You are on page 1of 3

0789737965_CD_Tearcard.

qxd 2/11/09 1:13 PM Page 1

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
TABLE 1 TCP/IP Suite Summary (continued) . A router that uses a link-state protocol differs from . Routing Information Protocol (RIP) is a distance-
Protocol Name Description a router that uses a distance-vector protocol vector routing protocol used for both the TCP/IP
because it builds a map of the entire network and and IPX/SPX protocol suites.
DNS Domain Name System Resolves hostnames to IP addresses. then holds that map in memory. Link-state proto- . Distance-vector protocols in use today include
DHCP Dynamic Host Configuration Automatically assigns TCP/IP information. cols include Open Shortest Path First (OSPF) and Routing Information Protocol (RIP and RIPv2),
Protocol Intermediate System-to-Intermediate System (IS-IS). Enhanced Interior Gateway Routing Protocol
SNMP Simple Network Management Used in network management systems to monitor network-attached . Hops are the means by which distance-vector (EIGRP), and Border Gateway Protocol (BGP).
Protocol devices for conditions that may need attention from an administrator. routing protocols determine the shortest way to . Switches introduce microsegmentation, by which
TLS Transport Layer Security A security protocol designed to ensure privacy between reach a given destination. Each router constitutes each connected system effectively operates on
The Network+ Cram Sheet SIP Session Initiation Protocol
communicating client/server applications.
SIP is an application-layer protocol designed to establish and
one hop, so if a router is four hops away from
another router, there are three routers, or hops,
its own dedicated network connection.
between itself and the destination.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . maintain multimedia sessions such as Internet telephony calls.
RTP Real-time Transport Protocol The Internet-standard protocol for the transport of real-time data. TABLE 4 802.11 Wireless Standards
This Cram Sheet contains the distilled key facts about the CompTIA Network+ exam. Review IEEE Frequency/ Speed Topology Transmission Access
this information as the last thing you do before you enter the testing center, paying special TABLE 2 TCP/IP Port Assignments for Commonly Used Protocols Standard Medium Range Method
attention to those areas in which you feel you need the most review. You can transfer any of
Protocol Port Assignment Protocol Port Assignment Protocol Port Assignment 802.11a 5GHz Up to 54Mbps Ad hoc/ 25 to 75 feet indoors; range can CSMA/CA
these facts from your head onto a blank sheet of paper immediately before you begin the exam.
FTP 20 HTTP 80 infrastructure be affected by building materials.
UDP Ports
FTP 21 POP3 110 802.11b 2.4GHz Up to 11Mbps Ad hoc/ Up to 150 feet indoors; range can CSMA/CA
NETWORK TECHNOLOGIES DHCP 67
infrastructure be affected by building materials.
SSH 22 NNTP 119 TFTP 69
TABLE 1 TCP/IP Suite Summary 802.11g 2.4GHz Up to 54Mbps Ad hoc/ Up to 150 feet indoors; range can CSMA/CA
Telnet 23 NTP 123 DNS 53 infrastructure be affected by building materials.
Protocol Name Description SMTP 25 IMAP4 143 BOOTPS DHCP 67 802.11n 2.4GHz/ Up to 600Mbps Ad hoc/ 175+ feet indoors; range can be CSMA/CA
IP Internet Protocol A connectionless protocol used to move data around a network. DNS 53 HTTPS 443 SNMP 161 5GHz infrastructure affected by building materials.
TCP Transmission Control Protocol A connection-oriented protocol that offers flow control, sequencing,
and retransmission of dropped packets.
. A MAC address is a 6-byte hexadecimal address that . Default gateways are the means by which a device NETWORK MEDIA AND TOPOLOGIES
UDP User Datagram Protocol A connectionless alternative to TCP used for applications that do not
require the functions offered by TCP. allows a device to be uniquely identified on the net- can access hosts on other networks for which it does
. Peer-to-peer networks are useful for only rela- . Many factors cause EMI, including computer
work. A MAC address combines numbers and the let- not have a specifically configured route.
FTP File Transfer Protocol A protocol for uploading and downloading files to and from a remote tively small networks. They are often used in monitors and fluorescent lighting fixtures.
ters A to F. An example of a MAC address is . IP is a network protocol responsible for providing
host. Also accommodates basic file-management tasks. small offices or home environments. . Copper-based media are prone to EMI, whereas
00:D0:59:09:07:51. addressing and routing information.
SFTP Secure File Transfer Protocol A protocol for securely uploading and downloading files to and from . Client/server networks, also called server-centric fiber-optic cable is immune to it.
. A Class A TCP/IP address uses only the first octet to . The TCP/IP suite is used by all major operating
a remote host. Based on SSH security. networks, have clients and servers. Servers pro- . Data signals might also be subjected to crosstalk,
represent the network portion, a Class B address uses systems and is a routable protocol.
TFTP Trivial File Transfer Protocol A file transfer protocol that does not have the security or error vide centralized administration, data storage, and which occurs when signals from two cables, or
two octets, and a Class C address uses three octets.
checking of FTP. TFTP uses UDP as a transport protocol and . DHCP/BOOTP is a network service that automatically security. The client system requests data from the from wires within a single cable, interfere with
. Class A addresses span from 1 to 126, with a default assigns IP addressing information. server and displays the data to the end user.
therefore is connectionless. each other.
subnet mask of 255.0.0.0.
SMTP Simple Mail Transfer Protocol A mechanism for transporting email across networks. . In a network that does not use DHCP, you need to . The bus network topology is also known as a lin- . The weakening of data signals as they traverse
. Class B addresses span from 128 to 191, with a watch for duplicate IP addresses that prevent a user ear bus because the computers in such a net-
HTTP Hypertext Transfer Protocol A protocol for retrieving files from a web server. the media is called attenuation.
default subnet mask of 255.255.0.0. from logging on to the network. work are linked using a single cable called a
HTTPS Hypertext Transfer Protocol A secure protocol for retrieving files from a web server. . Half-duplex mode enables each device to both
. Class C addresses span from 192 to 223, with a . Subnetting is a process in which parts of the host ID trunk or backbone.
Secure transmit and receive, but only one of these
default subnet mask of 255.255.255.0. portion of an IP address are used to create more . If a terminator on a bus network is loose, data processes can occur at a time.
POP3 Post Office Protocol version 3/ Used to retrieve email from the server on which it is stored. Can . The 127 network ID is reserved for the local loopback. network IDs. communications might be disrupted. Any other
/IMAP4 Internet Message Access only be used to retrieve mail. IMAP and POP cannot be used to . Full-duplex mode enables devices to receive and
. Application protocols map to the application, . APIPA is a system used on Windows to automatically break in the cable will cause the entire network
Protocol version 4 send mail. transmit simultaneously. A 100Mbps network card
presentation, and session layers of the OSI model. self-assign an IP address in the 169.x.x.x range in segment to fail.
in full-duplex mode can operate at 200Mbps.
Telnet Telnet Allows sessions to be opened on a remote host. Application protocols include AFT, FTP, SFTP, TFTP, the absence of a DHCP server. . In a star configuration, all devices on the network
. 802.11b/g uses 2.4GHz RF for transmissions,
SSH Secure Shell Allows secure sessions to be opened on a remote host. NCP, NTP, NNTP, SSH, Telnet, SCP, LDAP, and SNMP. . DNS resolves hostnames to IP addresses. connect to a central device, and this central device
whereas 802.11a uses 5GHz RF. 802.11n uses
ICMP Internet Control Message Used on IP-based networks for error reporting, flow control, and . Transport protocols map to the transport layer of the . NAT translates private network addresses into creates a single point of failure on the network.
2.4 or 5GHz.
Protocol route testing. OSI model and are responsible for transporting data public network addresses. . The wired mesh topology requires each computer
. UTP cabling is classified by category. Categories
ARP Address Resolution Protocol Resolves IP addresses to MAC addresses to enable communication across the network. Transport protocols include ATP, on the network to be individually connected to every
5/5e and 6 offer transmission distances of
between devices. NetBEUI, SPX, TCP, and UDP. other device. This configuration provides maximum
100 meters.
RARP Reverse Address Resolution Resolves MAC addresses to IP addresses. reliability and redundancy for the network.
. F-type connectors are used with coaxial cable,
Protocol . A wireless infrastructure network uses a centralized
TABLE 3 Comparing IPv4 and IPv6 most commonly to connect cable modems and TVs.
NTP Network Time Protocol Used to communicate time synchronization information between devices. device known as a wireless access point (AP). Ad
F-type connectors are a screw-type connector.
Address Feature IPv4 Address IPv6 Address hoc wireless topologies are a peer-to-peer configu-
NNTP Network News Transport Facilitates the access and downloading of messages from ration and do not use a wireless access point. . SC, ST, LC, and MT-RJ connectors are associated
Protocol newsgroup servers. Loopback address 127.0.0.1 0:0:0:0:0:0:0:1 (::1) with fiber cabling. ST connectors offer a twist-
. 802.2, the LLC sublayer, defines specifications for
SCP Secure Copy Protocol Allows files to be copied securely between two systems. Uses Secure Network-wide addresses IPv4 public address ranges Global unicast IPv6 addresses type attachment, and SC, LC, and MT-RJ
the Logical Link Control (LLC) sublayer in the 802
Shell (SSH) technology to provide encryption services. Private network addresses 10.0.0.0 Site-local address ranges (FEC0::) connectors are push-on.
standard series.
LDAP Lightweight Directory A protocol used to access and query directory services systems 172.16.0.0 . RJ-45 connectors are used with UTP cable and are
. 802.3 defines the carrier sense multiple access
Access Protocol such as Novell eDirectory and Microsoft Active Directory. 192.168.0.0 associated with networking applications. RJ-11
with collision detection (CSMA/CD) media access
IGMP Internet Group Provides a mechanism for systems within the same multicast group Autoconfigured addresses IPv4 automatic private IP Link-local addresses of FE80:: prefix connectors are used with telephone cables.
method used in Ethernet networks. This is the
Management Protocol to register and communicate with each other. addressing (169.254.0.0) most popular networking standard used today. . Plenum-rated cables are used to run cabling
through walls or ceilings.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
0789737965_CD_Tearcard.qxd 2/11/09 1:13 PM Page 2

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Ethernet Standards NETWORK DEVICES . In fragment-free switching, the switch reads only the . PoE is a technology that allows electrical power to be
part of the packet that enables it to identify fragments transmitted over twisted-pair Ethernet cable. The
TABLE 5 Summary of 802.3u Fast Ethernet Characteristics TABLE 9 Network Devices Summary of a transmission. power is transferred, along with data, to provide
Characteristic 100BaseTX 100BaseT4 100BaseFX Device Description Key Points . Switches reduce collisions through a process called power to remote devices. These devices may include
Transmission method Baseband Baseband Baseband microsegmentation. Each port on a switch is a dedicated remote switches, wireless access points, VoIP equip-
Hub Connects devices on an Ethernet Does not perform any tasks besides signal regeneration. ment, and more.
Speed 100Mbps 100Mbps 100Mbps link between the switch and the connected computer.
twisted-pair network.
. Hubs and switches have two types of ports: medium- . The term trunking refers to the use of multiple net-
Distance 100 meters 100 meters 412 meters (multimode, half-duplex); Switch Connects devices on a Forwards data to its destination by using the MAC work cables or ports in parallel to increase the link
10,000 meters (single-mode, full-duplex) dependent interface (MDI) and medium-dependent
twisted-pair network. address embedded in each packet. speed beyond the limits of any one cable or port.
interface crossed (MDI-X).
Cable type Category UTP, STP Category 3, 4, 5 Fiber-optic 5 or greater Repeater Regenerates data signals. The function a repeater provides typically is built into . Port mirroring provides a way to monitor network
. A straight-through cable is used to connect systems
Connector type RJ-45 RJ-45 SC, ST other devices, such as switches. traffic and monitor how well a switch is working.
to the switch or hub using the MDI-X ports.
Bridge Connects LANs to reduce overall Allows or prevents data from passing through it by . Port authentication involves authenticating users on a
TABLE 6 Summary of IEEE 802.3z Gigabit Ethernet Characteristics . In a crossover cable, wires 1 and 3 and wires 2 and
network traffic. reading the MAC address. port-by-port basis. One standard that specifies port
6 are crossed.
Characteristic 1000BaseSX 1000BaseLX 1000BaseCX Router Connects networks. Uses the software-configured network address to make authentication is the 802.1X standard, often associ-
Transmission method Baseband Baseband Baseband forwarding decisions. ated with wireless security.
Speed 1000Mbps 1000Mbps 1000Mbps Gateway Translates from one data format Can be hardware- or software-based. Any device that
to another. translates data formats is called a gateway. NETWORK MANAGEMENT
Distance Half-duplex 275 Half-duplex 316 25 meters for both
(62.5-micron multimode (multimode and full-duplex and CSU/DSU Translates digital signals used on CSU/DSU functionality is sometimes incorporated into
a LAN to those used on a WAN. other devices, such as a router with a WAN connection. TABLE 10 Summary of the OSI Model
fiber); half-duplex 316 single-mode fiber); half-duplex operations
(50-micron multimode full-duplex 550 (multimode Modem Provides serial communication Modulates the digital signal into analog at the sending OSI Layer Description
fiber); full-duplex 275 fiber); full-duplex 5000 capabilities across phone lines. end and performs the reverse function at the receiving end. Application Provides access to the network for applications and certain end-user functions. Displays incoming
(62.5-micron multimode (single-mode fiber) Network card Enables systems to connect to Can be an add-in expansion card, PCMCIA card, or information and prepares outgoing information for network access.
fiber); full-duplex 550 the network. built-in interface. Presentation Converts data from the application layer into a format that can be sent over the network. Converts
(50-micron multimode fiber) Media converter Interconnects older technology A hardware device that connects newer Gigabit Ethernet data from the session layer into a format that the application layer can understand. Encrypts and
Cable type 62.5/125 and 50/125 62.5/125 and 50/125 Shielded copper cable with new technology. technologies with older 100BaseT networks or older decrypts data. Provides compression and decompression functionality.
multimode fiber multimode fiber; two copper standards with fiber. Session Synchronizes the data exchange between applications on separate devices. Handles error detection
10-micron single-mode Firewall Provides controlled data access Can be hardware- or software-based and is an and notification to the peer layer on the other device.
optical fibers between networks. essential part of a network’s security strategy. Transport Establishes, maintains, and breaks connections between two devices. Determines the ordering and
Connector type Fiber-optic connectors Fiber-optic connectors Nine-pin shielded DHCP server Automatically distributes IP Assigns all IP information, including IP address, subnet priorities of data. Performs error checking and verification and handles retransmissions if necessary.
connector information. mask, DNS, gateway, and more. Network Provides mechanisms for the routing of data between devices across single or multiple network
Load balancer Distributes the network load. Load balancing increases redundancy and performance by segments. Handles the discovery of destination systems and addressing.
TABLE 7 Summary of 1000BaseT Characteristics distributing the load to multiple servers. Data link Has two distinct sublayers: LLC and MAC. Performs error detection and handling for the transmitted
Characteristic Description Multifunction Combines network services. A hardware device that combines multiple network signals. Defines the method by which the medium is accessed. Defines hardware addressing
Transmission method Baseband device services into a single device, reducing cost and easing through the MAC sublayer.
administrative difficulty. Physical Defines the network’s physical structure. Defines voltage/signal rates and the physical connection
Speed 1000Mbps
DNS server Provides name resolution from Answers clients’ requests to translate hostnames methods. Defines the physical topology.
Total distance/segment 75 meters
hostnames to IP addresses. into IP addresses.
Cable type Category 5 or better
Bandwidth shaper Manages network bandwidth. Monitors and controls bandwidth usage.
Connector type RJ-45 . As data is passed up or down through the OSI model . The logical topology refers to how a network looks to
Proxy server Manages client Internet requests. Serves two key network functions: increases network structure, headers are added (going down) or the devices that use it—how it functions.
performance by caching, and filters outgoing client removed (going up) at each layer—a process called
TABLE 8 Summary of 802.3ae Characteristics . RAID 0 offers no fault tolerance and improves I/O
requests. encapsulation (when added) or decapsulation (when performance. It requires a minimum of two disks.
Fiber 62.5-micron multimode fiber 50-micron multimode fiber Single-mode fiber CSU/DSU A conversion device that connects Acts as a translator between the LAN data format and removed).
. RAID 1, disk mirroring, provides fault tolerance and
SR/SW Up to 33 m 300 m Not used a LAN and WAN. the WAN data format. . Mapping network devices to the OSI model: requires two hard disks. Separate disk controllers
LR/LW Not used Not used 10 km Hub: Physical (Layer 1) can be used—a strategy known as disk duplexing.
ER/EW Not used Not used 40 km . Computers connect to a hub via a length of twisted- . A hub forwards data to all ports, regardless of Switch: Data link (Layer 2) . RAID 5, disk striping with distributed parity, requires
pair cabling. whether the data is intended for the system connect- Bridge: Data link (Layer 2) a minimum of three disks—the total size of a single
. Active hubs regenerate a data signal before forward- ed to the port. Rather than forwarding data to all the disk being used for the parity calculation.
Horizontal and Vertical Cable and Cross-Connect connected ports, a switch forwards data only to the Router: Network (Layer 3)
ing it to all the ports on the device and require a . In a full backup, all data is backed up. Full backups
power supply. port on which the destination system is connected. NIC: Data link (Layer 2)
. The horizontal cabling extends from the telecom- . Main Distribution Frame (MDF) and Intermediate do not use the archive bit, but they do clear it.
munications outlet, or network outlet with RJ-45 Distribution Frame (IDF) define types of wiring . Passive hubs, which today are seen only on older . By channeling data only to the connections that should AP: Data link (Layer 2)
. Incremental backups back up all data that has
connectors, at the client end. It includes all cable closets. The main wiring closet for a network networks, do not need power, and they don’t receive it, switches reduce the number of collisions . Shaping by application: Administrators can control changed since the last full or incremental backup.
from that outlet to the telecommunication room typically holds the majority of the network gear, regenerate the data signal. that happen on the network. traffic based on the types of network traffic and They use and clear the archive bit.
to the horizontal cross-connect. including routers, switches, wiring, servers, . A hub takes data from one of the connected sending . A switch makes forwarding decisions based on the assigning that category a bandwidth limit.
. Differential backups back up all data since the last
. Vertical cable, or backbone cable, refers to the and more. devices and forwards the message to all the other Media Access Control (MAC) addresses of the . Documentation should also include diagrams of the full or differential backup. They use the archive bit
media used to connect telecommunication rooms, . A network’s demarcation point refers to the ports on the hub. devices connected to it to determine the correct port. physical and logical network design. The physical but do not clear it.
server rooms, and remote locations and offices. connection point between the ISP’s part of . The method of sending data to all systems regardless . In cut-through switching, the switch begins to forward topology refers to how a network is physically
. GFS (grandfather, father, son) is a commonly
the network and the customer’s portion of the of the intended recipient is called broadcasting. On the packet as soon as it is received. constructed—how it looks.
implemented backup strategy.
network. busy networks, broadcast communications can have . In store-and-forward switching, the switch waits to
a significant impact on overall network performance. receive the entire packet before beginning to forward it.

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
0789737965_CD_Tearcard.qxd 2/11/09 1:13 PM Page 3

Steps in the Network Troubleshooting . netstat is used to view both inbound and outbound . PPPoE (Point-to-Point Protocol over Ethernet) is a
Methodology TCP/IP network connections. protocol used to connect multiple network users on
1. Information gathering: identify symptoms and . nbtstat is used to display protocol and statistical an Ethernet local area network to a remote site
problems. information for NetBIOS over TCP/IP connections. through a common device.
2. Identify the affected areas of the network. . ipconfig shows the IP configuration information . The RDP, VNC, and ICA protocols allow client systems
for all NICs installed in a system. to access and run applications on a remote system,
3. Determine if anything has changed.
using that system’s resources. Only the user interface,
4. Establish the most probable cause. . ipconfig /all is used to display detailed TCP/IP
keystrokes, and mouse movement are transferred
configuration information.
5. Determine if escalation is necessary. between the client and server computers.
. ipconfig /renew is used on Windows operating
6. Create an action plan and solution identifying . AAA defines a spectrum of security measures,
systems to renew the system’s DNS information.
potential effects. policies, and procedures that are combined to create
. When looking for client connectivity problems using a secure network.
7. Implement and test the solution.
ipconfig, you should ensure that the gateway is
8. Identify the results and effects of the solution. . Authentication refers to the mechanisms used to
set correctly.
9. Document the solution and the entire process. verify the identity of the computer or user attempting
. The ifconfig command is the Linux equivalent of to access a particular resource. This includes
the ipconfig command. passwords and biometrics.
NETWORK TOOLS
. The nslookup command is a TCP/IP diagnostic tool . Authorization is the method used to determine if an
. A wire crimper is a tool that you use to attach media used to troubleshoot DNS problems. dig can be used
connectors to the ends of cables. authenticated user has access to a particular
for the same purpose on UNIX and Linux systems. resource. This is commonly determined through
. Wire strippers come in a variety of shapes and sizes.
group association—a particular group may have a
Some are specifically designed to strip the outer NETWORK SECURITY specific level of security clearance.
sheathing from coaxial cable, and others are
. A firewall is considered a logical security measure . Accounting refers to the tracking mechanisms used
designed to work with UTP cable.
and is one of the cornerstone concepts of network to keep a record of events on a system.
. Punchdown tools are used to attach twisted-pair security.
network cable to connectors within a patch panel. . Terminal Access Controller Access Control System+
. At its most basic, a firewall is a device that has more (TACACS+) is a security protocol designed to provide
Specifically, they connect twisted-pair wires to
than one network interface and manages the flow of centralized validation of users who are attempting to
the IDC.
network traffic between those interfaces. gain access to a router or Network Access Server
. Voltage event recorders are used to monitor the
. A DMZ is part of a network on which you place (NAS).
quality of power used on the network or by network
servers that must be accessible by sources both . Kerberos is one part of a strategic security solution
hardware.
outside and inside your network. that provides secure authentication services to users,
. Temperature monitors keep track of the temperature
. An IDS can detect malware or other dangerous applications, and network devices. It eliminates the
in wiring closets and server rooms.
traffic that may pass undetected by the firewall. insecurities caused by passwords being stored or
. Toner probes are used to locate cables hidden in Most IDSs can detect potentially dangerous content transmitted across the network.
floors, ceilings, or walls and to track cables from the by its signature. . A public key infrastructure (PKI) is a collection of
patch panel to their destination.
. An IPS is a network device that continually scans the software, standards, and policies that are combined
. Protocol analyzers can be hardware- or software- network, looking for inappropriate activity. It can shut to allow users from the Internet or other unsecured
based. Their primary function is to analyze network down any potential threats. public networks to securely exchange data.
protocols such as TCP, UDP, HTTP, FTP, and more.
. An access control list (ACL) typically refers to specific . A public key is a nonsecret key that forms half of a
. A TDR is a device used to send a signal through a access permissions assigned to an object or device cryptographic key pair that is used with a public
particular medium to check the cable’s continuity. on the network. For example, wireless routers can be key algorithm. The public key is freely given to all
. An OTDR performs the same basic function as a wire configured to restrict who can and cannot access the potential receivers.
media tester, but on optical media. router based on the MAC address. . A private key is the secret half of a cryptographic
. Packet sniffers are either a hardware device or . When a port is blocked, you disable the capability key pair that is used with a public key algorithm. The
software that eavesdrop on transmissions that are for traffic to pass through that port, thereby filtering private part of the public key cryptography system is
traveling throughout the network. that traffic. never transmitted over a network.
. Throughput testers identify the rate of data delivery . A VPN extends a LAN by establishing a remote . A certificate is a digitally signed statement that
over a communication channel. connection, a connection tunnel, using a public associates the credentials of a public key to the
. Port scanners are a software-based utility. They are a network such as the Internet. identity of the person, device, or service that holds
security tool designed to search a network host for . PPTP creates a secure tunnel between two points on the corresponding private key.
open ports on a TCP/IP-based network. a network, over which other connectivity protocols,
. The netstat -a command can be used on a such as PPP, can be used. This tunneling functionality
Windows-based system to see the status of ports. is the basis for VPNs.
. You can ping the local loopback adapter by using the . VPNs are created and managed by using protocols
command ping 127.0.0.1. If this command is such as PPTP and L2TP, which build on the
successful, you know that the TCP/IP suite is functionality of PPP. This makes it possible to create
installed correctly on your system and is functioning. dedicated point-to-point tunnels through a public
. tracert reports how long it takes to reach each network such as the Internet.
router in the path. It’s a useful tool for isolating . L2TP authenticates the client in a two-phase process.
bottlenecks in a network. The tracert command It authenticates the computer and then the user.
performs the same task on UNIX and Linux systems. . To create secure data transmissions, IPSec uses two
. ARP is the part of the TCP/IP suite whose function is separate protocols: Authentication Header (AH) and
to resolve IP addresses to MAC addresses. Encapsulating Security Payload (ESP).

You might also like