NET+ 10-006 Memorization Guide
Devote this information to Memory
T-1/E-1
A T-1 provides for 1.54 Mbps of dedicated bandwidth for the customer. This bandwidth can be used
in total or divided up into as many as 24 channels.
In Europe, they use a very similar connection called an E-1.
T-3/E-3
A T-3 line in the United States or an E-3 line in Europe and much of the rest of the world.
A T-3 provides for 672 DS0s, or the equivalent of 28 T-1s or 44.736 Mbps! It is sometimes also
referred to as a DS3.
An E-3 provides for the equivalent of 512 DS0s, or approximately 17 E-1s or 34.368 Mbps.
10 Mbit/s Ethernet
• 10BASE-2 - Coax / “Thinnet” over RG-58A/U, 185 meters
• 10BASE-T - Twisted pair copper, 100 meters
100 Mbit/s Ethernet
• 100BASE-TX - Category 5 twisted pair, 100 meters
• 100BASE-FX - Multimode fiber (2 km), Single-mode fiber (over 2 km)
1000 Mbit/s (1 Gbit/s) Ethernet
• 1000BASE-T - Category 5/5e, uses all pairs, 100 meters
• 1000BASE-TX - Category 5/5e, uses two pair, 100 meters - rarely seen
• 1000BASE-LX - Long wavelength fiber, over 5 kilometers
• 1000BASE-SX - Short wavelength fiber, 550 meter distance
10 Gbit/s Ethernet
• 10GBASE-T - Cat 6 (55 meters), Cat 6a (100 meters)
• 10GBASE-SR (Short Range) - Multimode fiber, 300 meters
• 10GBASE-ER (Extended Range) - Single-mode fiber, 40 km
• 10GBASE-SW - 10 gigabit Ethernet over SONET and SDH
IEEE 1905.1 - Networking ubiquity for the home
• 802.11 wireless, power-line networks, Ethernet, and MoCA
• Power-line communication (PLC) - IEEE 1901 - 500 Mbit/s
Ethernet over HDMI
• HEC - HDMI Ethernet Channel, 100 Mbit/s Ethernet
• Part of the HDMI specification
OSI Layer Name Devices used Actions
7 Application User Protocols
FTP, HTTP,
SMTP, SSH,
TFTP, HTTPS • There are 7 steps to the
6 Presentation Translates, the IT community CISC
encrypts (DE), • Step 1: Identify the P
compression • Step 2: Establish Th
(DE), SSL/TLS – Step 2 has 2 sub
5 Session Q of S ,establish, – Step 3: Test th
maintain, end – Step 3 has 2 sub
session – Step 4: Establi
4 Transport Firewall, SEGMENTS Potential Effec
TCP/UDP, flow • Step 5: Implement t
control • Step 6: Verify Full S
3 Network Router, ARP PACKETS Measures
tables, IP • Step 7: Document Fi
Addresses
2 Data Switch, L2TP, FRAMES
MAC Addressing,
(Spanning Tree
Protocol)STP
1 Physical HUB, NIC, BITS
Cabling
7 Echo RADIUS- Remote Authentication Dial in User Service / uses UDP as a transport
15 NETSTAT Authenticates, Authorizes, Audits only the password is encrypted
19 CHARGEN
20 FTP Data TACACS Terminal Access Controller Access Control System/ Uses TCP as a
21 FTP Control transport authenticates and authorizes (Cisco Proprietary)
22 SSH, SCP, SFTP
23 Telnet TACACS+ AAA- uses TCP as a transport Authenticates, Authorizes Full encryption
25 SMTP of data, Audits
49 TACACS+
53 DNS RADIUS and TACACS+ are known as AAA servers
67 DHCP/TCP
68 DHCP/UDP THEY ARE THE ONLY AAA SERVERS
69 TFTP
IP Class of Networks
80 HTTP
88 KERBEROS A- 1.x.x.x - 126.x.x.x Subnet 255.x.x.x
110 POP3 10.x.x.x-10.255.x.x. Private
119 NNTP 127.0.x.x Loop back
123 NTP B- 128.x.x.x- 191.x.x.x Subnet 255.255.x.x
137 Netbios Name 172.16.x.x -172.31.255.255 Private
138 Netbios Datagram C- 192.x.x.x-223.x.x.x Subnet 255.255.255.x
139 NetBios Session 192.168.x.x – 192.168.255.255 Private
143 IMAP4
169.254.x.x APIPA
161 SNMP
162 SNMP Trap
389 LDAP DNS Records
443 SSL/ HTTPS A= IPV4 address resolved to hostname
1701 L2TP AAAA= IPV6 (128 bit) address resolved to hostname
1723 PPTP
MX record= Mail Exchange to Domain Name DNS server
1812 RADIUS
3389 RDP CNAME= Canonical name to alias
Pointer= Points IP address to Canonical Name
Bits 1 2 3 4 5 6 7 8
borrowed=N
Subnet 128 192 224 240 248 252 254 255
mask
Block Size 128 64 32 16 8 4 2 1
# Hosts
# Networks 2 4 8 16 32 64 128 256
2^N-2
CIDR 1st /1 /2 /3 /4 /5 /6 /7 /8
Octet
2nd /9 /10 /11 /12 /13 /14 /15 /16
3rd /17 /18 /19 /20 /21 /22 /23 /24
4th /25 /26 /27 /28 /29 /30 /31 /32
RAID
Raid 0- Striping/ Min 2 disks/ Fault tolerance NO
Raid 1-Mirroring/ Min 2 disks/ Fault tolerance YES
Raid 5- Striping with Parity/ Min 3 disks/ Fault tolerance YES
Raid 6 – Striping with Dual Parity / MIN 4 disks/ Fault Tolerance YES
IP Class of Networks
A- 1.0.0.0 - 126.255.255.255 Subnet 255.0.0.0
Private 10.0.0.0-10.255.255.255
127.0.0.0 Loop back
B- 128.0.0.0- 191.255.255.255 Subnet 255.255.0.0
Private 172.16.0.0 -172.31.255.255
Example IP address: 10.20.25.25 /13
IP Class: A (255.0.0.0 or /8 is the class A “classful subnet” mask)
New subnet mask: /13 = 255.248.0.0 or 11111111.11111000.00000000.00000000
(binary)
\ / number of bits borrowed (5)
n
Subnets: (equation: 2 = X) n = number of bits borrowed or subnet CIDR minus original
classful subnet CIDR
(example: /13-/8 = 5)
25 = 32 useable subnets
Hosts per subnet: (equation: 2n - 2 = X note: n = # of bits turned off) example: /32 - /13
= 19
219 – 2 = 524,286 hosts per subnet (note: the 2 bits subtracted represent the
broadcast and network hosts)
Host per subnet examples:
11111111.11111111.11111111.00000000 = 2 8- 2 = 254
11111111.11111111.11111111.10000000 = 2 7- 2 = 126
11111111.11111111.11111111.11000000 = 26- 2 = 62
Example IP address: 10.|20.25.25 /13
^ “classful boundary” meaning that anything to the left of this line
cannot be changed, in this case the address is a class A and the
classful boundary is directly after the first octet
Useable Subnets:
10.0.0.0 subnet #0 (subnet 0 always will start with 0 in the affected octet)
10.8.0.0 subnet #1
10.16.0.0 subnet #2
10.24.0.0 subnet #3
*continued to 32 total subnets*