30 questions on general network terminology and concepts
15 questions on network operating system concepts
15 questions on network security
15 questions on equipment for network access (Wi-Fi, wireless)
10 questions on OSI model functionality
15 questions on network topologies and connectivity
Purposes of installing a network include communication, resource sharing, centralized management, remote access, and data backup.
Benefits of installing a network include automation, cost reduction, collaboration, scalability, and instant access to information.
Risks of installing a network involve security threats, data privacy issues, and downtime impacts.
Local Area Network (LAN) is limited to a small area and used for communication and resource sharing.
Wide Area Network (WAN) covers a larger geographic area and connects multiple branches.
Metropolitan Area Network (MAN) covers a city or metropolitan area and is used for high-speed internet access.
Definitions of network, node, protocol, IP address, router, switch, gateway, bandwidth, firewall, and DNS.
Novell NetWare, Linux, and Apple macOS Server are examples of network operating systems.
Integration of digital technologies like VoIP for data and voice communication.
Shared infrastructure, interoperability standards, and security measures for seamless communication.
Peer-to-peer, client-server, thin client, n-tier, internetworks, intranets, and extranets.
Characteristics and applications of each network environment.
Advantages and disadvantages of P2P and client-server networks in terms of decentralization, security, scalability, and reliability.
Application server, communication server, domain/directory server, fax server, file and print server, mail server, and web server.
Functions and examples of each type of server.
Microsoft Active Directory, LDAP servers, Novell eDirectory
Examples of directory services used for user authentication and authorization.
Fax Server
Facilitates sending and receiving fax messages over a network.
Converts digital documents to fax format and vice versa.
Examples include software-based and hardware-based fax servers.
File and Print Server
Stores and manages shared files and folders.
Provides centralized file storage and access control for users and applications.
Examples include Windows File Server, NFS servers, and CUPS print servers.
Mail Server
Handles email services for users and domains.
Examples include SMTP servers for outgoing email and IMAP/POP3 servers for incoming email.
Web Server
Hosts and serves web pages, applications, and content over the internet.
Examples include Apache HTTP Server, Nginx, and Microsoft IIS.
Printer Service
Utilizes Print Management Software for managing printers and print jobs.
Print Server is responsible for managing and processing print requests.
DNS Service
DNS Server Software implements the DNS protocol for translating domain names into IP addresses.
DNS Server resolves domain names to IP addresses and vice versa.
DHCP Service
DHCP Server Software automates the assignment of IP addresses and network configuration parameters.
DHCP Server dynamically assigns IP addresses and network settings to client devices.
Internet Services
Web Server Software hosts web pages and handles HTTP requests.
Internet Server hosts and serves web content and applications over the internet.
Incident Tracking System
Used to log, track, and manage incidents reported by users.
Key features include ticket creation, assignment, status tracking, and escalation procedures.
Knowledge Database
Repository of information, solutions, articles, and troubleshooting steps.
Features include search capabilities, version control, collaboration, and self-service portal.
Staffing and Resource Allocation
Involves allocating help desk staff, technicians, and resources to manage incidents and provide support services.
ISP Role
Provides internet connectivity, network infrastructure, data transmission, IP address allocation, internet access plans, email and web hosting, technical support, security services, and compliance with regulations.
DNS, DHCP, WINS, and Host Files
DNS (Domain Name System)
Translates domain names into IP addresses and vice versa.
Facilitates routing of network traffic between devices.
DHCP (Dynamic Host Configuration Protocol)
Dynamically assigns IP addresses and network settings to client devices.
Automates IP address allocation and simplifies network administration.
WINS (Windows Internet Name Service)
Legacy service for resolving NetBIOS computer names to IP addresses in Windows networks.
Host Files
Maps IP addresses to hostnames or specifies local network configurations.
Provides a local DNS-like mechanism for mapping hostnames to IP addresses.
Current Protocols
AppleTalk, TCP/IP, IPX/SPX, NETBEUI, DHCP
Different protocols used for network communication and addressing.
AppleTalk:
Legacy networking protocol by Apple for Macintosh computers.
Facilitated communication and file sharing in early Macintosh networks.
Key Points:
Used in older Macintosh networks.
Provided file sharing, printer sharing, and network communication.
Replaced by modern protocols like TCP/IP.
TCP/IP:
Standard networking protocol suite for internet and modern networks.
Includes TCP, IP, UDP, ICMP, and others.
Key Points:
Widely used in today's internet.
Provides reliable communication and network functions.
IPX/SPX:
Networking protocol suite by Novell for NetWare networks.
Used in older Novell NetWare networks.
Provided file sharing, print sharing, and network communication.
NETBEUI:
Legacy protocol by IBM and Microsoft for Windows-based LANs.
Used in older Windows-based LANs for file and printer sharing.
DHCP:
Dynamic Host Configuration Protocol for automated IP address assignment.
Key Points:
Widely used in modern networks.
Simplifies network administration.
IEEE:
Develops standards for networking and communications.
Standards like Ethernet, Wi-Fi, and Bluetooth ensure interoperability.
RFCs:
Documents by Internet Engineering Task Force for internet standards.
Cover TCP/IP protocols, security protocols, and more.
ISO:
Develops standards for networking and telecommunications globally.
Provides guidelines for reliable and secure networking solutions.
NIC:
Establishes physical connection between device and network.
Manages network protocols and communication processes.
MAC Address:
Unique identifier for network interfaces.
Used for addressing and identifying devices in networks.
MAC Address Uses:
Addressing and identifying devices at the data link layer.
Used in network security and troubleshooting.
Shielding:
Protects network cables from electromagnetic interference.
Crosstalk:
Unwanted interference between adjacent conductors.
Attenuation:
Reduction in signal strength during transmission.
Broadband:
High-speed internet access with faster data rates.
ISDN:
Digital network for voice, video, and data transmission.
High-speed data transmission service
Speeds from 1.544 Mbps to 44.736 Mbps
Used for transmitting large data volumes over WANs
Key Features:
High-speed data transmission (up to T3 speeds)
Connects LANs over WAN for data replication, file transfer, multimedia streaming
Replaced by technologies like MPLS
High-speed networking technology
Uses fixed-size cells for data transmission
Provides high bandwidth and low latency
Key Features:
Data transfer rates up to 622 Mbps and beyond
Supports voice, video, and data services with Quality of Service
Used in telecommunications networks, backbone networks, and high-performance computing
High-speed LAN technology using fiber-optic cables
Provides high reliability and fault tolerance
Data rates up to 100 Mbps (DAS) or 200 Mbps (SAS)
Ring topology for fault tolerance
Commonly used in mission-critical environments and backbone networks
RJ45 and RJ11 for different purposes
ST/SC/LC connectors for fiber-optic networking
MT-RJ for high-density fiber-optic installations
USB connectors for various peripherals and devices
RJ45 for Ethernet, RJ11 for telephones
ST uses twist lock, SC uses push-pull, LC has latch mechanism
MT-RJ combines two fibers into a single connector
USB Type-A, Type-B, and Type-C for different devices
Network Monitoring Tools like Wireshark, Nagios
Ping and Traceroute for network connectivity
Network Protocol Analyzers for packet analysis
Command-Line Tools for diagnostics and troubleshooting
Network Testing Tools for performance measurement
Remote Access and Management Tools for device management
Documentation and Configuration Management for network documentation
Ping measures round-trip time
Traceroute displays network path
Protocol Analyzers capture and decode packets
Command-Line Tools display network configuration
Network Testing Tools measure bandwidth and latency
Remote Access Tools manage devices remotely
Documentation Management maintains network documentation
Windows NT for user-friendly interface and centralized management
Linux for open-source flexibility and stability
Linux known for robust security features and cost-effectiveness
UNIX
Supports many networking protocols for diverse environments.
Highly scalable for large-scale networks with multiple users and devices.
Multi-user environment with concurrent access, security, and stability.
Powerful command-line interface for system administration.
High customization and flexibility for tailoring to specific network needs.
Windows OS
Describes major system files like NTOSKRNL.EXE, HAL.DLL, WINLOAD.EXE, NTDLL.DLL, KERNEL32.DLL.
macOS
Highlights components like Mach Kernel, launchd, System.framework, IOKit.framework, CoreServices.framework, and BSD subsystem.
Linux
Discusses the Linux Kernel (vmlinuz) and directories like /etc, /bin, /sbin, /usr/bin, /usr/sbin, /lib, /lib64.
Unix (e.g., FreeBSD, OpenBSD, Solaris)
Mentions the Kernel, /etc, /bin, /sbin, /usr/bin, /usr/sbin, /lib, /lib64 directories.
**Identifies the init/systemd, GNU C Library (glibc), and X Window System (X11) for Linux.
Windows OS - System Utilities
Control Panel, Settings app, and Task Manager functionalities.
Windows OS - System Administrative Tools
Computer Management, Local Group Policy Editor.
Windows OS - File-Structure Tools
File Explorer, Command Prompt, and PowerShell.
Windows OS - Hardware-Management Tools
Device Manager, Disk Management.
macOS - System Utilities
System Preferences, Activity Monitor.
macOS - System Administrative Tools
Terminal, Disk Utility.
macOS - File-Structure Tools
Finder, Terminal.
macOS - Hardware-Management Tools
System Information, Disk Utility.
Linux - System Utilities
Settings Manager, System Monitor.
Linux - System Administrative Tools
Terminal commands for system administration.
Linux - File-Structure Tools
File manager and Terminal commands.
Linux - Hardware-Management Tools
Tools for system information and disk management.
Linux - System Administrative Tools
Terminal commands for system administration.
Linux - File-Structure Tools
File manager and Terminal commands.
Linux - Hardware-Management Tools
Tools for system information and disk management.
Identify tools, diagnostic procedures, and troubleshooting techniques for operating systems.
Windows
Event Viewer: Analyze system and application logs for errors, warnings, and critical events.
Reliability Monitor: Provides a timeline of system events like crashes and software installations.
Performance Monitor: Monitors system performance metrics such as CPU and memory usage.
macOS
Console: View system logs and application logs to identify errors.
Activity Monitor: Monitor system resource usage and running processes.
Disk Utility: Check disk health and manage disk partitions.
Linux
System Log Viewer: View system logs to troubleshoot errors.
Top, Htop: Monitor system resource usage and processes.
Fsck: Check and repair filesystem errors.
Identify Symptoms
Determine specific issues like slow performance or error messages.
Isolate the Problem
Differentiate between hardware and software issues.
Check System Resources
Monitor CPU, memory, disk, and network usage.
Review Error Messages
Analyze logs and alerts to find the root cause.
Restart the System
Check for Updates
Uninstall Problematic Software
Boot into Safe Mode
Use System Restore (Windows)
Perform Clean Boot (Windows)
Check Disk Integrity
Scan for Malware
Network Protocols
TCP/IP Protocol Suite
Subnetting
Default Gateway
DNS Configuration
Network Clients
Windows Clients: Configure TCP/IP settings, join domain, install network services.
Linux Clients: Configure network interfaces, join domain, install services.
Network Adapters and Interfaces
Physical and Virtual Network Adapters
Interface Configuration
Network Bonding/Teaming
Network Security
Quality of Service (QoS)
Monitoring and Management
Hardware Compatibility
Network Infrastructure
Software Compatibility
Storage Configuration
Security Considerations
Implement strong security measures like firewalls, IDS/IPS, ACLs, and encryption protocols.
Use SSL/TLS for data protection.
Configure user authentication, authorization, and accounting mechanisms for secure access.
Enable secure remote access solutions such as VPN and SSH.
Plan user and group management policies for access permissions based on roles.
Develop a backup and recovery strategy for critical network components.
Test backup procedures regularly and document recovery processes.
Optimize network performance by tuning settings and monitoring metrics.
Consider scalability requirements for future growth in network capacity and services.
Design network architecture to accommodate scalability without compromising security.
Document network configurations, security policies, and installation procedures.
Provide training for network administrators, IT staff, and end-users.
Identify security requirements, develop, and implement a network security plan.
Understand physical and logical security issues and solutions.
Explain functions of network communications equipment and network adapters.
Install necessary hardware and software for a basic network installation.
Understand OSI model functionality and the primary function of each layer.
Explain network topologies, advantages, and disadvantages.
Identify wireless network media types and network cabling.
Install and configure network cards and connectivity methods.
Understand the operation of network components like hubs, switches, and routers.
Differentiate between switches and hubs in network segmentation.
Use DHCP for easier administration of IP addresses.
Utilize switches for both Layer 2 and Layer 3 services in the OSI model.
Load balancer sends packets to machines behind a single IP address
Modern load-balancing routers use different rules for routing traffic
"A" record in DNS server translates human names to IP addresses
Web proxy's common use is web cache and content filtering in corporate environments
Network segmentation advantages include boosting performance
Switches create separate collision domains and a single broadcast domain
Routers do not forward broadcast or multicast packets by default
DNS server uses pointer and A records
Proxy server limits access to non-work related sites and controls traffic
Windows NT was developed from the VMS platform
Novell NetWare is a network operating system
Protocol is the language for networked computers
Routers do not forward broadcast or multicast packets by default
Novell developed IPX for its network operating system
Disk Duplexing involves using multiple disk controllers
OSI model does not include Data Transmission layer
RJ-45 is not a common networking medium
Full Duplex allows data to travel in both directions on a cable
Peer-to-Peer network has no dedicated server
Gateway is used to translate between networks
Repeater extends signal distance in networking
DMA enables direct device access to memory without CPU intervention
EPROM stands for Erasable Programmable Read Only Memory
Switching Hub enables full bandwidth for each device
Routing table uses the route with fewest hops
Dynamic routers can be configured with static routes
Default gateway must be specified for network communication
LMHOSTS file resolves NetBIOS names
ARP translates IP address to MAC address
Netstat displays TCP/IP protocol and interface statistics
FTP facilitates file transfers between hosts
Ping verifies network connectivity of a remote host
NSLOOKUP verifies DNS database
Point-to-Point Protocol includes network control and link control protocols
Firewall provides secure communication between internal and public networks
EINS resolves Windows computer names to TCP/IP addresses
Replication service updates network operating systems
Service Packs update network operating systems
InoculateT scans local or mapped network drives
Knowledge Base contains fixes, Resource Kit contains educational material
Time domain reflectometer determines cable breaks
MSBACKU.EXE is the executable for Microsoft Backup for DOS
PGP verifies e-mail sender authenticity and encrypts data
Proxy Server acts as intermediary between client and server
802.11n specifies a net bit rate of 6000 Mbit/s
ipconfig /registerdns forces DNS registration from command prompt
OS/2 was a joint venture between IBM and Microsoft
Appletalk is a protocol suite historically used by Macintosh
Terminal Adapter is a specialized gateway for ISDN
WINS is Microsoft's implementation for NetBIOS Name Service
NetBIOS Host Files map host names to IP addresses
AppleTalk is a suite of networking protocols developed by Apple Inc.
TCP/IP is a protocol for communication between computers
IPX/SPX are networking protocols used on Novell NetWare
NETBEUI is a network protocol
NetBIOS Extended User Interface allows communication within a local area network
IEEE is a global association for technology development
ISO is an international standard-setting body
NIC is a network interface card.
Network Interface Card (NIC)
Contains electronic circuitry for wired or wireless communication
MAC Media Access Control
Responsible for data packet transmission to/from NIC and shared channels
Shielding
Reduces interference to network signals
Crosstalk
Occurs in microcircuits in computers, audio equipment, and network circuits
Attenuation
Refers to signal strength reduction
Broadband
High-speed, always-on internet faster than dial-up
ISDN Integrated Services Digital Network
Standards for digital transmission of voice, video, data
SMDS Switched Multimegabit Data Service
Public, packet-switched service for data exchange
ATM Asynchronous Transfer Mode
Uses time-division multiplexing for data encoding
RJ45 & RJ11
RJ11 for two lines, RJ45 for computer networking
ST Straight Tip Connector
Fiber-optic connector with bayonet plug
SC Standard Connector
Fiber-optic connector with push-pull latching
LC Lucent Connector
Miniaturized version of SC connector
MT-RJ
Popular fiber-optic connector for small devices
USB Universal Serial Bus
Interface for device communication with PCs
Modems
Transmit data over telephone or cable lines
DSL/CSU Channel Service Unit/Data Service Unit
Connects data terminal equipment to digital circuits
Bridge
Connects LANs using the same protocol
Switch
Connects devices on a network using packet switching
RAID Redundant Array of Inexpensive Disks
Uses multiple disks for fault tolerance and performance
Blades
Blade servers in enclosures for services like power and networking
SMP Symmetric Multiprocessing
Multiple processors connected to shared memory
SCSI
Parallel interface standards for peripherals
Wi-Fi
Wireless networking technology using radio waves
WiMax Worldwide Interoperability for Microwave Access
Advances IEEE 802.16 standards for BWA networks
GSM Global System for Mobile Communications
Standard for second-generation digital cellular networks
**