Sunday, July 28, 2013

Some Good Articles on Computer Networking

An article on computer networking is available from TutorialsWeb.com, the contents of which are given below:

Computer Networks: Planning, Design, Implementation - A Tutorial

  1. Computer Network Planning and Design
  2. Computer Network Implementation
  3. Computer Networks Security
Network security needs to be defined preferably using a Security Policy document. The security policy document is a comprehensive document covering areas of security preparation, prevention, and response.
Security policy preparations: Security policy preparation include creation of usage policy statements, risk analysis, and security team formation. The risk analysis should identify the risks to your network resources including physical devices, and data. The classification of risks is done ( e.g. low risk components,  high risk components etc.) and appropriate security measures taken. Next step in security policy preparation is establishing the access levels such as super admin, admin, backup operator, user etc. Assigning appropriate resource access levels restrict access to critical resources only to authorized personnel. Firewalls, proxy servers, gateways, and email servers need to be given highest levels of security.
Security policy implementation: The security policy team is responsible for implementation of security provisions. The security provisions typically include the following:
  • Firewalls, proxy servers, or gateway configuration
  • Access Control Lists (ACLs) formation and implementation
  • SNMP configuration and monitoring
  • Security hot fixes to software of various devices, operating systems, and applications.
  • Backup and restore procedures
Security Response: Should any security breach occurs, a response should be implemented by the security team. A security response consists of identifying the security violation, implementation of remedial action, review, and documentation. Typical steps include the following:
  • Isolate the violation and prevent further spread
  • Take evidence of the violation before initiating a corrective action. Otherwise, the evidence may be lost, and you would not be able to identify the origin of the violation.
  • Contact local police or government agencies and report if necessary
  • Test the system for remedial action, and document.
    1. Wireless LAN (WLAN) comparison
    2. 802.11a wireless networks
    3. 802.11b wireless networks
    4. 802.11g wireless networks
    5. Bluetooth wireless networking protocol

Business organizations have traditionally separated their voice and data networks, doubling the cost of equipment and maintenance, support staff and training. However, voice over IP networks is being increasingly used by Individual and Corporate users. With IP telephony, it is possible to remove the costly PBX and replace it with a voice and data gateway implementing IP Telephony. Now a days, most routers that are used with data networks are coming with voice capability.
By using appropriate gateway, voice and data can be multiplexed and carried together without the need for a separate voice carrier. This in turn reduces the equipment, maintenance, and running costs significantly. Typical applications include Central office and branch office communications, call centers, and remote communications.
Benefits of IP telephony:
  • Significant reduction in the cost compared to discrete voice and data networks.
  • Reduction in the maintenance, support and training of personnel associated with voice and data networks
  • Unified messaging using state of the art technology
  • Better return on investment (ROI).
  • Increased functionality with value added services such as SMS, and others.
Visit TutorialsWeb for complete article, and more such articles.

Thursday, July 25, 2013

CompTIA Network+ N10-005 Practice Tests

SimulationExams.com has released new Network+ practice tests that cover the objectives for exam N10-005. The old exam, N10-004 has become obsolete, and discontinued by CompTIA. The important features of the exam engine are:
  • 300+ highly relevant questions
  • Flash cards
  • Integrated Test Engine with online feedback
  • Categorywise scoring, and reporting
  • The question types include Multiple Choice, True/False, Exhibit, etc.
  • Conforms to the latest exam objectives
  • Instant online activation using program interface
The exam topics for CompTIA Net+ include the following:

1.9 Identify virtual network components: Virtual switches, Virtual desktops, Virtual servers, Virtual PBX, Onsite vs. offsite, Network as a Service (NaaS)

2.2 Given a scenario, install and configure a wireless network: WAP placement, Antenna types, Interference, Frequencies, Channels, Wireless standards, SSID (enable/disable

2.4 Given a scenario, troubleshoot common wireless problems: Interference, Signal strength, Configurations,  Incompatibilities, Incorrect channel, Latency, Encryption type, Bounce, SSID mismatch, Incorrect switch placement

2.5 Given a scenario, troubleshoot common router and switch problems: Switching loop, Bad cables/improper cable types, Port configuration, VLAN assignment, Mismatched MTU/MUT black hole, Power failure, Bad/missing routes, Bad modules (SFPs, GBICs), Wrong subnet mask, Wrong gateway, Duplicate IP address, Wrong DNS, Vulnerability scanners:, NESSUS, NMAP Methods, Honeypots, and Honeynets

5.4 Explain common threats, vulnerabilities, and mitigation techniques:  Wireless:, War driving, War chalking,  , WEP cracking, WPA cracking, Evil twin, and Rogue access point

5.0 Network Security
5.1 Given a scenario, implement appropriate wireless security measures: Encryption protocols:, WEP,  WPA, WPA2, WPA Enterprise, MAC address filtering, Device placement, Signal strength, Tunneling and encryption:
o SSL VPN, VPN, L2TP, PPTP, IPSec, ISAKMP (new), TLS (new), TLS1.2 (new), Site-to-site and client-to-site (new)

You may download Net+ practice tests for evaluation, and buy later.