Tải bản đầy đủ (.pdf) (10 trang)

CompTIA Network+ Certification Study Guide part 67 pdf

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (72.49 KB, 10 trang )

Appendix A
646

Table A.1
Listing of 802 IEEE Standards continued
Standard Subject\Description
802.6j Standard for Connection Oriented Services on a Distributed Queue Dual Bus
Subnetwork of a Metropolitan Area Network
802.6k Distributed Queue Dual Subnetwork of a MAN. Supplement for MAC bridging
802.6l Point-to-Point Interface for Subnetwork of MAN. Specification for network
between two locations in a MAN
802.6m Subnetwork of MAN
802.7 Recommended Practices for Broadband LAN. Provides recommendations for
the physical, electrical, and mechanical practices of broadband coaxial media
802.8 Fiber Optic Technical Advisory Group LAN. Standard for fiber optic technology
802.9 Integrated Services (IS) LAN Interface at the MAC and Physical Layer. Standard
for voice and data over twisted-pair media
802.9a Supplement to Integrated Services LAN: IEEE 802.9 Isochronous Service
with CSMA/CD MAC Service
802.9b Supplement for Functional Specification for AU to AU Interworking IEEE 802.9
802.9c Supplement to 802.9, Management Object Conformance Statement
802.9d Supplement to 802.9, PICS
802.10 Standard for Interoperable LAN Security (SILS). Standard for allowing secure
LAN products to interoperate using encryption
802.10a SILS Part A: The Model
802.10b SILS Part B: Secure Data Exchange. Standard on protocol for secure data
exchange at Data Link Layer
802.10c SILS Part C: Key Management. Standard on the management and distribution
of cryptography keys
802.10d SILS Part D: Security Management
802.10e LAN: Recommended Practice of Secure Data Exchange on Ethernet 2.0.


Specifies secure data exchange on LANs using Ethernet
802.10f Secure Data Exchange: Sublayer
802.10g Standard for Security Labeling Within Secure Data Exchange
802.10h Supplement to Interoperable LM Security: PICS Proforma/Security Data
802.11 Standard for WLAN. Standard for MAC and physical layer for wireless
networking
802.12 Demand Priority Access Method, Physical and Repeater Specifications,
100 Mb/s. Standard dealing with 100 Mbs LANs
802.14 Standard Protocol for Cable-TV Based Broadband Communication Network.
Standard for cable modems
802.15 WPAN
802.16 Broadband Wireless Access
Appendix A 647
Table A.1
Listing of 802 IEEE Standards continued
Standard Subject\Description
802.17 Resilient Packet Ring
802.18 Radio Regulatory
802.19 Coexistence
802.20 MBWA
802.21 Media Independent Handoff
802.22 Wireless Regional Area Networks
1802.3-
1991
IEEE Supplement to IEEE Std 802-1990: Methodology and Implementation
for Attachment Unit Interface (AUI) Cable Conformance Testing
1802.3a Supplement to CSMA/CD Access Method and Physical Layer Specifications:
Methodology and Implementation for MAC Conformance Testing
1802.3b Supplement to CSMA/CD Access Method and Physical Layer Specifications:
Methodology and Implementation for PLS, Type 10, Conformance Testing

1802.3c Supplement to CSMA/CD Access Method and Physical Layer Specifications:
Methodology and Implementation for MAU, Type 10BASE-5, Conformance
Testing
1802.3d Conformance Test Methodology for IEEE Standards for LAN and MAN
Networks: CSMA/CD Access Method and Physical Layer Specifications Type
10BASE-T
While there are numerous IEEE standards that have been developed for
networking, the Network+ exam only expects you to know the basic funda-
mentals of a select few. The standards that will be referenced in the exam
and that we’ll discuss in this appendix, are:
802.2 LLC
802.3 CSMA\CD
802.5 Token Ring
802.11 Wireless
802.2 LLC
Earlier in this chapter, we explained how 802 standards break the Data Link
Layer of the OSI model into two sublayers: the MAC and the LLC. The LLC
is used to establish connections between computers, and is used by other
protocols defined by the 802 committee.
When the LLC receives data in the form of a “frame” from the layer
above it (the Network Layer), it breaks it apart into smaller pieces that can
Appendix A
648
be sent over network media. It also adds header information that identifies
upper layer protocols sending the frame, and can also specify destination
processes for the data. The computer receiving the data will view this header
information, and use it to reassemble the data into its proper format.
802.3 CSMA/CD
On the basis of the original Ethernet network from Digital- Intel-Xerox
(DIX), 802.3 is the standard for Ethernet networks today. The only difference

between 802.3 Ethernet and DIX Ethernet V.2 is the frame type. The two
Ethernet networks can use the same physical network, but devices on one
standard cannot communicate with devices on the other standard.
The MAC sublayer uses CSMA/CD for access to the physical medium.
CSMA/CD keeps devices on the network from interfering with one another
when trying to transmit; if they do, a collision occurs. To reduce collisions,
CSMA/CD devices listen to the network before transmitting. If the network
is “quiet” (no other devices are transmitting), the device can send data. Since
two devices can think that the network is clear and start transmitting at the
same time, resulting in a collision, all devices listen as they transmit. If a
device detects another device is transmitting at the same time, a collision
occurs. The device stops transmitting and sends a signal to alert other
nodes about the collision. Then, all the nodes stop transmitting and wait a
random amount of time before they begin the process again.
CSMA/CD doesn’t stop collisions from happening, but it helps manage
the situation when they do occur. In fact, collisions are a normal part of
Ethernet operation. It’s only when collisions begin to occur frequently that
you needed to become concerned.
Ethernet has evolved over the years to include a number of popular spec-
ifications. These specifications are due in part to the media variety they
employ, such as coaxial, twisted-pair, and fiber-optic cabling.
The 10Base5 specification, commonly referred to as  Thicknet, was the
original Ethernet specification and has a maximum distance of 500 m
(approximately 1640 feet) with a speed of 2.94 to 10 Mbps.
The 10Base2 specification, commonly referred to as  Thinnet, uses
a thinner coaxial cable than 10Base5 does and has a maximum
distance of 185 m (approximately 607 feet) with a maximum speed
of 10 Mbps.
The 10BaseT specification uses twisted-pair cabling with a maxi-


mum distance of 100 m (approximately 328 feet) with a speed of 10
to 100 Mbps.
Appendix A 649
802.5 Token Ring
Although Token Ring was first designed in the 1960s, IBM’s token passing
implementation did not become a standard until 1985. The 802.5 standard
was modeled after the IBM Token Ring network, which had been in use for
many years before the standard was developed.
The 802.5 network introduced a unique access method: token passing.
The Token Ring IEEE 802.5 standard passes a special frame known as a
token around the network. This token is generated by the first computer
that comes online on the Token Ring network. When a workstation wants
to transmit data, it grabs the token and then begins transmitting. This
computer will send a data frame on the network with the address of the
destination computer. The destination computer receives the data frame,
modifies it, and sends it onto the network back to the original computer,
indicating successful transmission of data. When the workstation is finished
transmitting, the token is released back onto the network. This ensures
that workstations will not simultaneously communicate on the network, as
in the CSMA/CD method.
802.11 Wireless
The IEEE 802.11 standard addresses wireless networking. This standard
includes the Wireless Access Point (WAP) devices and the wireless network
interface cards (NICs) that are used to send and receive broadcasts from the
cell or WAP device.
The WAPs and wireless NICs can be set to use different frequencies to
allow for cell overlap. This technology does not include the same technology
used by cell phones to manage the movement of PCs or mobile devices. The
wireless NIC is set to a specific frequency and must be changed manually to
be able to communicate with another cell. This means that a PC cannot be

moved from one cell area to another without changing frequency, unless for
some reason the cells operate on the same frequency and have no overlap
of coverage area.
Exam Warning
IEEE standards are an important part of networking, and chances are that you’ll see
questions on them during the exam. You’ll be tested on the main features of LLC, CSMA\
CD (Ethernet), Token Ring, and Wireless technologies. Because Token Ring and Wireless
technologies are also part of the topologies we covered earlier in this chapter, you should
review these topologies to have a firm understanding of the standards. Make sure you
are aware of the basics of 802.2, 802.3, 802.5, and 802.11.
This page intentionally left blank
651
Appendix B
UNDERSTANDING REQUEST FOR COMMENTS
Request for Comments
Request for Comments (RFCs) are documents describing a particular idea,
method, technology innovation or other concept that relates to Internet-
connected systems. These documents are posted and presented to technical
communities as RFCs, and move through different classifications such as
informational or experimental. Some end up on the standards track and
begin the journey as proposed standards. While some RFCs go on to become
standards, others do not. RFCs began in 1969 when the Internet was still
in its incarnation as the Advanced Research Projects Agency Network
(ARPANet). While not all of the RFC specifically deal with the Internet,
all of the Internet standards are written as RFC. They focus on networking
protocols, communication issues, procedures, concepts, and other topics.
RFC are created and maintained by the Internet Engineering Task Force
(IETF). The IETF is an organization that consists of vendors, network admin-
istrators, designers, researchers, and other professionals who are interested
in the operation and future of the Internet. These people can provide pro-

posals to the IETF, which in turn provides a consensus on new standards
that should be added. The proposals that are submitted are called “Internet
Drafts,” which are reviewed by working groups that specialize in specific
areas. If a standard is developed as a result of the Internet Draft, it is written
as an RFC and categorized as a standard.
Using RFC
RFC are categorized using a number that is preceded by the prefix “RFC”.
For example, the RFC dealing with the Domain Name System is RFC 1034.
In reading a Request for Comment, you will find that there is a section that
shows the category or status of the document. These categories include:
Standards-track Documents – have the status of being a Standard,

Draft Standard, and Proposed Standard. This shows its current
state in becoming a standard
Appendix B
652
Best Current Practice – provides procedures and recommendations
Informational – provides information on various subjects. This 
category also includes the IETF’s joke RFC, such as RFC1217
(Memo from the Consortium for Slow Commotion Research
[CSCR]), and RFC1438 (Statements of Boredom [SOBs])
Experimental – designates a particular practice or topic as 
experimental in nature
Historic – standards that are no longer used.
Because the IETF doesn’t remove RFC, all of them are still available for
viewing. Ones that aren’t used are listed as being historic documents, but are
still available for reference purposes. This provides those using the RFC with
the ability to review practices, principles, and protocols that are no longer in
use, but that can be valuable if previous standards need to be reviewed.
As is the case with the Institute of Electrical and Electronics Engineers

(IEEE) standards, the number of standards published by the IETF is massive.
Rather than providing all of them here, Table B.1 provides a list of the Inter-
net standards, many of which also relate to intranets and networks using
Transmission Control Protocol/Internet Protocol (TCP/IP).
Table B.1
IETF Internet Related Standards
RFC Subject\Description
RFC768 User Datagram Protocol
RFC791 Internet Protocol
RFC792 Internet Control Message Protocol
RFC793 Transmission Control Protocol
RFC821 Simple Mail Transfer Protocol
RFC822 Standard for the format of ARPA Internet text messages
Test Day Tip
The IETF’s RFC can easily be distinguished from IEEE standards by their title. IEEE
standards dealing with LANs begin with 802, while RFC begin with RFC.
RFC aren’t extensively covered in the exam, but they can still prove interesting and
useful to review, and provide an additional source of information. A full listing of RFC
can be found at www.ietf.org/iesg/1rfc_index.txt, or by using the RFC online database at
www.rfc-editor.org/rfc.html.
Appendix B 653
Table B.1
IETF Internet Related Standards continued
RFC Subject\Description
RFC826 Ethernet Address Resolution Protocol: Or converting network protocol
addresses to 48-bit Ethernet address for transmission on Ethernet hardware
RFC854 Telnet Protocol Specification
RFC855 Telnet Option Specifications
RFC856 Telnet Binary Transmission
RFC857 Telnet Echo Option

RFC858 Telnet Suppress Go Ahead Option
RFC859 Telnet Status Option
RFC860 Telnet Timing Mark Option
RFC861 Telnet Extended Options: List Option
RFC862 Echo Protocol
RFC863 Discard Protocol
RFC864 Character Generator Protocol
RFC865 Quote of the Day Protocol
RFC866 Active Users
RFC867 Daytime Protocol
RFC868 Time Protocol
RFC891 Distributed Computer Network local-network protocols
RFC894 Standard for the transmission of IP datagrams over Ethernet networks
RFC895 Standard for the transmission of IP datagrams over experimental Ethernet
networks
RFC903 Reverse Address Resolution Protocol
RFC907 Host Access Protocol specification
RFC919 Broadcasting Internet datagrams
RFC922 Broadcasting Internet datagrams in the presence of subnets
RFC950 Internet Standard Subnetting Procedure
RFC959 File Transfer Protocol
RFC1001 Protocol standard for a Network Basic Input/Output System (NetBIOS)
service on a Transmission Control Protocol/User Datagram Protocol (TCP/
UDP) transport: Concepts and methods
RFC1002 Protocol standard for a NetBIOS service on a TCP/UDP transport: Detailed
specifications
RFC1006 ISO transport services on top of the TCP: Version 3
RFC1034 Domain names – concepts and facilities
Continued
Appendix B

654
Table B.1
IETF Internet Related Standards continued
RFC Subject\Description
RFC1035 Domain names – implementation and specification
RFC1042 Standard for the transmission of IP datagrams over IEEE 802 networks
RFC1044 Internet Protocol on Network System’s HYPERchannel: Protocol specification
RFC1055 Nonstandard for transmission of IP datagrams over serial lines: SLIP
RFC1088 Standard for the transmission of IP datagrams over NetBIOS networks
RFC1112 Host extensions for IP multicasting
RFC1122 Requirements for Internet Hosts – Communication Layers
RFC1123 Requirements for Internet Hosts – Application and Support
RFC1132 Standard for the transmission of 802.2 packets over Internetwork Packet
Exchange networks
RFC1155 Structure and identification of management information for TCP/IP-based
internets
RFC1201 Transmitting IP traffic over Attached Resource Computer networks
RFC1209 Transmission of IP datagrams over the Switched Multi-megabit Data Service
RFC1212 Concise Management Information Base (MIB) definitions
RFC1213 MIB for Network Management of TCP/IP-based internets: MIB-II
RFC1350 The Trivial File Transfer Protocol (Revision 2)
RFC1390 Transmission of IP and ARP over Fiber Distributed Data Interface Networks
RFC1661 The Point-to-Point Protocol (PPP)
RFC1662 PPP in High Level Data Link Control–like Framing
RFC1722 Routing Information Protocol (RIP) Version 2 Protocol Applicability Statement
RFC1870 Simple Mail Transfer Protocol (SMTP) Service Extension for Message Size
Declaration
RFC1939 Post Office Protocol – Version 3
RFC2289 A One-Time Password System
RFC2328 Open Shortest Path First Version 2

RFC2427 Multiprotocol Interconnect over Frame Relay
RFC2453 RIP Version 2
RFC2578 Structure of Management Information Version 2 (SMIv2)
RFC2579 Textual Conventions for SMIv2
RFC2580 Conformance Statements for SMIv2
RFC2819 Remote Network Monitoring MIB
RFC2920 SMTP Service Extension for Command Pipelining
Appendix B 655
Table B.1
IETF Internet Related Standards continued
RFC Subject\Description
RFC3411 An Architecture for Describing Simple Network Management Protocol
(SNMP) Management Frameworks
RFC3412 Message Processing and Dispatching for the SNMP
RFC3413 SNMP Applications
RFC3414 User-based Security Model for version 3 of the SNMP (SNMPv3)
RFC3415 View-based Access Control Model for the SNMP
RFC3416 Version 2 of the Protocol Operations for the SNMP
RFC3417 Transport Mappings for the SNMP
RFC3418 MIB for the SNMP
RFC3550 Real-time Transport Protocol (RTP): A Transport Protocol for Real-Time
Applications
RFC3551 RTP Profile for Audio and Video Conferences with Minimal Control
RFC3629 Unicode Transformation Format-8, a transformation format of ISO 10646
RFC3700 Internet Official Protocol Standards
RFC3986 Uniform Resource Identifier: Generic Syntax

×