CompTIA Network+ Exam Review

studied byStudied by 7 people
5.0(1)
Get a hint
Hint

Exam Overview

1 / 439

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

440 Terms

1

Exam Overview

knowt flashcard image
New cards
2

Clients

Devices that users use to access the network (e.g., workstations, laptops, tablets)

New cards
3

Servers

Provide resources to the network (e.g., email servers, file servers)

New cards
4

Hubs

Older technology connecting devices but not commonly used due to limitations

New cards
5

Switches

Smarter hubs that ensure security and efficient bandwidth utilization

New cards
6

Wireless Access points (WAPs)

Enable wireless devices to connect to a wired network using radio frequency waves

New cards
7

Routers

Connect different networks, make intelligent forwarding decisions based on IP addresses

New cards
8

Firewalls

Security barrier between internal network and the internet, monitor and control traffic

New cards
9

Load Balancers

Distribute network/application traffic across servers, preventing bottlenecks

New cards
10

Proxy Servers

Act as intermediaries between user devices and the internet, enhancing security and privacy

New cards
11

Intrusion Detection System (IDS)

Detect unauthorized access or anomalies

New cards
12

Intrusion Prevention System (IPS)

Detect and take action to prevent intrusion

New cards
13

Controllers

Manage flow control in software-defined networking (SDN), offering flexibility and efficiency

New cards
14

Network-attached Storage (NAS) Devices

Dedicated file storage systems providing data access to authorized clients

New cards
15

Storage Area Networks (SANs)

High-speed networks for consolidated block-level data storage, enhancing accessibility

New cards
16

Media

Physical materials for data transmission (e.g., copper cables, fiber optic cables)

New cards
17

Wide Area Network (WAN) Links

Connect networks over large areas (e.g., between cities), essential for global connectivity

New cards
18

Key Takeaway

Understanding these network components is crucial for efficient and secure data transmission in information technology, aiding in network design, management, problem-solving, and security implementation

New cards
19

Client/Server Model

■ Utilizes a dedicated server for centralized access to files, scanners, printers, and resources

■ Easy administration and backup due to a central server

New cards
20

Benefits to Client/Server Model

● Centralized administration

● Easier management

● Better scalability

New cards
21

Drawbacks to Client/Server model

● Higher cost

● Requires dedicated hardware and specialized skillset

New cards
22

Peer-to-Peer Model

■ Direct sharing of resources among peers (laptops, desktops)

■ Difficult administration and backup due to dispersed files on different machines

Drawbacks

● Redundancy

● Complex management

● Scalability issues

■ Usefulfor low-cost setups, exemplified by Napster a decade ago

New cards
23

Benefits to Peer-to-Peer Model

● Low-cost

● No specialized infrastructure or hardware

New cards
24

Drawbacks to Peer-to-Peer Model

● Decentralized management

● Poor scalability for large networks

New cards
25

Personal Area Network (PAN)

■ Smallest network type

■ Covers about 10 feet or less

■ Examples are Bluetooth and USB

■ Connection within arm's reach

New cards
26

Local Area Network (LAN)

■ Common in office buildings

■ Limited distance

● Up to 100 meters

● CAT5 cabling

■ Can use WiFi (IEEE 802.11) or Ethernet (IEEE 802.3)

■ Examples include Office, school, and home

New cards
27

Campus Area Network (CAN)

■ Building-centric LAN

■ Spans numerous buildings in an area

■ Covers several miles

■ Examples are College campuses, business parks, military bases

New cards
28

Metropolitan Area Network (MAN)

■ Connects locations across the entire city

■ Larger than CAN ● Up to 25 miles

■ Examples are City departments, multiple campuses in a city

New cards
29

Wide Area Network (WAN)

■ Connects geographically disparate internal networks

■ Large geographic coverage

● Across states, countries, or globally

■ Can consist of lease lines or VPNs.

■ Examples are Internet, private connections between offices across the country

New cards
30

Important Standards

knowt flashcard image
New cards
31

Network Topology

■ Refers to the arrangement of elements in a computer network

■ Includes links, nodes, clients, and servers

New cards
32

Diagram Types

■ Physical Topology

● Describes physical cabling and device connections

● Represents real-world layout using floorplans

■ Logical Topology

● Describes how data flows in the network

● Focuses on the logical connection rather than physical placement

New cards
33

Point-to-Point Topology

● Direct connection between two devices

● Simple, reliable for small-scale connections

● Not scalable

● Used in WAN connections for remote offices

New cards
34

Ring Topology

● Circular data path with each device connected to two others

● Unidirectional flow prevents collisions

● Creates a single point of failure situation unless there are redundant connections for failover

● Common in FDDI (Fiber Distributed Data Interface) for long-distance fiber optic networks.

New cards
35

Bus Topology

knowt flashcard image
New cards
36

Star Topology

knowt flashcard image
New cards
37

Hub-and-Spoke Topology

knowt flashcard image
New cards
38

Mesh Topology

knowt flashcard image
New cards
39

Infrastructure Mode

knowt flashcard image
New cards
40

Ad Hoc Mode

knowt flashcard image
New cards
41

Wireless Mesh

■ Use Cases for Wireless Mesh

● Post-disaster scenarios

● Humanitarian assistance missions

● Combining microwave, satellite, cellular, and Wi-Fi for reliable and redundant networks

○ Satellite for long distances

○ Microwaves for medium ranges

○ Wireless for short distances

<p>■ Use Cases for Wireless Mesh </p><p>● Post-disaster scenarios </p><p>● Humanitarian assistance missions </p><p>● Combining microwave, satellite, cellular, and Wi-Fi for reliable and redundant networks </p><p>○ Satellite for long distances </p><p>○ Microwaves for medium ranges </p><p>○ Wireless for short distances</p>
New cards
42

Datacenter

Any facility composed of networked computers and storage that businesses and other organizations use to organize, process, store, and disseminate large amounts of data

New cards
43

Core Layer

● Houses high-performance routers, merging geographically separated networks

● Backbone of the network

New cards
44

Distribution/Aggregation Layer

● Provides boundary definition through access lists and filters

● Defines policies for the network at large

New cards
45

Access/Edge Layer

● Connects endpoint devices using regular switches

● Used to ensure the packets are converted to frames and delivered to the correct end point devices

New cards
46

Collapsed Core

● Network architecture where the core and distribution layers are merged into a single layer

● Creates a two-tiered core

● Simplified architecture for medium to small datacenters

● May not be suitable for larger and more complex networks

New cards
47

Spine and Leaf Architecture

knowt flashcard image
New cards
48

North-South Traffic

● Traffic that enters (Southbound traffic) or leaves (North traffic) data center from a system outside

New cards
49

East-West Traffic

● Dataflow within a datacenter

● Example: In a spine and leaf architecture, all data flow between servers is considered east-west traffic

● Prevalent with SDN, virtualization, and converged networks

New cards
50

Open Systems Interconnect Model (OSI)

■ Developed in 1977 by the International Organization for Standardization

■ OSI is a reference model

● Used to categorize the functions of a network

● Useful for troubleshooting

New cards
51

Layers

knowt flashcard image
New cards
52

Names of data as it flows through the OSI model

knowt flashcard image
New cards
53

Layer 1 (Physical)

■ First layer of the OSI model where transmission of bits across the network occurs and includes physical and electrical network characteristics

■ Data type occurs as bits

● Binary bits represented as a series of 1s and 0s

<p>■ First layer of the OSI model where transmission of bits across the network occurs and includes physical and electrical network characteristics </p><p>■ Data type occurs as bits </p><p>● Binary bits represented as a series of 1s and 0s</p>
New cards
54

Transition Modulation

■ Switching between levels to represent 1 or 0

● Copper Wire (Cat5/Cat6) – Uses voltage (0V for 0, +5V/-5V for 1)

● Fiber Optic Cable– Uses light (on for 1, off for 0)

New cards
55

Connector Standards

■ RJ-45Connector– Used in CAT5/CAT6 cables

■ Wiring Standards

● TIA/EIA-568A

● TIA/EIA-568B

■ Crossover cables– TIA/EIA-568A on one end, and TIA/EIA-568B on the other end

■ Straight-through cables– TIA/EIA-568B on both ends

New cards
56

Asynchronous Communication

● Start and stop bits for out-of-sync data transmission

New cards
57

Synchronous Communication

● Real-time communication using a common time source

New cards
58

Broadband

● Divides bandwidth into separate channels (e.g., cable TV)

New cards
59

Baseband

● Uses all frequency of the cable all the time (e.g., telephone)

New cards
60

Multiplexing

■ Involves taking some limited amount of resource and using it more efficiently

● Allows multiple people to use a baseband connection at the same time

New cards
61

Time Division Multiplexing (TDM)

● Allocates dedicated time slots

New cards
62

Statistical Time Division Multiplexing (StatTDM)

● Dynamically allocates time slots based on when people need it

New cards
63

Frequency Division Multiplexing (FDM)

● Divides the medium into channels

New cards
64

Data Link Layer (Layer 2)

■ Responsible for packaging bits from Layer 1 into frames and transmitting them across the network
■ Performs error detection and correction, identifies devices using MAC addresses, and provides flow control

<p>■ Responsible for packaging bits from Layer 1 into frames and transmitting them across the network <br>■ Performs error detection and correction, identifies devices using MAC addresses, and provides flow control</p>
New cards
65

MAC Address (Media Access Control Address)

■ A means for identifying a device physically and allowing it to operate on a logical topology ■ A unique 48-bit physical addressing system is assigned to every network interface card (NIC) produced

● Written in hexadecimal numbers

● First 24 bits– identify the manufacturer

● Remaining 24 bits– identify the specific device

■ Crucial for logical topology– identifying devices on the network

New cards
66

Logical Link Control (LLC)

■ Provides connection services and acknowledges message receipt, ensuring controlled data flow

■ Most basic form offl ow control

● Limits data sent by a sender and prevents receiver overwhelm

■ Uses a checksum to detect corrupted data frames

New cards
67

Layer 3 (Network Layer)

■ Concerned with routing and forwarding traffic using logical addresses

<p>■ Concerned with routing and forwarding traffic using logical addresses</p>
New cards
68

IP Variants - common logical addressing schemes

knowt flashcard image
New cards
69

Packet Switching (Routing)

● Data is divided into packets and then forwarded

● Most commonly used method

New cards
70

Circuit Switching

● A dedicated communication link is established between two devices

New cards
71

Message Switching

● Data is divided into messages which may be stored and then forwarded

New cards
72

Route Discovery and Selection

knowt flashcard image
New cards
73

Connection Services at Layer 3

Augment Layer 2 services

■ Involves flow control

● Prevents sender from overwhelming the receiver

New cards
74

Packet reordering

● Ensures data packets arrive and are reassembled in the correct order

New cards
75

Internet Control Message Protocol (ICMP)

knowt flashcard image
New cards
76

Layer 4 (Transport Layer)

■ Dividing line between the upper layers and the lower layers of the OSI model

■ Upper Layers

● Transport

● Session

● Presentation

● Application

<p>■ Dividing line between the upper layers and the lower layers of the OSI model </p><p>■ Upper Layers </p><p>● Transport </p><p>● Session </p><p>● Presentation </p><p>● Application</p>
New cards
77

Segments

■ Data Type in Transport Layer

New cards
78

TCP (Transmission Control Protocol)

● Connection-oriented protocol that is a reliable way to transport segments across the network

● With acknowledgement

● Uses Three-Way Handshake

○ SYN–synchronization

○ SYN-ACK–synchronization- acknowledgement

○ ACK–acknowledgement

● Windowing for flow control

● Used for all network data that needs to be assured to get to its final destination

Segment–datatype for TCP

New cards
79

UDP (User Datagram Protocol)

● A connectionless protocol that is an unreliable way to transport segments (datagram)

● Used for audio and visual streaming

● No three-way handshake and less overhead

● No acknowledgment or retransmission
Datagram–datatype for UDP

New cards
80

Windowing

■ Allows clients to adjust the amount of data in each segment during transmission

■ Optimize throughput and bandwidth

■ Open or close window based on retransmissions

New cards
81

Buffering

■ Occurs when devices allocate memory to store segments if bandwidth is not readily available

■ Buffer

● Temporary storage for segments

■ Prevents overflow by clearing segments

New cards
82

Layer 5 (Session Layer)

■ Manages sessions, ensuring separate conversations to prevent data intermingling

<p>■ Manages sessions, ensuring separate conversations to prevent data intermingling</p>
New cards
83

Setting Up Session

■ Checking of user credentials and assigning numbers to sessions to help identify

New cards
84

Maintaining Session

■ Continuous data transfer between parties

■ If connection breaks, it will require re-establishment

■ Includes acknowledgement of data

New cards
85

Tearing Down a Session

■ Ending a session once communication goals are achieved

■ Mutual agreement or one party disconnects

New cards
86

Layer 6 (Presentation Layer)

■ Responsible for formatting data for exchange and securing it through encryption

New cards
87

Data Formatting

knowt flashcard image
New cards
88

Encryption

Using to scramble data in transit to keep it secure and provide data confidentiality

New cards
89

Transport Layer Security (TLS)

● Ensures secure data transfer

● Creates an encrypted tunnel, protecting sensitive information

New cards
90

Control how ASCII Text is displayed on the screen

● HTML

● XML

● PHP

● JavaScript

New cards
91

Different ways of displaying text using ones and zeros

● ASCII

● Unicode

● EBCDIC

New cards
92

Different graphical representations of 1s and 0s

● GIFs

● JPEGs

● TIFFs

● SVGs

● PNGS

New cards
93

1s and 0s formatted to create watchable videos

● MP4s

● MPEGs

● MOV

New cards
94

Scrambles data to provide confidentiality and security during transit and storage

● TLS

● SSL(Secure Sockets Layer)

New cards
95

Layer 7 (Application Layer)

■ Provides application-level services where users communicate with the computer

■ Focus on lower-level applications

● File transfer

● Network transfer

New cards
96

Application Services

knowt flashcard image
New cards
97

Service Advertisement

■ Applications send announcements to other devices on the network

■ Devices advertise the services they offer

● Printers and file servers managed by Active Directory

● Self-advertising devices like wireless printers

New cards
98

Email Applications (Layer 7 Protocols)

● POP3

● IMAP

● SMTP

New cards
99

Web Browsing (Layer 7 Protocol)

● HTTPS

● HTTP

New cards
100

Layer 7 Protocol (DNS)

Domain Name Services

New cards

Explore top notes

note Note
studied byStudied by 8 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 10679 people
Updated ... ago
4.7 Stars(34)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 3901 people
Updated ... ago
4.7 Stars(11)

Explore top flashcards

flashcards Flashcard47 terms
studied byStudied by 45 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard61 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard22 terms
studied byStudied by 145 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard44 terms
studied byStudied by 35 people
Updated ... ago
4.8 Stars(5)
flashcards Flashcard44 terms
studied byStudied by 15 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard163 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard188 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard151 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)