Read more »
Single Mode vs. Multimode Fiber Optic Cables Many decisions come into play when installing fiber optic cabling. By far, one of the most important questions is whether to install single mode or multimode. This decision has huge implications for your network’s distance, bandwidth, and budget, so it’s vital to understand the differences between these two… Read more »
Network Time Protocol (NTP) NTP is an internet protocol that’s used to synchronize the clocks on computer networks to within a few milliseconds of universal coordinated time (UTC). It enables devices to request and receive UTC from a server that, in turn, receives precise time from an atomic clock. What Is NTP? “A man with… Read more »
Distinguish between Connection-Oriented and Connectionless Service Connection-Oriented Services In a connection-oriented service, each packet is related to a source/destination connection. These packets are routed along a similar path, known as a virtual circuit. Thus, it provides an end-to-end connection to the client for reliable data transfer. It delivers information in order without duplication or missing… Read more »
Simple Network Management Protocol (SNMP) SNMP stands for Simple Network Management Protocol. It is an Internet-standard protocol for handling devices on IP networks. Devices that typically provide SNMP include routers, switches, servers, workstations, printers, modem racks, and more. It is used mainly in the network management framework to monitor network-attached computers for conditions requiring regulatory attention…. Read more »
Dynamic Host Configuration Protocol (DHCP) Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. In DHCP, port number 67 is used for the server and 68 is used for the… Read more »
CompTIA NET+ | Generic Routing Encapsulation (GRE) Generic Routing Encapsulation (GRE) is a routing protocol developed by Cisco Systems in 1994 that allows a wide range of network-layer protocols to be contained inside virtual point-to-point or point-to multipoint links over an Internet Protocol network. Protocol encapsulation, not GRE specifically, breaks the layering sequence, according to… Read more »
Source mc mcse Certification Resources DoS (Denial of Service) – A DoS attack is a common type of attack in which false requests to a server overload it to the point that it is unable to handle valid requests, cause it to reset, or shut it down completely.
Source mc mcse Certification Resources Physical Security – physical security is just as it sounds, locks on the doors, cameras everywhere, and so forth.
User authentication is the verification of an active human-to-machine transfer of credentials required for confirmation of a user’s authenticity; the term contrasts with machine authentication, which involves automated processes that do not require user input. Source mc mcse Certification Resources PKI (Public Key Infrastructure) – A public key infrastructure (PKI) is the combination of software,… Read more »
Source mc mcse Certification Resources ACL (Access Control List) – An ACL is a table in an operating system or network device (such as a router) that denies or allows access to resources.
Source mc mcse Certification Resources Cable Testers – Cable testers are electronic devices used to test a cable’s integrity by checking for opens and shorts which can cause connectivity problems.
Source mc mcse Certification Resources Application Layer vs. Network Layer – An application layer firewall works at the application layer of a protocol stack.
Source mc mcse Certification Resources Crosstalk Symptoms: Slow network performance and/or an excess of dropped or unintelligible packets. In telephony applications, users hear pieces of voice or conversations from a separate line.
Source mc mcse Certification Resources Gather Information on the Problem In a contact center network, problems are typically discovered and reported by one of the following types of users:
Source mc mcse Certification Resources Bandwidth – is the average number of bits that can be transmitted from the source to a destination over the network in one second.
Source mc mcse Certification Resources Quality of Service – (QoS) is a set of parameters that controls the level of quality provided to different types of network traffic.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology.
Multilayer Switch – A multilayer switch (MLS) is a computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers.
Hub – A physical layer network device used to connect multiple Ethernet devices together.
Vertical Cross Connect – is a location within a building where cables originate and / or are terminated, reconnected using jumpers or pass throughs or are connected to patch panels or other similar devices where the locations are from upper or lower floors in the building.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Peer to Peer – A peer to peer network is one in which lacks a dedicated server and every computer acts as both a client and a server.
Ethernet – Ethernet is the most widely-installed local area network ( LAN) technology.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Frame Relay – Frame relay is a secure, private network that utilizes a logical path or “virtual circuit” to allocate bandwidth for high performance transmissions.
568A and 568B – The number 568 refers to the order in which the individual wires inside a CAT 5 cable are terminated.
Cable Types :
Wireless networks allow computers to comunicate without the use of cables using IEEE 802.11 standards, also known as Wi-Fi.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Introduction To Network
[bs_icon name=”glyphicon glyphicon-chevron-right”] The Purpose and Properties of Routing
Common IPv4 and IPv6 Routing Protocols
Proper Use of Addressing Technologies
Identify the Following Address Formats
Traceroute – A command-line troubleshooting tool that enables you to view the route to a specified host. This will show how many hops the packets have to travel and how long it takes. In Windows operating systems, the command used is “tracert”.
Common Networking Protocols
Here are the steps for troubleshooting a network
Identify Commonly Used TCP/UDP Ports
Here are ASM Students who has taken ,CompTIA ,Cisco ,CCNA, CCNP ,Microsoft ,MCSA Exam. We are proud of them.