0% found this document useful (0 votes)
29 views12 pages

OSI Model & Network Essentials Guide

Uploaded by

Monique Wilson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views12 pages

OSI Model & Network Essentials Guide

Uploaded by

Monique Wilson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Network + N10-008 Notes

1. The OSI Model – Open Systems Interconnection Reference Model


a. Layer 1 – Physical
i. Physics of network. Signals, cabling, connectors
ii. Not about protocols
iii. Check/test cables, run loopback tests.
b. Layer 2 – Data Link
i. The basic network language.
ii. Foundation of communication
iii. Data Link Control protocols – MAC address on ethernet
iv. The “switching” layer
c. Layer 3 – Network
i. The “routing” layer.
ii. Where IP operates.
iii. Fragments frames to traverse different networks.
d. Layer 4 – Transport
i. The “post office” layer.
ii. How and where data is being layered.
iii. TCP and UDP
e. Layer 5 – Session
i. Start and stop communication between endpoints.
ii. Control or tunneling protocols.
f. Layer 6 – Presentation
i. Character encoding.
ii. Puts data into a form that can be understood by the end user.
iii. Often combined with application layer.
iv. Encryption (SSL/TLS)
g. Layer 7 – Application
i. The layer that humans get to see on browsers or interfaces.
2. Data Communication
a. PDU – Protocol data unit:
i. Transmission units. Taking a little bit of data and transferring it
across the network in a single unit.
ii. Ethernet operates on a frame of data.
iii. IP operates on a packet of data.
iv. TCP or UDP header – TCP segment or UDP datagram
b. Encapsulation and decapsulation
i. Sends data within app. Data needs to go from server to client.
ii. TCP header is on top of application data.
iii. IP header is on TCP and app data.
iv. The frame header encapsulates all above. The frame trailer
decapsulates all above.
v. Each layer has a header and payload.
c. TCP flags
i. Within TCP header.
ii. The header describes or identifies the payload.
iii. The device that’s receiving data can interpret bets or control
flags.
iv. Can identify if a flag has been turned on or off.
v. The flags control the payload
1. SYN – synchronize sequence numbers
2. PSH – push the data to the application without buffering.
3. RST – reset the connection
4. FIN – last packet from the sender
d. MTU – Maximum Transmission Unit
i. Within IP header.
ii. Deals with fragmentation of data.
iii. Used when you can’t send large packets.
iv. Max size is determined by MTU. Designates size of data.
v. Difficult to know MTU value from beginning to end because there
are different hops.
e. Building an ethernet frame
i. Fragments are always in multiples of 8 because of the number
fragmentation of bits
f. Troubleshooting MTU
i. MTU sizes are usually configured once.
ii. MTU needs to change when tunneling is involved.
3. Network Topologies
a. Useful in planning a network. It’s the physical layout of the network.
Assists in understanding signal flow and troubleshooting problems.
b. Wired Types
i. Star – Hub and spoke. Used in most large and small networks. All
devices are connected to a central device. Ethernet switch is in
middle and all devices connect to the switch and not each other.
ii. Ring – used in many popular topologies for WAN and Metro Area
Networks. Has a built-in fault tolerance.
iii. Bus – a type of ethernet network ran over coaxial cable. Used in
local early networks. Simple but prone to errors because there is
a single cable used. If there is a break in cable, it will segment
data or cause no data to traverse network. No redundancy.
Used in CAN (controller area network) buses. Used to control all
sensors and controls in automobiles.
iv. Mesh – popular topology. Multiple links to same place. Instead of
a single connection, there are multiple connections to create
redundancy. Commonly in a WAN.
v. Hybrid – combining different topologies together. More than 1
topology type working together.
c. Wireless Types
i. Infrastructure – all devices communicate through an access
point. The most common wireless communication mode.
ii. Ad hoc networking – no pre-existing infrastructure. Devices
communicate amongst themselves. No proxy.
iii. Mesh – ad hoc devices work together to form a mesh “cloud”.
Self-form and self-heal.
4. Network types
a. Peer-to-peer – all devices are both clients and servers. Easy to deploy
and low cost. Difficult to administer and secure.
b. Client-server – responsibilities are split. Clients and a server. Everyone
accesses the same server.
c. LAN – local area network. A building or group of buildings with high-
speed connectivity. Uses ethernet and 802.11 wireless. Any slower and
it isn’t local.
d. MAN – metropolitan area network. A network within your city. Larger
than a LAN but smaller than a WAN. Sometimes referred to as metro
ethernet. Common to see government ownership because government
has the “right of way”.
e. WAN – wide area network. Spanning the globe. Generally connects
LANs across a distance. Networks become slower. Many different WAN
technologies like cable in the ground and satellite.
f. WLAN – wireless local area network. 802.11 technologies. Exists within
a building and has a limited geographical area. If you leave the
building you won’t continue to communicate with the WLAN. Can be
extended using multiple APs.
g. PAN – personal area network. Bluetooth headsets, keyboards etc.
Bluetooth, infrared, NFC.
h. CAN – campus area network. Or corporate area network. Connected
with conduit and fiber connected. Run LAN for high-speed ethernet
between buildings as if you’re within the same building. Usually on
private land. No third-party provider.
i. NAS – network attached storage. Contains multiple drives and stores
large amounts of data in one single area. Can access files at file level.
j. SAN – storage area network. Block-level access. Very efficient reading
and writing. Requires a lot of bandwidth.
k. MPLS – multiprotocol label switching. Communication through the WAN
but uses labels to determine how traffic is routed. Can be used with
any type of connection and any type of data can be inside. Forwarding
decisions made based on label switching.
l. mGRE – multipoint generic router encapsulation. Used for DMVPN to
send data across mGRE networks. Only created when needed. If there
is a break, the VPN rebuilds itself to communicate between different
sites. Also considered a dynamic mesh.
m. SD-WAN – software defined wide area network. Can be defined
however we want to lay out. Useful for cloud.
5. WAN Terminations
a. Demarcation point – a physical connection that separates the ISP and
personal area. Location of demarcation is important to troubleshoot
where the issue is occurring.
b. Smartjack – a specialized equipment that allows providers to control
demarcs remotely. Usually in a locked container with limited access.
Built-in diagnostics.
6. Virtual networks
a. All servers are connected with enterprise switches and routers. Migrate
several servers into a virtual server within one physical server.
b. NFV – network function virtualization. Moving physical infrastructure
within hypervisor. Same functionality as a physical device.
c. Hypervisor – virtual machine manager. Manages all operating and
virtual systems and connections. Responsible for managing access to
CPU, memory, and network from a management console.
d. vSwitch – Virtual switch. Functionality is similar to a physical switch:
forwarding, link aggregation, port mirroring, netflow etc.
e. vNIC – virtual Network Interface Card – configured through hypervisor.
Can enable additional features.
7. Provider Links
a. Satellite networking – communication to a satellite. High in costs but
good bandwidth. High latency.
b. Copper – inexpensive but limited bandwidth. Not used for higher
speeds. Common in WAN on cable modem or DSL. Often combined
with fiber.
c. DSL – Asymmetric Digital Subscriber Line. Speeds are different coming
in than going out. Download speed is faster than the upload speed.
Distance limitation from the central office.
d. Cable broadband – the signals inside the coax connection are being
transmitted across a broad number of data lengths. Different traffic
types. DOCSIS – type of connectivity used by this cable modem. High-
speed networking.
e. Fiber – fastest way to communicate over network. More expensive than
copper and more difficult to repair. Allows to send a lot of data along
long distances. Common for WAN and Isp to use fiber because of the
speed and bandwidth.
f. Metro Ethernet – used in MAN. Usually within a small geographical area
and connect using high-speed networks. Ethernet on both sides of
connection. The provider network has higher speed connectivity over
fiberoptics.
8. Copper cabling
a. The foundation of ethernet networks. The majority of wireless
communication is a wired connection.
b. Twisted pair copper cabling – balanced pair operation. Sending
opposite and equal signals. Transmit +/-, Receive+/-. Because the
wires are twisted, they are always moving away from interference.
c. Copper cabling categories
i. 1000BASE-T – Category 5 100 meters
ii. 1000BASE-T – Category 5e (enhanced) – 100 meters
iii. 10GBASE_T – Cat 6 – unshielded 555 meters, shielded 100
meters
iv. 10gBASE-T – Cat 6A augmented – 100 meters
v. 10GBASE-T – Cat 7 shielded only – 100 meters
vi. 40GBASE-T – Cat 8 shielded only – 30 meters
d. Coaxial cables – two or more forms share a common axis. Used in
television and digital cable.
e. Twinaxial cable – two separate conductors. Common on 10GB ethernet
over copper. Full duplex, five meters, low cost, low latency compared
to twisted pair.
f. Structured cabling standards – a set of standards that dictate use and
installation. Called international ISO/IEC 11801 cabling standards.
Telecommunications industry Association (TIA) – standards, market
analysis, trade shows, government affairs. Commonly referenced for
pin and pair assignments of eight conductor
g. T568A and 7568B Termination – pin assignments from t568b standard.
Are different pin assignments for 8p8c connectors. Many orgs use
T568B. Once you select a standard, you must use that for their entire
organization.
i. T568A (in order)
1. White and green
2. Green
3. White and orange
4. Blue
5. White and blue
6. Orange
7. White and brown
8. Brown
ii. T568B
1. White and orange
2. Orange
3. White and green
4. Blue
5. White and blue
6. Green
7. White and brown
8. Brown
9. Optical fiber
a. Fiber communication – transmission by light instead of electrical
signals. No radiofrequency that can be eavesdropped. Can send signal
over long distances.
b. Multimode fiber – for short range up to 2km and uses LED or
inexpensive light source. Light reflects through multiple modes as it
travels from one side to the other.
c. Single mode fiber – has a smaller core and only allows one mode of
light. Used for long distances. Some implementations of ethernet can
run along single mode fiber up to 100km. need a light stronger than
LED. expensive because it’s using laser lights.
10.Network connectors
a. LC – local connector. Has 2 different fibers inside of it to send/receive.
Plugs in with locking connectors. Small connectors and popular on
recent routers and switchers.
b. ST – straight tip. Slightly larger than LC. Been around for a while. Lock
in place using bayonet connectors.
c. SC – subscriber connectors. Square connectors. Might be connected
individually or plugging in two fibers simultaneously. Has a locking
mechanism.
d. MT-RJ – mechanical transfer registered jack. Very small connector with
2 tiny fiber connectors. The one with the smallest amount of real
estate that it takes on a switch or router. Used when you want to use
as many connectors as permitted.
e. UPS and APC – makes sure optimal amount of light is from beginning to
end. The return loss is how much light is reflected back to the source.
To minimize return loss you use a UPC (ultra-polished connectors). Has
a high return loss. APC (able-polished connector) slight angle and has a
lower return loss.
f. RJ11 connector – a copper connection. Stands for registered jack type
11. Only 2 conductors are inside of cable. Sometimes as a 6p2c.
g. RJ14 – uses 6P4C. used for DLS or analog.
h. RJ45 – 8P8C. modular connector. All 6 connectors are used for internet
connections.
i. F connector – used for cable modems. Follows standards associated
with DOCSIS. An RJ6 type of coax cable and the end is threaded to lock
in place.
11.Network Transceivers
a. Media converter – operates on OSI layer 1. Physical layer conversion.
b. Transceiver – a transmitter and receiver within the same physical
component. Allows you to plug in the type of connection you would like
to use.
c. Duplex communication – two fibers within the transceiver. One
transmits and one receives.
d. Bi-directional (biDi) transceivers – traffic in both directions with a single
fiber. Allows to send and receive traffic over a single strand of fiber.
e. SFP and SFP+ - small form factor pluggable. Commonly used to provide
1 GB connections. The enhanced version is the same physical size but
increases throughput of transceiver.
f. QSFP – the more interfaces the more value. This transceiver is also
called a quad small form-factor pluggable. It’s smaller than an SFP but
fits 4x the throughput. It also has an enhanced version.
12.Cable Management
a. Cable infrastructure – a well thought out way to manage cabling within
a space.
b. Patch panel – allows cable management. A central console for
connection of multiple cables.
c. Fiber distribution panel – fiber is not run through desks but ran through
buildings. Provides a fiber bend radius. Often has extra fiber in case it
needs to be extended.
d. 66 block – a patch panel for analog voice.
13.Ethernet
a. Most popular networking tech in the world. Many different types.
Ethernet standards = BASEband.
b. 1- and 100-megabit ethernet – twisted pair. 10BASE-T. Cat 3 cable
minimum. 100-meter max distance. Can be increased with 100BASE-
TX. Sometimes referred to as “fast ethernet’. Cat 5 minimum with two
pair of wires extended over a 100-meter max distance.
c. 1000Base-T – uses 4 pairs of wires. Cat5e cables. 100-meter max
distance.
d. 10GBASE-T – 10 gig ethernet over copy. 4 pair balanced twisted pair.
Frequency of 500 MHz Requires minimum of Cat6 cable. Unshielded
max distance is 55 meters. Shielded can go up to 100 meters. Cat6A
can go up to 100 meters shielded or unshielded.
e. 40GBASE-T – 40 gig per second Ethernet. Requires a Cat8 cable
minimum and only allows up to 40 meters.
f. 100BASE-FX – 40 gig ethernet over fiber. Up to 400 meters on half-
duplex. Up to 2 km full duplex. Pair of multimode fiber; uses the same
fiber as FDDI. Uses lasers to send light.
g. 100BASE-SX – can communicate using LED optics and less experience
than 100BASE-FX. Can go up to 300 meters.
h. 1000BASE-SX – using short wavelength laser and can go to 220 meters
to 550 meters depending on fiber type
i. 1000BASE-LX – gig ethernet using wavelength laser
j. 10GBASE-SR – also called short range. Can extend 26 – 400 meters.
k. 10GBASE-LR – long range. Uses single-mode fiber and can be extended
to 10 km.
l. WDM – wavelength-division multiplexing. Use different wavelengths for
each carrier.
m. CWDM – coarse wavelength – division multiplexing. Uses 4 3.125
gb/sec carriers at 4 diff wavelengths.
n. DWDM – dense wavelength division multiplexing. Add 160 signals.
14.Binary Math
a. A bit is 0 or 1. 1 = on. 0 = off.
b. 8 bits = 1 byte = 1 octet
c. A byte = 8 bits. Also called an octet.
d. A binary-to-decimal conversion chart.
128 64 32 16 8 4 2 1

15.IPv4 Addressing
a. IP address – uniquely identifies a device on a network.
b. Subnet Mask – used by the local device to determine what subnet it’s
on. The subnet mask isn’t transmitted across the network.
c. Default gateway – the router that allows you to communicate outside
of your local subnet. Must be an IP address on the local subnet.
d. Loopback address – an address that references itself. Ranges from
127.0.01 through 127.255.255.254.
e. Reserved addresses – a block of addresses that have been set aside.
Range from 240.0.0.1 to 254.255.255.254. should not be configured on
a local machine or prod network. All “Class E” addresses are reserved.
f. Virtual IP address – not associated with a physical network adapter.
Assigned to internal system and assigned to a logical adapter.
g. DHCP – dynamic host configuration protocol. Configures IPv4 address,
subnet mask, gateway, DNS servers, NTP servers, etc. provides
automatic address and IP config for almost all devices.
h. APIPA – automative private IP addressing. A link-local address. Can only
communicate to other devices. No forwarding by routers. Ranges from
169.254.0.1 to 169.254.255.254. First and last 256 addresses are
reserved. Automatically assigned if DHCP server is not available.
16.Network Address Translation
a. IPv4 supports around 4.29 billion addresses and the works has more
than that many devices. The address space has been exhausted.
b. RFC 1918 private IPv4 addresses

IP address range Number of Classful Largest CIDR block Host


addresses description (subnet mask) ID size

10.0.0.0 – 16,777,216 Single class A 10.0.0.0/8 24


10.255.255.255 (255.0.0.0) bits

172.16.0.0 – 1,048,576 16 contiguous 172.16.0.0/12 20


172.31.255.255 class Bs (255.240.0.0) bits

192.168.2.2 – 65,536 256 192.168.0.0/16 16


192.168.255.255 contiguous (255.255.0.0) bits
class Cs
c. The router provides translation functionality.
d. NAT overload/PAT – when you have many Ips that need to
communicate.
17.Network communication
a. Unicast – one station sending information to another station. One-to-
one. Does not scale optimally for real-time streaming media.
b. Broadcast – send information to everyone at once. One-to-all. A single
packet of data is transmitted and broadcasted to all devices on the
network.
c. Multicast – send a single frame only to be received by devices that are
interested in receiving the information. Multimedia communication,
stock exchanges, dynamic routing updates. Very specialized but
difficult to scale across larger networks.
d. Anycast – single destination IP address has multiple paths to two or
more endpoints. One-to-one-of-many.
18.Classful subnetting
a. Very specific subnetting architecture.

Class Leading Network Remainin Number Hosts per Default


bits bits g bits of Network Subnet
Networks Mask
Class A 0xxx (1- 8 24 128 16,777,2 255.0.0.0
127) 14
Class B 10xx 16 16 16, 384 65,534 255.255.0.0
(128-
191)
Class C 110x 24 8 2,097,15 254 255.255.25
(192- 2 5.0
223)
Class D 1110 Not Not Not Not Not defined
(multicas (224- defined defined defined defined
t) 239)
Class E 1111 Not Not Not Not Not defined
(reserved (240- defined defined defined defined
) 254)
b. The construction of a subnet
i. Network address – the first Ip address of a subnet. Set all host
bits to 0
ii. First usual host address – one number higher than the network
address.
iii. Network broadcast address – the last IP address of a subnet. Set
all host bits to 1
iv. Last usable host address – one number lower than the broadcast
address.
19.IPv4 Subnet Masks
a. A continuous series of 1s. ones are on the left and 0s are on the right.

20.Calculating IPv4 Subnets and Hosts


a. To be able to connect to certain devices and separate the network into
smaller pieces by sending traffic to the next router and that router
sending to the next router.
b. VLSM – Variable Length Subnet Masks. Network admins can determine
the best subnet mask. Allows customization of subnet mask to specific
network requirements.
c. Number of subnets = 2 to the subnet bits power
d. Hosts per subnets = 2 to the host bits power – 2
21.Introduction to IP
a. Efficiently move large amounts of data.
b. The network topology is the road
c. The truck is the IP
d. The boxes hold your data. Boxes of TCP or UDP
e. Inside the boxes is more information, app information etc.
f. TCP and UDP
i. Transported inside of IP. Encapsulated by the IP protocol.
ii. Two different ways to send data.
iii. Operates on the OSI layer 4. Layer 4 protocol.
iv. Can perform multiplexing (using multiple apps simultaneously
over the same network)
v. Transmission control protocol – connection-oriented. A setup
process before data is sent. When data is sent there is an
acknowledgement. Known as a reliable protocol.
vi. User Datagram Protocol – connectionless. No formal open or
close and no acknowledgement. Known as an unreliable delivery
method because there is no acknowledgement to confirm data
was sent and accurately. No flow control.
g. Ports
i. IPv4 sockets – consists of Server IP address, protocol, server
application port number or client IP address, protocol, client port
number.
ii. Non-ephemeral ports – permanent and well known ports. 0 –
1,023. Usually on a server or a service.
iii. Ephemeral ports – temporary port numbers. 1,024 – 65,535.
h. Ports on the network
i. Web server – tcp/80
ii. voIP server – udp/5004
iii. email servr – tcp 143
22.Common ports
a. Telnet – telecommunication network protocol. Tcp/23. Allows to connect
to devices remotely via console. Sends information across network
without any encryption.
b. SSH – secure shell. Tcp/22. Encrypted communication. Allows to
connect to devices remotely via console and information is sent over
the network in encrypted form.
c. DNS – Domain Name System. Udp/53. Converts names to IP addresses.
Large transfers may use tcp/53.
d. SMTP – simple mail transfer protocol. Tcp/25(plaintext) or
tcp/587(encryption using TLS). Server to server email transfer. Also
used to send email from a device to a mail server.
e. POP3 – post office protocol version 3. Tcp/110 (plaintext) tcp/995 (over
TLS encryption. Basic mail transfer.
f. IMAP4 – internet message access protocol version 4. Tcp/143
(plaintext) tcp/993 (TLS encryption) includes management of email
inbox from multiple clients.
g. SFTP – secure file transfer protocol. Tcp/22. Provides file system
functionality like resuming interrupted transfers, directory listings, or
remote file removal. Encrypted communication uses SSH22.
h. FTP – file transfer protocol. Tcp/20 (active mode data) transferring file.
Tcp/21 (control) tells system which file to send. Authenticates with
username and password and has full functionality.
i. TFTP – trivial file transfer protocol. UDP/69. Very simple method of
transferring files. Reads and writes files. No authentication. Not used
on prod systems.
j. DHCP – dynamic host configuration protocol. Udp/67 and udp/68.
Requires a DHCP server. Automated configuration of IP address, subnet
mask, and other options. DHCP pool are a pool of IP addresses that are
assigned in real-time and are given a lease time. DHCP reservation;
addresses are assigned by MAC address in the DHCP server.
k. HTTP – Hypertext transfer protocol tcp/80. Web server communication
in the clear.
l. HTTPS – hypertext transfer protocol secure tcp/443. Encrypted web
server communication
m. SNMP – simple network management protocol. Udp//161. Gather
statistics from network devices.
n. Syslog – udp/514. Standard for messaging logging to see what is
occurring over the network. Diverse systems within a consolidated log.
Integrated into the SIEM.
o. RDP – remote desktop protocol. Tcp/3389. Share a desktop from a
remote location on Windows computers. Can connect to an entire
desktop or just an app.
p. NTP – network time protocol. Udp/123. Switches, routers, firewalls,
servers and workstations have the same date and time configured.
q. SIP – session initiation protocol. Tcp 5060/5061. Used to set up phone
call, tear down phone call and control while it’s in use. It’s in charge of
voice communications.
r. SMB – server message block. Protocol used by MSFT Windows. File
sharing and printer sharing. Direct over tcp445. Direct SMB
communication over TCP without the NetBIOS transport.
s. LDAP/LDAPS. Tcp389. Lightweight directory access protocol. Secure is
tcp636 and also not a standard for. This is used to store and retrieve
information.
t. Databases
i. MSFT SQL server – TCP 1433
ii. Oracle SQL server tcp 1521
iii. MySQL tcp3306
u. ICMP – internet control message protocol. Devices use to send
messages not transfer data. For example: ping, ipconfig etc
v. GRE – Generic Routing Encapsulation. The tunnel between two
endpoints. Allows to encapsulate other types of data within an IP
packet and send to remote site.
w. VPN – virtual private networks. Send information over encrypted
tunnel. Integrated into firewalls. Can be standalone or software based.
x. IPSec – internet protocol security. Provides encryption of security of
data running across the IP network at OSI layer 3. Provides integrity
and anti-replay.

You might also like