Chapter 2. Domain 2 Protocols and Standards

COMPTIA NETWORK+ EXAM OBJECTIVES COVERED IN THIS CHAPTER:

  • 2.1 Identify a MAC (Media Access Control) address and its parts.

  • 2.2 Identify the seven layers of the OSI (Open Systems Interconnect) model and their functions.

  • 2.3 Identify the OSI (Open Systems Interconnect) layers at which the following components operate:

    • Hubs

    • Switches

    • Bridges

    • Routers

    • NICs (Network Interface Card)

    • WAPs (Wireless Access Point)

  • 2.4 Differentiate between the following protocols in terms of routing, addressing schemes, interoperability, and naming conventions:

    • IPX/SPX (Internetwork Packet Exchange/Sequence Packet Exchange)

    • NetBEUI (Network Basic Input/Output System Extended User Interface)

    • AppleTalk/AppleTalk over IP (Internet Protocol)

    • TCP/IP (Transmission Control Protocol/Internet Protocol)

  • 2.5 Identify the components and structure of IP (Internet Protocol) addresses (IPv4, IPv6) and the required setting for connections across the Internet.

  • 2.6 Identify classful IP (Internet Protocol) ranges and their subnet masks (For example: Class A, B and C).

  • 2.7 Identify the purpose of subnetting.

  • 2.8 Identify the differences between private and public network addressing schemes.

  • 2.9 Identify and differentiate between the following IP (Internet Protocol) addressing methods:

    • Static

    • Dynamic

    • Self-assigned (APIPA (Automatic Private Internet Protocol Addressing))

  • 2.10 Define the purpose, function and use of the following protocols used in the TCP/IP (Transmission Control Protocol/Internet Protocol) suite:

    • TCP (Transmission Control Protocol)

    • UDP (User Datagram Protocol)

    • FTP (File Transfer Protocol)

    • SFTP (Secure File Transfer Protocol)

    • TFTP (Trivial File Transfer Protocol)

    • SMTP (Simple Mail Transfer Protocol)

    • HTTP (Hypertext Transfer Protocol)

    • HTTPS (Hypertext Transfer Protocol Secure)

    • POP3 / IMAP4 (Post Office Protocol version 3 / Internet Message Access Protocol version 4)

    • Telnet

    • SSH (Secure Shell)

    • ICMP (Internet Control Message Protocol)

    • ARP / RARP (Address Resolution Protocol / Reverse Address Resolution Protocol)

    • NTP (Network Time Protocol)

    • NNTP (Network News Transport Protocol)

    • SCP (Secure Copy Protocol)

    • LDAP (Lightweight Directory Access Protocol)

    • IGMP (Internet Group Multicast Protocol)

    • LPR (Line Printer Remote)

  • 2.11 Define the function of TCP / UDP (Transmission Control Protocol / User Datagram Protocol) ports.

  • 2.12 Identify the well-known ports associated with the following commonly used services and protocols:

    • 20 FTP (File Transfer Protocol)

    • 21 FTP (File Transfer Protocol)

    • 22 SSH (Secure Shell)

    • 23 Telnet

    • 25 SMTP (Simple Mail Transfer Protocol)

    • 53 DNS (Domain Name Server)

    • 69 TFTP (Trivial File Transfer Protocol)

    • 80 HTTP (Hypertext Transfer Protocol)

    • 110 POP3 (Post Office Protocol version 3)

    • 119 NNTP (Network News Transport Protocol)

    • 123 NTP (Network Time Protocol)

    • 143 IMAP4 (Internet Message Access Protocol version 4)

    • 443 HTTPS (Hypertext Transfer Protocol Secure)

  • 2.13 Identify the purpose of network services and protocols (For example: DNS (Domain Name Service), NAT (Network Address Translation), ICS (Internet Connection Sharing), WINS (Windows Internet Name Service), SNMP (Simple Network Management Protocol), NFS (Network File System), Zeroconf (Zero Configuration), SMB (Server Message Block), AFP (Apple File Protocol), and LPD (Line Printer Daemon)).

  • 2.14 Identify the basic characteristics (For example: speed, capacity, and media) of the following WAN (Wide Area Networks) technologies:

    • Packet switching

    • Circuit switching

    • ISDN (Integrated Services Digital Network)

    • FDDI (Fiber Distributed Data Interface)

    • T1 (T Carrier level 1) / E1 / J1

    • T3 (T Carrier level 3) / E3 / J3

    • OCx (Optical Carrier)

    • X.25

  • 2.15 Identify the basic characteristics of the following internet access technologies:

    • xDSL (Digital Subscriber Line)

    • Broadband Cable (Cable Modem)

    • POTS / PSTN (Plain Old Telephone Service / Public Switched Telephone Network)

    • Satellite

    • Wireless

  • 2.16 Define the function of the following remote access protocols and services:

    • RAS (Remote Access Service)

    • PPP (Point-to-Point Protocol)

    • SLIP (Serial Line Internet Protocol)

    • PPPoE (Point-to-Point Protocol over Ethernet)

    • PPTP (Point-to-Point Tunneling Protocol)

    • VPN (Virtual Private Network)

    • RDP (Remote Desktop Protocol)

  • 2.17 Identify the following security protocols and describe their purpose and function:

    • IPSec (Internet Protocol Security)

    • L2TP (Layer 2 Tunneling Protocol)

    • SSL (Secure Sockets Layer)

    • WEP (Wired Equivalent Privacy)

    • WPA (Wi-Fi Protected Access)

    • 802.1x

  • 2.18 Identify authentication protocols (For example: CHAP (Challenge Handshake Authentication Protocol), MS-CHAP (Microsoft Challenge Handshake Authentication Protocol), PAP (Password Authentication Protocol), RADIUS (Remote Authentication Dial-In User Service), Kerberos, and EAP (Extensible Authentication Protocol)).

As we mentioned in Chapter 1, "Domain 1 Media and Topologies," three components are essential in any network in order for computers to be able to communicate: a network media and topology, a common protocol, and a network client or service. In this chapter, we discuss the second component: the protocol. While many different types of protocols are in use today, all protocols have one thing in common: they are a set of rules by which a network or a group of components behave in order to communicate.

The types of protocols that you utilize will depend largely on the type of network you are using. Some protocols are much more common than others. Many protocols can stand on their own, whereas others are part of a larger suite of protocols. You can use protocols to facilitate communication as well as to secure communication, but you must understand protocols in order to make effective use of them. You should be aware of the many different protocols in use today and understand how they work together—and in some cases how they don't work together.

In this chapter, we start by discussing the factors that protocols have in common and how we can identify different types of protocols. We will also identify the types of network components that are most likely to use each type of protocol. After we have discussed the commonalities of protocols, we will then turn our attention to the differences in various protocols. We will also define each of the protocols as it relates to the entire model of communication, namely the Open System Interconnection (OSI) model. You should understand protocols in general terms as well as the many specific protocols in various protocol suites.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.16.135.225