Show Menu
Cheatography

Network+ | 05.Ethernet Fundamentals Cheat Sheet by

CompTIA Network+ certification course sum up. Oriented for cybersecurity later courses. *This sheet is quite simplified as its goal is to prepare for cybersecurity certifications. Some purely tech topics are missing.*

Fundam­entals

Basic elements
Layer 1, conten­tio­n-based (unorderly transm­ission)
CSMA/CD
Carrier Sense Multiple Access / Collision Detect
Carrier Sense
Listen to the wire, verify if busy
Multiple Access
all devices have access at any time
Collision Detect
if collision occurs, wait random time, try again
Collision Domain /CDO
all devices on an internet segment (same cable or hub)
 
half duplex, operates CSMA/CD
Switches
creates multiple CDOs, 1port=1CDO
 
-> no chance of collision, full-d­uplex capability

Limita­tions

SPEED
Ethernet
10Mbps
Fast Ethernet
100Mbps
Gigabit Ethernet
1000Mbps / 1Gbps
10-Gigabit Ethernet
10Gbps
100-Gi­gabit Ethernet
100Gbps
DISTANCE (memo)
Copper
100m
CAT6
100m@1Gbps / 55m@10Gbps
CAT8
30m
MMF (T, TX,FX, SR, SX)
short range (200-500m)
SMF (LX, LR, ZX)
long range (in km)

Infras­tru­cture devices

Collision domain /CD
network segment where packets collide. Collision detect­ion­/av­oidance can be set
Broadcase domain /BD
domain where broadcast packets are diffused. The smaller the better
Hub
multiport repeater with or without amplif­ication (passi­ve/­act­ive­/smart)
Bridge
analyse source MAC adr & populates table. Separates collision domains
Switch
combin­ation of hub and bridge
- layer 2
all ports belong to broadcast domain
- layer 3
creates one BD per port. Makes routing decisions, interc­onnect entire NW
Router
connects NW together, makes fw decisions. Separates CD and BD

Other Features

Link Aggreg­ation
802.3ad
combines multiple connect° into a single logical connect°
   
increased bandwith, congestion lowered
PoE, PoE+
802.3af/at
electrical power over Ethernet, Cat5 mini, 15.4W/­25.5W
Port monitoring
 
network sniffer plugged on a hub - analyse purpose
Port mirroring
 
copy all traffic to another port
User Auth.
802.1x
once auth., a key is generated and shared
Management
 
SSH for remote access, console port for local admin.
Out-of­-Band
 
NW conf. devices on a separate NW
First-Hop Redundancy
 
creates a stand-by router in case the active router fails
MAC Filtering
 
filters connect° based on MAC adr
Traffic Filtering
 
filters connect° based on IP adr
QoS
 
forwards traffic according to priority markings
 

Spanning Tree Protocol STP 802.1D

Role
redundant links btw switches, prevent traffic loops. Without STP, MAC table can be corrupted
Broadcast Storms
when a switches broadcasts btw each other in loop. Multiple copies are forwarded in loop. NW becomes saturated
Root Bridge
reference bridge for spanning tree. defined with BID (lower BID) - made of priority value and MAC adr.
Non-Root Bridge
all other switches
 
Root Port
on N-RB, closest port to the RB
Designated Port
port with the lowest cost index to route to the RB. RB has only designated ports
Non-Des. Port
all other ports. Block traffic to avoid loops
 
Port states
- Blocking
BPDU recieved but not forwarded
- Listensing
idem+ but populates MAC adr table
- Learning
process BPDU, switch tries to determine its role
- Forwarding
full ops
 
Link Costs
speed of a link. Lower the speed, higher the cost
ex:
Fast Ethernet :19, GB Ethernet : 4
 
Long STP from 2.000.000 to 2.

Virtual LAN (VLAN)

Principle
allows different logical NWs with a single hardware.
How ?
use certain ports to separate broadcast domains
VLAN Trunking
multiple VLAN using same phy. cable
TPI
Tag Protocol Identifier
TCI
Tag Control Identifier
VLAN 0
Native VLAN left untagged

Specia­lized Equipment

VPN
virtual tunnel over untrusted NW/Int­ernet
VPN concen­trator
tunnel traffic to a single location
VPN headend
Firewalls
softw or hardw, allows some outcome traffic, blocks some inbound traffic
NGFW
packet inspection at layer 7 (App lvl). much more powerful
IDS/IPS
Intrusion Detect­ion­/Pr­eve­ntion System
 
recognizes attacks and can respond
Proxy
content filter server
Conten­t/C­aching Engine
caching service for a proxy
Load Balancer
distri­butes request across a server farm
           
 

Comments

No comments yet. Add yours below!

Add a Comment

Your Comment

Please enter your name.

    Please enter your email address

      Please enter your Comment.

          Related Cheat Sheets

          Network+ | 02.OSI Model Cheat Sheet
          Network+ | 03.TCP/IP Model Cheat Sheet
          Network+ | 04.Media & Cabling Cheat Sheet

          More Cheat Sheets by Aelphi

          Network+ | 01.Basics Cheat Sheet
          Network+ | 02.OSI Model Cheat Sheet
          Network+ | 03.TCP/IP Model Cheat Sheet