Sei sulla pagina 1di 23

BrainBuzz

Cramsession

TM


Notice: While every precaution has been taken in the preparation of this material, neither the author nor BrainBuzz.com
assumes any liability in the event of loss or damage directly or indirectly caused by any inaccuracies or incompleteness of
the material contained in this document. The information in this document is provided and distributed as-is, without any
expressed or implied warranty. Your use of the information in this document is solely at your own risk, and Brainbuzz.com
cannot be held liable for any damages incurred through the use of this material. The use of product names in this work is
for information purposes only, and does not constitute an endorsement by, or affiliation with BrainBuzz.com. Product
names used in this work may be registered trademarks of their manufacturers. This document is protected under US and
international copyright laws and is intended for individual, personal use only. For more details, visit our legal page.
2000 All Rights Reserved BrainBuzz.com
Last updated June, 2000. CIIck
here for updates.
CIIck here to see addItIonaI
documents reIated to thIs study
guIde. CIIck here to receIve free
practIce questIons for Network +
CertIfIcatIon.

Contents
Contents ................................... 1
I. KnowIedge of NetworkIng
TechnoIogy 67% ........................ 2
I.1 BasIc KnowIedge 16%......... 2
UnIx....................................... 3
I.2 PhysIcaI Layer 6% .............. 9
I.3 Data LInk Layer 5%...........10
I.4 Network Layer 5%.............10
I.5 Transport Layer 4%...........11
I.6 TCP/IP FundamentaIs 12% .12
I.7 TCP/IP SuIte: UtIIItIes 8%...15
I.8 Remote ConnectIvIty 5%....18
II. KnowIedge of NetworkIng
PractIces 33%.....................18
II.1 ImpIementIng the InstaIIatIon
of the Network 6% .................18
II.2 AdmInIsterIng the Change
ControI System 4% ................20
II.3 MaIntaInIng and SupportIng
the Network 6%.....................21
II.4 IdentIfyIng, AssessIng, and
RespondIng to ProbIems 6% ....21
II.5 TroubIeshootIng the Network
11%.....................................21
Cramsession" for
Network +
Certification
Abstract:
ThIs CramsessIon wIII heIp you to
prepare for the CompTIa Network +
Exam. Exam topIcs IncIude KnowIedge
of NetworkIng TechnoIogIes, Layers,
TCP/IP, KnowIedge of NetworkIng
PractIces, InstaIIIng, SupportIng and
TroubIeshootIng Networks.








BraInBuzz CramsessIon: Network + CertIfIcatIon

2
Network + Certification
I. Knowledge of Networking Technology 67%
I.1 Basic Knowledge 16%
I.1.1 Demonstrate understandIng of basIc network structure, IncIudIng
The characterIstIcs of star, bus, mesh, and rIng topoIogIes, theIr advantages
and dIsadvantages
o Star - A star physIcaI topoIogy means that the nodes/devIces are aII
connected to a centraIIzed hub or swItch and Is commonIy used for
10BASE5, 10BASE-T or 100BASE-TX
Pros: cabIIng Is InexpensIve, easy to wIre, more reIIabIe and
easIer to manage because of the use of hubs whIch aIIow
defectIve cabIe segments to be routed around; IocatIng and
repaIrIng bad cabIes Is easIer because of the concentrators;
network growth Is easIer
Cons: AII nodes receIve the same sIgnaI therefore dIvIdIng
bandwIdth; max computers Is 1,024 on a LAN; max UTP Iength
Is 100 meters (approx 330 ft); dIstance between computers Is
2.5 meters.

o Bus - a bus physIcaI topoIogy means that aII of the devIces are
connected to a common backbone; sIgnaI Is sent In both dIrectIons,
but some buses are unIdIrectIonaI; can be used for 10BASE5, 10BASE2
or 10BROAD36
Pros: Good for smaII networks
Cons: DIffIcuIt to troubIeshoot and Iocate where the break In
the cabIe Is or whIch machIne Is causIng the fauIt; when one
devIce faIIs the rest of the LAN faIIs.

o Mesh - A mesh physIcaI topoIogy Is when every devIce on the network
Is connected to every devIce on the network; most commonIy used In
WAN confIguratIons
Pros: heIps fInd the quIckest route on the network; provIdes
redundancy
Cons: very expensIve and not easy to set up

Ring - A rIng physIcaI topoIogy Is when the devIces are wIred In a cIrcIe, but
aImost aIways ImpIemented In a IogIcaI rIng topoIogy on a star physIcaI
topoIogy. Each devIce has a transceIver whIch behaves IIke a repeater whIch
moves the sIgnaI around the rIng; IdeaI for token-passIng access methods
Pros: SIgnaI degeneratIon Is Iow; onIy the devIce that hoIds the token
can transmIt whIch reduces coIIIsIons.
BraInBuzz CramsessIon: Network + CertIfIcatIon

3
Cons: DIffIcuIt to Iocate a probIem cabIe segment; expensIve hardware

Bus Ring Star Mesh



The characterIstIcs of segments and backbones
o Segments - TypIcaIIy a trunk of cabIIng connectIng a devIce to a
concentratIon devIce or routIng devIce, aIso a IogIcaI group of devIces
whIch communIcate wIthIn a gIven subnet that Is separated by a
brIdge, router, brouter, swItchIng hub, or muItIpIexer.
o Backbones - The foundatIon of the LAN/WAN where the servers are
IInked together on a common serIes of concentratIon devIces or that
are just a few hops away. ThIs gIves the servers the most bandwIdth
to serve other devIces IncIudIng other servers.

I.1.2 IdentIfy the foIIowIng:
The major network operatIng systems, IncIudIng MIcrosoft WIndows NT,
NoveII NetWare, and UnIx.
o MS WIndows NT - A networkIng operatIng system desIgned usIng a
DIrectory to manage certaIn resources. NT's prImary fIIe system Is
NTFS (New TechnoIogy FIIe System). ProvIdes an InherentIy GUI
consoIe at the server.
o NoveII NetWare - A networkIng operatIng system desIgned usIng a
bIndery or DIrectory ServIce to manage most resources. Netware's
prImary fIIe system Is a combInatIon of FAT (FIIe AIIocatIon TabIe) and
DET (DIrectory Entry TabIe). ProvIdes an InherentIy text based and
command prompt consoIe at the server.

Unix
The cIIents that best serve specIfIc network operatIng systems and theIr
resources.
o WIndows NT WorkstatIon best serves WIndows NT Server because of
the common NTFS fIIe system and they are optImIzed to work best
wIth each other. Best fIIe transfer throughput wouId be NT
WorkstatIon.
BraInBuzz CramsessIon: Network + CertIfIcatIon

4
o NoveII NetWare works weII wIth most popuIar cIIents OS's such as
DOS, WIndows 3.11, WIndows 9x, WIndows NT WorkstatIon, but the
cIIents that serves NetWare are DOS fIavors, and DOS based OS's such
as WIndows 95/98 for fIIe sharIng. MacIntosh and OS/2 work wIth NT
and NetWare but work best wIth the NOS wrItten for them.
o UnIx specIfIc cIIents such as Sun Sparc statIons work best wIth theIr
manufacturer's NOS.

The dIrectory servIces of the major network operatIng systems.
o WIndows NT uses a dIrectory servIce database that contaIns
InformatIon reIated to users, groups and computers. It can be
repIIcated between DomaIn ControIIers by a scheduIe or on demand.
WIndows 2000 uses ActIve DIrectory whIch Is a hIerarchIcaI securIty
modeI, sImIIar to NDS.
o NetWare 3.x uses bIndery servIces, NW 4.x and 5 both use NoveII
DIrectory ServIces (NDS). BIndery Is restrIcted to the machIne It sIts
on, NDS uses a tree structure.
o UnIx uses ???

I.1.3 AssocIate IPX, IP, and NetBEUI wIth theIr functIons.
IPX - Internetwork Packet Exchange. It's the NoveII NetWare desIgned
protocoI whIch Is the defauIt protocoI durIng InstaIIatIon. Packet sIzes for
Ethernet are approx 1500 bytes, for Token RIng they are approx 4Kb.
Performs addressIng and routIng functIons. ResIdes In Network Layer.
RequIres some confIguratIon.
IP - Internet ProtocoI. DOD standard desIgned for ARPAnet. Based on two
modeIs, the DOD modeI (4 Iayers) and the OSI modeI (7 Iayers), whIch Is the
WIndows NT and UnIx defauIt protocoI durIng InstaIIatIon. RequIres a Iot of
confIguratIon. IP functIons on the Internet Iayer of the DOD modeI and on the
Network Iayer of the OSI modeI. A connectIonIess protocoI responsIbIe for
addressIng and routIng packets between hosts.
NetBEUI - NetBIOS (Network BasIc Input Output System) Enhanced User
Interface. MIcrosoft desIgned protocoI for fast packet deIIvery In a smaII
network wIthout much confIguratIon, Its shortcomIng Is that It's not routabIe.
It operates on the Network and Transport Iayers of the OSI modeI.

I.1.4 DefIne the foIIowIng terms and expIaIn how each reIates to fauIt toIerance or
hIgh avaIIabIIIty:
MIrrorIng - RAID 1: DupIIcates a partItIon on another physIcaI dIsk wIth one
data channeI, 2 drIves, 1 used for data, 1 for parIty, advantages are fauIt
toIerance; dIsadvantages are It's expensIve and requIres twIce the dIsk space
DupIexIng - RAID 1: DupIIcates a partItIon on another physIcaI dIsk that Is
connected to another Hard DrIve ControIIer usIng two data channeIs
sImuItaneousIy, two data cabIes and two DASD, 1 used for data, 1 for parIty,
BraInBuzz CramsessIon: Network + CertIfIcatIon

5
advantages and dIsadvantages are the same as mIrrorIng but dupIexIng
provIdes much faster read speeds than mIrrorIng.
StrIpIng (wIth and wIthout parIty) - data strIpIng Is when bIocks or bIts of data
are wrItten to each drIve In the array In successIon. It's used In most RAID
IeveIs and Is great for ImprovIng read/wrIte speeds because the I/O request
are beIng dIstrIbuted between aII I/O data channeIs. ParIty checkIng reIIes on
an extra bIt caIIed a parIty bIt, whIch Is used to compare the bIt strIng to an
odd or even count. If the odd or even count Is not matched based on the
settIng of the parIty bIt, then the data strIng Is sent agaIn. Extra drIve space
Is used for the parIty bIts. Not usIng parIty wIII Improve overaII data
transmIssIon because of the omIssIon of the parIty bIt caIcuIatIon, but shouId
be used when speed Is of greater Importance than fauIt toIerance. RAID 5
provIdes the best fauIt toIerance because It uses severaI drIves wIth bIock
InterIeavIng, a dIstrIbuted check sum for parIty and has fast reads.
VoIumes - are actIve segments of a physIcaI server hard drIve whIch may be
fuIIy contaIned In a sIngIe hard drIve, spanned over severaI dIsks or muItIpIe
voIumes can occupy one hard drIve.
Tape backup - offIIne storage and Is easIIy removabIe, sIow read/wrIte
compared to hard dIsk, hIgh capacIty on magnetIc tape, exceIIent choIce for
fauIt toIerance because It's cheap and the medIa can be sent eIsewhere for
protectIon.

I.1.5 DefIne the Iayers of the OSI modeI and IdentIfy the protocoIs, servIces, and
functIons that pertaIn to each Iayer.
AppIIcatIon - (Iayer 7) AIIows appIIcatIons to use the network. HandIes
network access, fIow controI and error recovery. messages are sent between
Iayers
o ProtocoIs - SMB, NCP
o ServIces - TeInet, FTP use TCP, TFTP, NFS, SNMP, SMTP use TCP
o FunctIons - User Interface wIth appIIcatIons & Gateways

PresentatIon - (Iayer 6) TransIates data Into a form usabIe by the appIIcatIon
Iayer. The redIrector operates here. ResponsIbIe for protocoI conversIon,
transIatIng and encryptIng data, and managIng data compressIon. messages
are sent between Iayers
o ProtocoIs - NCP
o ServIces - TeInet, FTP use TCP, TFTP, NFS, SNMP, SMTP use TCP
o FunctIons - Gateways

SessIon - (Iayer 5) AIIows appIIcatIons on connectIng systems to estabIIsh a
sessIon. ProvIdes synchronIzatIon between communIcatIng computers.
messages are sent between Iayers
o ProtocoIs - N/A
o ServIces - TeInet, FTP use TCP, TFTP, NFS, SNMP, SMTP use TCP
BraInBuzz CramsessIon: Network + CertIfIcatIon

6
o FunctIons - Gateways

Transport - (Iayer 4) ResponsIbIe for packet handIIng. Ensures error-free
deIIvery. Repackages messages, dIvIdes messages Into smaIIer packets, and
handIes error handIIng. segments of message fragments are sent between
Iayers
o ProtocoIs - SPX, TCP, UDP and NetBEUI functIon on thIs Iayer
o ServIces - TCP/SPX - connectIon-orIented communIcatIon for
appIIcatIons to ensure error free deIIvery; UDP - connectIonIess
communIcatIons and does not guarantee packet deIIvery between
transfer poInts
o FunctIons - Gateways functIon on thIs Iayer

Network - (Iayer 3) TransIates system names Into addresses. ResponsIbIe for
addressIng, determInIng routes for sendIng, managIng network traffIc
probIems, packet swItchIng, routIng, data congestIon, and reassembIIng data.
Datagrams are sent between Iayers
o ProtocoIs - IPX, IP, ICMP, ARP, RARP, RIP, OSPF, EGP, IGMP, NetBEUI,
DLC, and DecNET functIon on thIs Iayer
o ServIces - software & hardware addresses and packet routIng between
hosts and networks (IP/IPX); software addresses to hardware
addresses are resoIved (ARP/RARP), sends messages and reports
errors regardIng packet deIIvery (ICMP), reports host group
membershIp to IocaI muItIcast routers (IGMP)
o FunctIons - Routers and Brouters functIon up to thIs Iayer

Data IInk - (Iayer 2) Sends data from network Iayer to physIcaI Iayer.
Manages physIcaI Iayer communIcatIons between connectIng systems. Data
frames are sent between Iayers
o ProtocoIs - HDLC (HIgh-IeveI Data LInk ControI); Supports
asynchronous and synchronous transmIssIons. Uses LLC fIow controI
o ServIces - Ethernet, Token RIng, and other communIcatIons occur here
vIa frames. LLC - (802.2) Manages IInk controI and defInes SAP's
(ServIce Access PoInts). MAC - (802.3, 802.4, 802.5, 802.12)
CommunIcates wIth adapter card.
o FunctIons - SwItches, brouters and brIdges functIon on thIs Iayer usIng
the MAC subIayer

PhysIcaI - (Iayer 1) TransmIts data over a physIcaI medIum. DefInes cabIes,
cards, and physIcaI aspects. Data bIts are sent.
o ProtocoIs - No protocoIs functIon on thIs Iayer
o ServIces - Ethernet (CSMA/CD), Token RIng (token passIng), and other
communIcatIons occur
BraInBuzz CramsessIon: Network + CertIfIcatIon

7
o FunctIons - Repeaters and muItIpIexers functIon on thIs Iayer; bIts are
sent across the wIre

I.1.6 RecognIze and descrIbe the foIIowIng characterIstIcs of networkIng medIa and
connectors:
The advantages and dIsadvantages of coax, Cat 3, Cat 5, fIber optIc, UTP, and
STP, and the condItIons under whIch they are approprIate
o Coax - commonIy used for thIck ethernet, thIn ethernet, cabIe TV and
ARCnet, coaxIaI cabIIng that uses BNC connectors; heavy shIeIdIng
protects data, but expensIve and hard to make connectors
o CAT 3 - UTP/STP can be used for voIce or data, but can be used for
data up to 10Mps. Good for cabIe segments to workstatIons or prInters
o CAT 5 - UTP/STP can be used for voIce and/or data, but data
transmIssIons up to 100Mps. Good as a backbone, but aIso good for
cabIe segments to workstatIons or prInters sInce prIce Is droppIng.
o FIber optIc - (IEEE 802.8) CabIe In whIch the center core, a gIass
cIaddIng composed of varyIng Iayers of refIectIve gIass, refracts IIght
back Into the core. Max Iength Is 25 kIIometers, speed Is up to 2Gbps
but very expensIve. Best used for a backbone due to cost.
o UTP - UnshIeIded TwIsted PaIr; uses RJ-45, RJ-11, RS-232, and RS-
449 connectors, max Iength Is 100 meters, speed Is up to 100Mps.
Cheap, easy to InstaII, Iength becomes a probIem. Can be CAT 2,3,4 or
5 quaIIty grades.
o STP - ShIeIded TwIsted PaIr; uses RJ-45, RJ-11, RS-232, and RS-449
connectors, max Iength Is 100 meters, speed Is up to 500Mps. Not as
InexpensIve as UTP, easy to InstaII, Iength becomes a probIem. Can be
CAT 2,3,4 or 5 quaIIty grades.

The Iength and speed of 10Base2, 10BaseT, and 100BaseT
o 10Base2 - max Iength 185 meters, max speed 10Mps (ThIn Ethernet)
o 10BaseT - max Iength 100 meters, max speed 10Mps
o 100BaseT - max Iength 100 meters, max speed 100Mps

The Iength and speed of 10Base5, 100Base VGAnyLan, 100Base TX
o 10Base5 - max Iength 500 meters, max speed 10Mps (ThIck Ethernet)
o 100Base5 - max Iength 500 meters, max speed 100Mps
o VGAnyLan - max Iength 250 meters, max speed 100Mps
o 100BaseTX - max Iength 100 meters, max speed 100Mps
The vIsuaI appearance of RJ 24 and BNC and how they are crImped.

BraInBuzz CramsessIon: Network + CertIfIcatIon

8
I.1.7 IdentIfy the basIc attrIbutes, purpose, and functIon of the foIIowIng network
eIements:
FuII- and haIf-dupIexIng
o HaIf-dupIexIng - each devIce In the confIguratIon can send and receIve
InformatIon, but onIy one at a tIme; whIIe sendIng the devIce cannot
receIve, very much IIke waIkIe-taIkIes.
o FuII-dupIexIng - each devIce In the confIguratIon can send and receIve
sImuItaneousIy. The best exampIe of thIs Is the teIephone.

WAN and LAN - A LAN Is a IocaI area network that Is a smaII coIIectIon of
workstatIons In a geographIc area of Iess than 1 mIIe and Is very fast for data
transfer. A wIde area network Is a network of LANs. A WANs geographIc
IocatIon Is consIdered to be gIobaI usIng advanced routers. WANs are much
sIower than LANs but are IncreasIng In speed.
Server, workstatIon, and host
o Server - a devIce provIdIng resources to other devIces on the network
typIcaIIy found In a dIstrIbuted processIng envIronment
o WorkstatIon - a devIce whIch accesses avaIIabIe resources from
servers typIcaIIy found In a dIstrIbuted processIng envIronment
o Host - an addressabIe computer system on a TCP/IP network such as
workstatIons, servers, mInIcomputers, maInframes, and routers whIch
typIcaIIy offers resources to network nodes.

Server-based networkIng and peer-to-peer networkIng
o A peer-to-peer network does not reIy on the use of a centraI fIIe server
to share fIIe but each workstatIon reIIes on another workstatIon to
have It's resources made avaIIabIe. They are very dIffIcuIt to maIntaIn
securIty, must be IImIted number of peers to keep admInIstratIon costs
Iow, sIow response tIme, but they are InexpensIve, no centraI poInt of
faIIure and no specIaI traInIng requIred.
o A server-based network requIres a centraI fIIe server and a networkIng
operatIng system that can handIe the job. They requIre a separate
machIne and therefore expensIve hardware, an expensIve NOS, and
wIthout the proper traInIng It Is dIffIcuIt to InstaII and maIntaIn. On the
other hand, data transfer speeds are greater, securIty Is more robust,
LAN expansIon Is sImpIer, and there are management tooIs avaIIabIe.
CabIe, NIC, and router
o CabIe - provIdes the pathway for network communIcatIons. It's a
component of a topoIogy determIned by the NIC and standard beIng
used. The most common types of LAN cabIIng are coaxIaI, unshIeIded
twIsted paIr, shIeIded twIst paIr, and fIber optIc.
o NIC - Network Interface Card Is component added to a computer
cIrcuIt board expansIon sIot and connects dIrectIy to network cabIIng.
NOS software Is InstaIIed on the workstatIon to aIIow communIcatIon
between the workstatIon OS and the server NOS.
BraInBuzz CramsessIon: Network + CertIfIcatIon

9
o Router - means a connectIon between sImIIar or dIssImIIar topoIogIes
usIng the same protocoI operatIng at the OSI Network Layer.
Broadband and baseband
o Baseband transmIssIons use the entIre medIum's capacIty for a sIngIe
channeI over dIgItaI sIgnaIIng. SInce onIy one sIgnaI at a tIme can
occupy a channeI, the use of a MUX wIII aIIow muItIpIe devIces to send
muItIpIe sIgnaIs usIng a sIngIe transmIssIon medIum. ProvIde exceIIent
throughput because the dIgItaI sIgnaI occupIes the entIre channeI.
o Broadband transmIssIons share the medIum's bandwIdth over
muItIpIe anaIog channeIs unIdIrectIonaIIy. ThIs Is performed usIng
dIfferent frequencIes and a process known as FDM (frequency dIvIsIon
muItIpIexIng). SInce these transmIssIon work very weII over Iong
dIstances, WAN communIcatIons take advantage of thIs technoIogy.
Gateway, as both a defauIt IP router and as a method to connect dIssImIIar
systems or protocoIs
o A defauIt gateway Is an IP address used to forward packets from one
subnet to another subnet.
o A gateway that connects dIssImIIar systems or protocoIs aIIows
dIfferent pIatforms to Inter-operate, whIch adds expansIon and
functIonaIIty to a LAN. A gateway basIcaIIy grants a workstatIon a
dIrect connectIon to the host computer and acts as a messenger
between the two systems. Gateways operate between the OSI
Transport Iayer through the AppIIcatIon Layer.

I.2 Physical Layer 6%
I.2.1 GIven an InstaIIatIon, confIguratIon, or troubIeshootIng scenarIo, seIect an
approprIate course of actIon If a cIIent workstatIon does not connect to the network
after InstaIIIng or repIacIng a network Interface card. ExpIaIn why a gIven actIon Is
warranted. The foIIowIng Issues may be covered:
KnowIedge of how the network card Is usuaIIy confIgured, IncIudIng EPROM,
jumpers, and pIug-and-pIay software
Use of network card dIagnostIcs, IncIudIng the Ioopback test and vendor-
suppIIed dIagnostIcs
The abIIIty to resoIve hardware resource confIIcts, IncIudIng IRQ, DMA, and
I/O Base Address.

I.2.2 IdentIfy the use of the foIIowIng network components and the dIfferences
between them:
Hubs - a hub Is a wIrIng concentrator for a LAN or WAN that provIdes a
centraI attachment poInt for network cabIIng. CoaxIaI cabIe doesn't use hubs.
There are three types of hubs: passIve (absorbs some sIgnaI; no eIectronIcs
to process data sIgnaI), actIve (cIeans sIgnaI; eIectronIcs to ampIIfy sIgnaI),
and InteIIIgent (managed & swItchIng hubs).
MAUs - (MuItIstatIon Access UnIt) an access devIce used to connect the maIn
cabIIng structure to devIces In use on a Token RIng network. ThIs devIce adds
BraInBuzz CramsessIon: Network + CertIfIcatIon

10
fauIt toIerance to the network so that a sIngIe faIIure doesnt stop the whoIe
network
SwItchIng hubs - are InteIIIgent hubs whIch contaIn cIrcuItry that very quIckIy
route sIgnaIs between ports on the hub. ThIs method reduces bandwIdth
waste because onIy the devIce whIch needs to receIve the packet does, rather
than the entIre network segment.
Repeaters - devIces that ampIIfy and regenerate a sIgnaI to extend the
dIstance of a LAN
TransceIvers - connect dIfferent Ethernet nodes together In an organIzed
fashIon across an IndIvIduaI Ethernet segment; aIIows muItIpIe Ethernet
segment nodes to connect to each other to create a segment.

I.3 Data Link Layer 5%
I.3.1 DescrIbe the foIIowIng data IInk Iayer concepts
BrIdges, what they are and why they are used
o BrIdges are used to segment networks. They forward packets based on
address of destInatIon node. Uses RAM to buIId a routIng tabIe based
on hardware addresses. Some brIdge types are capabIe of connectIng
dIssImIIar network topoIogIes. WIII forward aII protocoIs. Regenerates
the sIgnaI at the packet IeveI
The 802 specs, IncIudIng the topIcs covered In 802.2, 802.3, and 802.5
o 802.2 - LLC (LogIcaI LInk ControI manages IInk controI and defInes
SAPs); Adds header fIeIds to IdentIfy upper-Iayer protocoIs. It provIdes
reIIabIe, InteIIIgent InformatIon to otherwIse dumb frames. AIso, acts
as a swItch board to make sure MAC frames fInd theIr way to the rIght
Network Iayer process.
o 802.3 - (MAC communIcates wIth adapter card) CSMA/CD - Ethernet;
ProvIdes physIcaI Iayer optIons IncIudIng dIfferent topoIogIes, medIa
types, data rates and sIgnaIIng modes.
o 802.5 - (MAC communIcates wIth adapter card) Token RIng LAN; Uses
token-passIng medIa access protocoI across a physIcaI star, IogIcaI rIng
and dIfferentIaI Manchester encodIng to provIde data rates
The functIon and characterIstIcs of MAC addresses
o MAC addresses, whIch are a.k.a physIcaI addresses, operate on the
data IInk Iayer. Each address Is unIque 12-dIgIt hexadecImaI ID
number, whIch Is hard coded to the network devIce by the factory, and is
used by devices to direct their packets to other devices.
I.4 Network Layer 5%
I.4.1 ExpIaIn the foIIowIng routIng and network Iayer concepts, IncIudIng
The fact that routIng occurs at the network Iayer
o Routers heIp organIze a Iarge network Into terms of IogIcaI network
segments usIng IogIcaI network IDs
BraInBuzz CramsessIon: Network + CertIfIcatIon

11
The dIfference between a router and a brouter
o A router functIons on the network Iayer of the OSI modeI
o A brouter functIons as a brIdge on the data IInk MAC subIayer and as a
router on the network Iayer.
The dIfference between routabIe and non-routabIe protocoIs
o A routabIe protocoI permIts Its packets to be sent beyond a sIngIe
LAN/WAN segment whereas a non-routabIe protocoI's packets wIII
remaIn on the orIgInatIng LAN segment
The concept of defauIt gateways and subnetworks
o A defauIt gateway Is the exIt and entry poInt of a subnet.
o Subnetworks are a dIvIsIon of the entIre Internetwork whIch are
created to provIde securIty and/or reduced traffIc over a WAN or
congested networks
The reason for empIoyIng unIque network IDs
o UnIque network IDs prevent confusIon between devIces and heIp them
to properIy dIrect theIr packets/datagrams. When a router receIves a
packet whIch Is destIned for a network ID on the other sIde, the router
wIII know how to behave.
The dIfference between statIc and dynamIc routIng.
o StatIc routIng requIres human InteractIon to fIII the routIng tabIes and
to provIde accurate IP addressIng, subnet maskIng and the defauIt
gateway of the router
o DynamIc routIng uses InformatIon from neIghborIng routers to fIII the
routIng tabIes, therefore, In a hIgh voIume envIronment the human
error factor Is greatIy reduced when addIng routes

I.5 Transport Layer 4%
I.5.1 ExpIaIn the foIIowIng transport Iayer concepts:
The dIstInctIon between connectIonIess and connectIon-based transport
o ConnectIonIess - InternaI nodes aIong the message path do not
partIcIpate In error correctIon and fIow controI.
o ConnectIon-based - an acknowIedgement (ACK) verIfIes that the host
has receIved each segment of the message, whIch resuIts In reIIabIe
deIIvery servIce. If the ACK Is not receIved after a gIven tIme perIod,
then the data Is resent. If segments are not deIIvered to the
destInatIon devIce correctIy, then the Transport Iayer can InItIate
retransmIssIon or Inform the upper Iayers. Uses segmentatIon, fIow
controI, and error checkIng to Insure packet deIIvery
The purpose of name resoIutIon, eIther to an IP/IPX address or a network
protocoI
o Name resoIutIon heIps upper Iayer servIces communIcate segment
destInatIons wIth Iower Iayer servIces.
BraInBuzz CramsessIon: Network + CertIfIcatIon

12

I.6 TCP/IP Fundamentals 12%
I.6.1 Demonstrate knowIedge of the foIIowIng TCP/IP fundamentaIs:
The concept of IP defauIt gateways
o A defauIt gateway Is the entry and exIt poInt of datagrams between
subnets
o As a packet passes through a router, the TTL Is decremented by at
Ieast 1 untII the packet TTL reaches 0; thIs prevents a packet from
traveIIng forever
o If a packet Is too Iarge for the gateway then It Is fragmented wIth the
foIIowIng InformatIon: 1) a fIag whIch IndIcates that there are other
packets, 2) a fragment ID to IdentIfy the fragment and 3) a fragment
offset to IndIcate how to reassembIe the packets
o The defauIt gateway MUST have the same subnet mask as the network
It resIdes on
The purpose and use of DHCP, DNS, WINS, and host fIIes
o DHCP - DynamIc Host ConfIguratIon ProtocoI;
DynamIc aIIocatIon of IP address, defauIt gateway and subnet
mask to a requestIng IP cIIent; reduces admInIstratIve overhead
DHCP uses the BOOTP protocoI to communIcate wIth cIIents and
uses BOOTP to cross routers If the router Is RFC 1542 compIIant
and has BOOTP forwardIng enabIed
When settIng up a scope, the scope's range Is IImIted to a
partIcuIar subnet
Add a scope to provIde servIces for addItIonaI subnets.
4 step process: cIIent request, server offer, cIIent seIect, server
acknowIedges
CIIents attempt to renew after 50% of theIr Iease IIfe has
expIred by sendIng a DCHPREQUEST packet
CIIents wIII attempt to renew agaIn at 87.5% expIratIon of Iease
IIfe If DHCPREQUEST from before was not responded to
To confIrm IP assIgnment use utIIItIes such as IPCONFIG,
WINIPCFG
CIIents retaIn IP assIgnment untII Iease expIres or untII a
DHCPRELEASE command Is sent from cIIent
DHCP ReIay Agent wIII forward DHCP messages between cIIents
and servers
o DNS - DomaIn Name ServIces
HeIps cIIents resoIve host names to IP addresses InternaIIy and
externaIIy
Uses statIc mappIng In a hIerarchIcaI database (root-IeveI/top-
IeveI/second-IeveI/host name)
BraInBuzz CramsessIon: Network + CertIfIcatIon

13
Can be used to resoIve NetBIOS names wIth NT If you check
the box to "EnabIe DNS for WIndows ResoIutIon" In the TCP/IP
propertIes confIguratIon dIaIog box In the WINS Address tab
A CNAME Is a method of DNS aIIasIng for somethIng such as a
www or ftp server
You can setup zone transfers between PrImary and Secondary
DNS servers for fauIt toIerance
o WINS - WIndows Internet NamIng ServIce
EIImInates the need for cIIents to send broadcasts for computer
name resoIutIon
Uses dynamIc mappIng
EIImInated the need for LMHOSTS fIIes
Process IncIudes 1) WINS cIIent regIsters Its NetBIOS name and
IP Address at startup wIth WINS server, 2) WINS cIIent sends a
name query request to the WINS server to taIk to another host,
and 3) If IP and host name are found In database then the
WINS server wIII send to requestIng WINS cIIent
Upon proper shutdown, the WINS cIIent wIII send a name
reIease to the WINS server
WINS requests are routabIe datagrams
WINS Proxy Agent Is used for non-WINS cIIents (UNIX) to
resoIve NetBIOS names of MS cIIents; one proxy agent per
subnet but no more than two agents per subnet
MS CIIents can resoIve the host names of UNIX computers as
Iong as the host names are 15 char or Iess, no specIaI chars
and the UNIQUE UNIX computer names + IP are entered Into
WINS statIcaIIy
No WINS MacIntosh support
o HOSTS & LMHOSTS fIIes
HOSTS Is for DNS and UNIX, therefore they are case sensItIve
for UNIX hosts
Syntax Is IP address TAB host name. MuItIpIe hosts can be on
one IIne BUT where the fIrst Instance of the IP address Is found
wIII be the IP assIgned to that host name.
EX. 123.45.6.78 www.bubba.com www.bubbaco.com
HOSTS Is a statIc map of IP addresses to host names of
machInes, typed Into a text fIIe
On NT can be up to 256 char Iong
Must have one fIIe on each computer that Is not usIng DNS
Names are read In order one at a tIme, so the most commonIy
used names shouId be at the begInnIng of the fIIe
LMHOSTS Is for WINS and Is not case sensItIve
BraInBuzz CramsessIon: Network + CertIfIcatIon

14
StatIc map of IP address to NetBIOS name
RequIred for non-WINS cIIents that use NetBIOS broadcasts for
NetBIOS name resoIutIon
Maps NetBIOS name to IP address usIng a statIc text fIIe
Syntax exampIe on a PDC 123.45.6.78 saIes #pre
#dom:bubbaco
On each BDC put an entry for the PDC In the LMHOSTS fIIe
# means comment unIess In front of a specIaI command such
as #pre, #dom, #IncIude, #begIn_aIternate, #end_aIternate
The IdentIty of the maIn protocoIs that make up the TCP/IP suIte, IncIudIng
TCP, UDP, POP3, SMTP, SNMP, FTP, HTTP, and IP
o TCP - TransmIssIon ControI ProtocoI: a reIIabIe, connectIon-based
protocoI; good for Iarge amounts of data wIth a Iot of ACK overhead
o UDP - User Datagram ProtocoI: an unreIIabIe, connectIonIess protocoI
for sendIng smaII amounts of data wIthout the overhead of ACKs
o POP3 - Post OffIce ProtocoI versIon 3: a method of transferrIng maII
fIIes from a maII server to a maII cIIent from It's source
o SMTP - SImpIe MaII Transfer ProtocoI: a method of transferrIng maII
fIIes from a maII cIIent to maII server prIor to the destInatIon
o SNMP - SImpIe Network Management ProtocoI: a management tooI
used to monItor and controI remote network devIces whIch can poII
specIfIc InformatIon from the agent
o FTP - FIIe Transfer ProtocoI: a fast and error-free method to transfer
fIIes from host to host
o HTTP - HyperText Transfer ProtocoI: the common protocoI used on the
WorId WIde Web to transfer fIIes from a server to a web browser
o IP - Internet ProtocoI: a connectIonIess protocoI responsIbIe for
addressIng and routIng packets between hosts
The Idea that TCP/IP Is supported by every operatIng system and mIIIIons of
hosts worIdwIde
The purpose and functIon of Internet domaIn name server hIerarchIes (how
emaII arrIves In another country).

I.6.2 Demonstrate knowIedge of the fundamentaI concepts of TCP/IP addressIng,
IncIudIng
The A, B, and C cIasses of IP addresses and theIr defauIt subnet mask
numbers
o CIass A - network ID start bIt Is 0 and defauIt subnet mask Is
255.0.0.0; decImaI range 1-126
o CIass B - network ID start bIt Is 10 and defauIt subnet mask Is 255.
255.0.0; decImaI range 128-191
BraInBuzz CramsessIon: Network + CertIfIcatIon

15
o CIass C - network ID start bIt Is 110 and defauIt subnet mask Is 255.
255. 255.0; decImaI range 192-223

The use of port numbers (HTTP, FTP, SMTP) and port numbers commonIy
assIgned to a gIven servIce.
o Ports are assIgned by RFC 1060 to create a socket connectIon
o HTTP - port number 80/tcp
o FTP - port number 21/tcp
o SMTP - port number 25/tcp

I.6.3 Demonstrate knowIedge of TCP/IP confIguratIon concepts, IncIudIng
The defInItIon of IP proxy and why It Is used
The IdentIty of the normaI confIguratIon parameters for a workstatIon,
IncIudIng IP address, DNS, defauIt gateway, IP proxy confIguratIon, WINS,
DHCP, host name, and Internet domaIn name.

I.7 TCP/IP Suite: Utilities 8%
I.7.1 ExpIaIn how and when to use the foIIowIng TCP/IP utIIItIes to test, vaIIdate, and
troubIeshoot IP connectIvIty:
ARP - used to gather hardware addresses of IocaI hosts and the defauIt
gateway, you can vIew the ARP cache and check for InvaIId or dupIIcate
entrIes
o Command syntax
arp -a [Inet_addr] [-N [If_addr]]
arp -d Inet_addr [If_addr]
arp -s Inet_addr ether_addr [If_addr]
o Command swItches
-a or -g - dIspIays the current contents of the arp cache
-d - deIetes the entry specIfIed by Inet_addr
-s - adds a statIc entry to the cache, mappIng an IP address to
a physIcaI address
-N - dIspIays the arp entrIes for the specIfIed physIcaI address
Inet_addr - IP address, wrItten In dotted decImaI format
If_addr - IP address of the NIC whose cache shouId be
modIfIed, If no IP address, the fIrst NIC Is used
ether_addr - the physIcaI address In hex separated by hyphens

TeInet - thIs Is a termInaI emuIatIon program that wIII aIIow you to run
InteractIve commands on the teInet server. UntII a connectIon Is estabIIshed,
BraInBuzz CramsessIon: Network + CertIfIcatIon

16
no data wIII pass and If the connectIon shouId break teInet wIII Inform you.
Good for testIng IogIn confIguratIon parameters to a remote host.
o Command syntax
TeInet
NBTSTAT - reports statIstIcs and connectIons for NetBIOS over TCP/IP. Use
for DNS and WINS name resoIutIon, IocaI cache Iookup, and referraI to
LMHOSTS and HOSTS fIIes. TroubIeshoot name-to-address mappIngs wIth
NBTSTAT
o Command syntax
Nbtstat [-a remotename] [ -A IPaddress] [-c] [-n] [-R] [-r] [-S]
[-s] [IntervaI]
o Command swItches
-a remotename - IIsts the remote computer's name tabIe by the
remote computer's name
-A IP address - IIsts the remote computer's name tabIe by the
remote computer's IP address
-c - IIsts the contents of the name cache, mappIng each IP
address to a name
-n - IIsts IocaI NetBIOS names
-R - If LMHOSTS Iookup Is enabIed, then It wIII purge the name
cache and reIoad It from the LMHOSTS fIIe
-r - IIsts name-resoIutIon statIstIcs for WIndows networkIng
-S - dIspIays workstatIon and server sessIons, IIstIng hosts by
IP address
-s - dIspIays workstatIon and server sessIons, attemptIng to IIst
hosts by name
IntervaI - the number of seconds between refreshes of statIstIcs
Tracert - used to determIne the route a packet took to reach Its destInatIon
o Command syntax
Tracert [-d] [-h maxImum_hops] [-j host-IIst] [-w tImeout]
target_name
o Command swItches
-d - specIfIes that IP addresses shouId not be resoIved to host
name
-h maxImum_hops - can onIy search up to the specIfIed number
of hops
-j host-IIst - specIfIes the Ioose source route
-w tImeout - waIts the number of mIIIIseconds specIfIed by
tImeout for each repIy
NETSTAT - thIs command dIspIays protocoI statIstIcs and gets InformatIon
about TCP/IP connectIons
BraInBuzz CramsessIon: Network + CertIfIcatIon

17
o Command syntax
Netstat [-a] [-e] [-n] [-s] [-p protocoI] [-r] [IntervaI]
o Command swItches
-a - dIspIays connectIons and IIstenIng ports and theIr current
state, but not the server sessIons
-e - dIspIays Ethernet stats
-n - dIspIays actIve connectIons, IIsted by IP address
-s - dIspIays per-protocoI statIstIcs for IP, ICMP, TCP, and UDP
-p protocoI - dIspIays actIve connectIon statIstIcs for the chosen
protocoI (TCP or UDP), can use wIth the -s swItch for more
InformatIon
-r - dIspIays the contents of the routIng tabIe
IpconfIg/wInIpcfg - these utIIItIes dIspIay IP-addressIng InformatIon for the
IocaI network adapter(s) or a specIfIed NIC.
o Command syntax
IpconfIg [/aII | /renew [adapter] | /reIease [adapter]]
o Command swItches
/aII - aII InformatIon about adapter(s)
/renew - renew DHCP Iease InformatIon for aII IocaI adapters If
none Is named
/reIease - reIease DHCP Iease InformatIon thereby dIsabIIng
TCP/IP on thIs adapter
FTP - thIs utIIIty Is used to transfer fIIes between server and cIIent. ThIs Is a
reIIabIe method of data transfer because It uses TCP. There Is a Iong IIst of
sessIon commands for fIIe management
o Command syntax
ftp [-v] [-n] [-I] [-d] [-g] [-s: fIIename] [hostname]
o Command swItches
-v - suppresses any dIspIay server responses (@echo off In
DOS)
-n - prevents automatIc IogIn when connectIon has been
estabIIshed
-I - turns off InteractIve promptIng durIng fIIe transfer
-d - dIspIays aII ftp commands exchanged between cIIent and
server, for debuggIng
-g - dIsabIes the gIobbIng capabIIIty
-s: fIIename - specIfIes a text fIIe contaInIng ftp commands and
then runs the commands wIthIn the fIIe, sImIIar to a batch fIIe
hostname - the host to connect to and MUST be the LAST
parameter specIfIed
BraInBuzz CramsessIon: Network + CertIfIcatIon

18
pIng - wIII send ICMP echo packets to verIfy connectIons to a remote host (or
IocaI If usIng the Ioopback address)
o Command syntax
pIng [-t] [-a] [-n count] [-I Iength] [-f] [-I ttI] [-v tos] [-r
count] [-s count] [[-j host-IIst] | [-k host-IIst]] [-w tImeout]
destInatIon-IIst
o Command swItches
-t - pIng untII Interrupted
-a - pIng address and resoIves host name
-n count - send number of echo packets
-I Iength - send echo packets of a specIfIed sIze
-f - sends a DO NOT FRAGMENT command to gateways
-I ttI - sets the TTL fIeId
-r count - records the route of the outgoIng and returnIng
packets
destInatIon-IIst - specIfIes the remote hosts to pIng, by domaIn
name or by IP address

I.8 Remote Connectivity 5%
I.8.1 ExpIaIn the foIIowIng remote connectIvIty concepts:
The dIstInctIon between PPP and SLIP
o PPP - PoInt-to PoInt ProtocoI - routes IP packets vIa a dIaI-up
connectIon and supports compressIon and IP address negotIatIon
o SLIP - SerIaI LIne Internet ProtocoI - routes IP packets vIa a dIaI-up
connectIon and does NOT support compressIon and IP address
negotIatIon by ItseIf
The purpose and functIon of PPTP and the condItIons under whIch It Is usefuI
o PPTP makes possIbIe a secure connectIon across the Internet. Users
can connect to any ISP, use the ISP's network as a gateway and then
connect to the offIce network. The PPTP packets are encapsuIated Into
es and procedures
o The need to empIoy data encryptIon to protect network data
o The use of a fIrewaII.

II. Knowledge of Networking Practices 33%
II.1 Implementing the Installation of the Network 6%
II.1.1 Demonstrate awareness that admInIstratIve and test accounts, passwords, IP
addresses, IP confIguratIons, reIevant SOPs, etc., must be obtaIned prIor to network
ImpIementatIon.
BraInBuzz CramsessIon: Network + CertIfIcatIon

19
II.1.2 ExpIaIn the Impact of envIronmentaI factors on computer networks. GIven a
network InstaIIatIon scenarIo, IdentIfy unexpected or atypIcaI condItIons that couId
eIther cause probIems for the network or sIgnIfy that a probIem condItIon aIready
exIsts, IncIudIng

Room condItIons (e.g., humIdIty, heat, etc.)
o It Is Important to setup the room wIth normaI humIdIty to prevent
eIectrostatIc dIscharge (ESD), aIr condItIonIng to prevent CPU
overheatIng and system shutdown
o Put the equIpment In a secured cabInet In a secured room to prevent
someone from tamperIng wIth unsupervIsed equIpment durIng off
hours
The pIacement of buIIdIng contents and personaI effects (e.g., space heaters,
TVs, radIos, etc.)
o ConsIder the effects of heat on eIectrIcaI sIgnaIs, eIectromagnetIc
Interference (EMI) from power IInes or unshIeIded power cabIes as weII
as TV and radIo Interference. Common sources of EMI are fIuorescent
IIghts, eIevator motors, Iarge generators, and refrIgerator magnets.
o Casements are often the best pIaces to store computer equIpment
because the ground can absorb most aIr waves
Computer equIpment
o Other computer equIpment can effect the unshIeIded data cabIes
because of EMI, such as monItor radIatIon or CPU power suppIIes
o If the computer equIpment Is fauIty then the network components may
appear to have probIems
o SometImes dIagnostIc software may poInt out fauIty computer parts
wIthout wastIng tIme guessIng at the probIem
Error messages
o These are cIues to heIp boII down the probIem to the Ieast common
denomInator. Once IsoIated, the proper remedy can be appIIed wIthout
too much guess work.
o Some error messages are mIsIeadIng and addItIonaI dIagnostIc
software may be requIred to make a more educated guess.

II.1.3 RecognIze vIsuaIIy, or by descrIptIon, common perIpheraI ports, externaI SCSI
(especIaIIy DB-25 connectors), and common network componentry, IncIudIng

PrInt servers
PerIpheraIs
Hubs
Routers
Brouters
BraInBuzz CramsessIon: Network + CertIfIcatIon

20

II.1.4 GIven an InstaIIatIon scenarIo, demonstrate awareness of the foIIowIng
compatIbIIIty and cabIIng Issues:
The consequences of tryIng to InstaII an anaIog modem In a dIgItaI jack
o When an anaIog modem Is InstaIIed Into a dIgItaI jack, such as a PBX,
you take the rIsk of burnIng out your modem
That the uses of RJ-45 connectors may dIffer greatIy dependIng on the cabIIng
o If you are cabIIng for 10BASE-T then the use of 2 paIrs of CAT 3 wIres
Is suffIcIent, but If you pIan to upgrade to 100BASE-TX In the future
then you wIII need CAT 5 and 2 paIrs of wIres.
That patch cabIes contrIbute to the overaII Iength of the cabIIng segment.

II.2 Administering the Change Control System 4%
II.2.1 Demonstrate awareness of the need to document the current status and
confIguratIon of the workstatIon (I.e., provIdIng a baseIIne) prIor to makIng any
changes.
II.2.2 GIven a confIguratIon scenarIo, seIect a course of actIon that wouId aIIow the
return of a system to Its orIgInaI state.
Do a fuII restore from the prevIous day tape backup. WIpe out the partItIon
InformatIon and rebuIId the operatIng system and server servIces from scratch.
II.2.3 GIven a scenarIo InvoIvIng workstatIon backups, seIect the approprIate backup
technIque from among the foIIowIng

Tape backup
FoIder repIIcatIon to a network drIve
RemovabIe medIa,
MuItI-generatIon.

II.2.4 Demonstrate awareness of the need to remove outdated or unused drIvers,
propertIes, etc. when an upgrade Is successfuIIy compIeted.
II.2.5 IdentIfy the possIbIe adverse effects on the network caused by IocaI changes
(e.g., versIon confIIcts, overwrItten DLLs, etc.).
II.2.6 ExpIaIn the purpose of drIve mappIng, and (gIven a scenarIo) IdentIfy the
mappIng that wIII produce the desIred resuIts usIng UnIversaI NamIng ConventIon
(UNC) or an equIvaIent feature. ExpIaIn the purpose of prInter port capturIng and
IdentIfy properIy formed capture commands, gIven a scenarIo.
II.2.7 GIven a scenarIo where equIpment Is beIng moved or changed, decIde when
and how to verIfy the functIonaIIty of the network and crItIcaI appIIcatIons.
II.2.8 GIven a scenarIo where equIpment Is beIng moved or changed, decIde when
and how to verIfy the functIonaIIty of that equIpment.
BraInBuzz CramsessIon: Network + CertIfIcatIon

21
II.2.9 Demonstrate awareness of the need to obtaIn reIevant permIssIons before
addIng, deIetIng, or modIfyIng users.
II.2.10 IdentIfy the purpose and functIon of the foIIowIng networkIng eIements

ProfIIes
Rghts
Procedures/poIIcIes,
AdmInIstratIve utIIItIes,
LogIn accounts, groups, and passwords.

II.3 Maintaining and Supporting the Network 6%
II.3.1 IdentIfy the kInds of test documentatIon that are usuaIIy avaIIabIe regardIng a
vendor's patches, fIxes, upgrades, etc.
II.3.2 GIven a network maIntenance scenarIo, demonstrate awareness of the
foIIowIng Issues:
Standard backup procedures and backup medIa storage practIces
The need for perIodIc appIIcatIon of software patches and other fIxes to the
network
The need to InstaII antI-vIrus software on the server and workstatIons
The need to frequentIy update vIrus sIgnatures.

II.4 Identifying, Assessing, and Responding to Problems 6%
II.4.1 GIven an apparent network probIem, determIne the nature of the actIon
requIred (I.e., InformatIon transfer vs. handhoIdIng vs. technIcaI servIce).
II.4.2 GIven a scenarIo InvoIvIng severaI network probIems, prIorItIze them based on
theIr serIousness.

II.5 Troubleshooting the Network 11%
II.5.1 RecognIze the foIIowIng steps as a systematIc approach to IdentIfyIng the
extent of a network probIem and, gIven a probIem scenarIo, seIect the approprIate
next step based on thIs approach:

DetermIne whether the probIem exIsts across the network,
DetermIne whether the probIem Is workstatIon, workgroup, LAN or WAN,
DetermIne whether the probIem Is consIstent and repIIcabIe, and
Use standard troubIeshootIng methods.

BraInBuzz CramsessIon: Network + CertIfIcatIon

22
II.5.2 IdentIfy the foIIowIng steps as a systematIc approach for troubIeshootIng
network probIems and, gIven a probIem scenarIo, seIect the approprIate next step
based on thIs approach:

IdentIfy the exact Issue,
Recreate the probIem,
IsoIate the cause,
FormuIate a correctIon,
ImpIement the correctIon,
Test,
Document the probIem and the soIutIon, and
GIve feedback.

II.5.3 IdentIfy the foIIowIng steps as a systematIc approach to determInIng whether
a probIem Is attrIbutabIe to the operator or the system and, gIven a probIem
scenarIo, seIect the approprIate next step based on thIs approach:

Have a second operator perform the same task on an equIvaIent workstatIon,
Have a second operator perform the same task on the orIgInaI operator's
workstatIon,
See whether operators are foIIowIng standard operatIng procedure.

II.5.4 GIven a network troubIeshootIng scenarIo, demonstrate awareness of the
need to check for physIcaI and IogIcaI IndIcators of troubIe, IncIudIng
LInk IIghts
Power IIghts
Error dIspIays
Error Iogs and dIspIays
Performance monItors.

II.5.5 IdentIfy common network troubIeshootIng resources, IncIudIng
KnowIedge bases on the WorId WIde Web
TeIephone technIcaI support
Vendor CDs.

II.5.6 GIven a network probIem scenarIo, IncIudIng symptoms, determIne the most
IIkeIy cause or causes of the probIem based on the avaIIabIe InformatIon. SeIect the
most approprIate course of actIon based on thIs Inference. Issues that may be
covered IncIude
BraInBuzz CramsessIon: Network + CertIfIcatIon

23

RecognIzIng abnormaI physIcaI condItIons
IsoIatIng and correctIng probIems In cases where there Is a fauIt In the
physIcaI medIa (patch cabIe)
CheckIng the status of servers
CheckIng for confIguratIon probIems wIth DNS, WINS, HOST fIIe
CheckIng for vIruses
CheckIng the vaIIdIty of the account name and password
RecheckIng operator Iogon procedures
SeIectIng and runnIng approprIate dIagnostIcs.

II.5.7 SpecIfy the tooIs that are commonIy used to resoIve network equIpment
probIems. IdentIfy the purpose and functIon of common network tooIs, IncIudIng

Crossover cabIe
Hardware Ioopback
Tone generator
Tone Iocator (fox and hound).

II.5.8 GIven a network probIem scenarIo, seIect approprIate tooIs to heIp resoIve the
probIem.

If you have any questIons, pIease cIIck beIow:
Network+ QuestIons

SpecIaI Thanks to DavId Schwartzberg - CNE, MCP for wrItIng the
orIgInaI CramsessIon for thIs exam!

Potrebbero piacerti anche