CompTIA Network+ Notes

routing metrics

how routers write tables: hop count – how many network stops aka how many routers [view]

By: jordanw | Related Lesson: Routing Metrics | Modified: January 20, 2020

routing tables

static or dynamic routing paths to network addresses [view]

By: jordanw | Related Lesson: Routers | Modified: January 20, 2020

OSI models

osi models consist of 7 different layers. [view]

By: munawardossul | Related Lesson: OSI and TCP/IP Models Overview | Modified: November 2, 2019

Layers

Physical Layer: wires Data link layer: MAC address Network layer: Transport layer: Session layer: Application layer: programs and apps [view]

By: mrch1 | Related Lesson: OSI and TCP/IP Models Overview | Modified: September 30, 2019

layer 2

isnqhwre the bits electricity voltage is turned into actual packets of data mac addresses are layer 2 [view]

By: Carl Bell | Related Lesson: OSI Model Layer 2 Data Link | Modified: September 19, 2019

layer 1

layer 1 is bits and components like cables pins in the cables the electricity nic or network interface cards anything we can hold or we can measure is classed as physical [view]

By: Carl Bell | Related Lesson: OSI Model Layer 1 Physical | Modified: September 19, 2019

osi model

7 layers please do not throw sausage pizza awat [view]

By: Carl Bell | Related Lesson: OSI and TCP/IP Models Overview | Modified: September 19, 2019

Underwater Divers

A lengthy explanation, but from welding how can I push you into a safer non expanded role. JJ [view]

By: johnbsasser | Related Lesson: Subnetting (part 2) | Modified: September 3, 2019

Net+ course

Desc [view]


Thanks

Thanks [view]

By: dbl390 | Related Lesson: OSI Model Layer 7 Application | Modified: August 18, 2019

1 2 3 11 101 3197 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel