Wednesday 12 April 2017

Best Comptia Network+ Questions
















The Best Comptia Network+ Questions examples!

QUESTION 1

The network install is failing redundancy testing at the MDF. The traffic being moved is a mixture of multicast and unicast signals.Which of the following would BEST handle the rerouting caused by the break of service?

Dynamic Host Configuration Protocol















The DHCP Is a protocol used in a network to help configure the parameters needed for devices to communicate such as IP addresses. The DHCP configures these parameters automatically so that a network administrator would not have to configure each device statically on a network. The DHCP

An overview about Routing Tables
















A Routing Table is a database within a router, storing and updating  addresses of other network devices and providing the most efficient routes. It is used for directing traffic.


When working with a Layer 3 device, like a router, it is important  to understand how the traffic is

Tuesday 11 April 2017

Wireless Standards
















IEEE 802.11 is a set of media access control (MAC) and physical layer specifications for implementing wireless local area network (WLAN) computer communication. The first version was created in 1997 by the Institute of Electrical and Electronics Engineers (IEEE)

The Basics Of TCP/IP
















The possibility of sending programs and data between computers via computer networks is a vital matter for almost every computer user. However building the universal network that meets requirements of all users is practically impossible.

A deep vision into Routing Information Protocol
















The RIP is one of the oldest distance-vector routing protocol which employs the hop counts as a routing metric. This protocol prevents routing loops by implementing a limit on a certain amounts of hops allowed in the path from source to destination.

Network Troubleshooting Model
















As a Network Administrator, Troubleshooting in an efficient and effective way is key to resolving many of the wide array of issues that can occur day to day.
For many offices, it is imperative  that services and systems run optimally and consistently,

Network Intrusion Detection And Prevention Systems
















The 21st century business is hinged on information and communication network infrastructure for efficiency and to ease end-to-end business processes. For this reason and strictly from a fundamental point of view, it is extremely important that measures are taken to mitigate both internal and external threats to the network and devices within.

Firewalls for the Common User
















A Firewall is a built in protection system for computers.
The firewall is there as a first line of defence to protect a computer from unwanted intruders.
For the home user the most lightly entry point for unwanted snoopers  to a home system is via the Internet.

Common Port Numbers - An explanation about
















Port 20/21: FTP (File Transfer Protocol)
FTP is used for the transfer of files over a computer network. It is one of the most commonly used file transfer protocols within private networks and also the Internet. Port 20 is used for the credentials of the data and port 21 is used to actually transfer the data.

Routing Protocols - Explained and Examples
















A routing protocol discovers other routers and advertises the best pathway of communication between routers throughout the network, enabling any two nodes to communicate in a computer network. Protocols such as RIP, OSPF or EIGRP are the responsible for sharing information about their neighbors and the type of topology of the network.

Spanning Tree Protocol Explained
















Spanning Tree Protocol (STP) was invented by Dr. Radia Perlman whilst she worked for Digital Equipment Corporation (DEC) based on an algorithm she designed to eliminate loops in computer networks which became her thesis at MIT. Her thesis was “Network Layer Protocols with Byzantine Robustness” submitted to the Massachusetts Institute of Technology (MIT) in August 1988.

Network Topologies Explained
















Network Topology is the arrangement of numerous elements of a computer network and maybe depicted physically or logically. Physical topology is the putting together of a number of components of a network, including cable installation and device location and the logical part shows how data moves through a network irrespective of its design.