Ogis Uml University A place to learn about Technological Certifications







I-Net+ Exam Notes

I-Net+ Certification awarded by CompTIA organization is a widely recognized certification in the area of Internetwoking technologies. To attain I-Net+ certification, one need to score at least 73%, and there will be around 72 questions. The duration of the exam is 90 minutes. These exams basically test the Knowledge of Networking Technology and Knowledge of Networking Practices. The exam consists of 65 questions and a maximum allowable time of 90 minutes. For further details, you can visit the official website here. Once you pass I-Net+, a reasonable familiarity is expected in the areas of Internet Basics, Internet Clients, Web development, Networking, Security, and business concepts. Some areas, such as TCP/IP model, Address resolution, and networking protocols, and other important basic concepts are covered in both network+ and I-Net+.


- DSL stands for Digital Subscriber Line

- DHCP stands for Dynamic Host Configuration Protocol

- PPP stands for Point to point protocol

- HTTP stands for Hyper Text Transfer Protocol

- WWW stands for World Wide Web

- HTML stands for Hyper Text Markup Language

- PPTP stands for Point to Point Tunneling Protocol

- L2F stands for Layer 2 Forwarding

- L2TP stands for Layer 2 Tunneling Protocol

- MIME stands for Multipurpose Internet Mail Extensions.

- CA stands for Certificate Authority.

- DLL stands for Dynamic Link Labrary

- ODBC stands for Open Data Base Connectivity.

- VRML stands for Virtual Reality Modeling Language

- PEG stands for Joint Photographic Expers Group.

- PNG stands for portable Network Graphics

- TIFF stands for Tag image File Format

- MPEG stands for Moving Pictures Experts Group

- PDF stands for Portable Document Format.

- AVI stands for Audio Video Interleaved.

- PKI stands for Public Key infrastructure.

1. Internetwork IP addressing:

IP addresses are written using decimal numbers separated by decimal points. This is called dotted decimal notation of expressing IP addresses.

The different classes of IP addresses is as below:
Class Format Leading Bit pattern Network address Range Maximum networks Maximum hosts/ nodes
A N.H.H.H 0 0-126 127 16,777,214
B N.N.H.H 10 128-191 16,384 65,534
C N.N.N.H 110 192-223 2,097,152 254

N: Network address part

H: Host address part

- Network address of all zeros means "This network or segment".

- Network address of all 1s means " all networks", same as hexadecimal of all Fs.

- Network number 127 is reserved for loop-back tests.

- Host (Node) address of all zeros mean "This Host (Node)".

- Host (Node) address of all 1s mean "all Hosts (Nodes) " on the specified network.

- The range of numbers from to is used for multicast packets. This is known as Class D address range.

- The default subnet mask for

o Class A network:

o Class B network:

o Class C network:

2. TCP/IP protocol suite was initially developed based on Unix operating system and it is native to Unix. TCP/IP protocol suite was added to other operating systems like Windows later.

3. ATM:

- ATM, Asynchronous Transfer Mode, uses 53 byte cells for all transmissions All cells are 53 byte long and consist of a 5 byte header and 48 bytes of data.

4. T1,T2, and T3 connections:

- The speeds of the Tx connections are as given below:

o T1: 1.544 MBPS consisting of 24 channels of 64 kBPS

o T2: 6.312 MBPS consisting of 96 channels of 64 kBPS

o T3: 43 MBPS consisting of 672 channels of 64 KBPS

5. DSL:

- DSL uses existing copper phone lines. The access speeds can be up to 9 MBPS. but has distance limitations and available in only certain exchange areas.

- There are several categories of DSL:

o Asymmetric DSL (ADSL): Here data flow is asymmetric. Data flow in one direction is different from that in the other direction.

o Symmetric DSL (SDSL): Here the data flow is symmetric, that the data flows equally in both directions.

o Other not so much used or known types of DSL are BDSL, HDSL, and VDSL.

6. The range of numbers from to is used for multicast packets. This is known as Class D address range.

7. Telnet, FTP, and TFTP:

- TCP/IP is the protocol used when you are Telnetting to a remote host. Telnet is used for terminal emulation that runs programs remotely.

- FTP is used to transfer files. FTP is a connection-oriented protocol. It uses TCP/IP for file transfer.

- TFTP (Trivial File Transfer Protocol) uses UDP. TFTP is a connectionless protocol.

8. A valid IP address on a host / node can't start with 127; 127.X.X.X is reserved for local loop back. A valid IP address can't be larger than 255 (in any octet), The maximum allowed value is 255 in any or combination of octets. For example, is an invalid IP, since one octet exceeded the value 255. An example of valid IP is

9. Tracert, Ping use ICMP as their base protocol. ICMP messages are carried in IP data grams.

10. SMTP is used to upload mail to the mail server. POP3 is used for downloading mail from a mail server to a client machine running POP3 client.

11. A firewall is a security mechanism, which prevents unauthorized access to a network or a resource on a network.

12. Important port numbers:

The port numbers used by different programs are as below:

- FTP: Port #21

- Telnet: Port #23

- SMTP: Port #25

- SNMP: Port #161

- WWW: port 80,

- NNTP: port 119,

- POP: port 110.

It is also important to know that FTP, Telnet, SMTP use TCP; whereas TFTP, SNMP use UDP.

13. Repeaters, Bridges, and Routers:

- Repeaters work at Physical layer (Layer 1),

- Bridges and simple switches work at Data Link Layer (Layer 2),

- Routers work at Network Layer (Layer 3) of ISO Reference Model.

14. Gateway is used to translate protocols, as it works at application layer.

15. Telnet requires an username and password to access.

16. ISDN:

- ISDN specifies two standard access methods:

- BRI (Basic Rate Interface):

o Consists of two B channels (64Kbps) and one D channel (16Kbps).

o The B channels can be used for digitized speech transmission or for relatively high-speed data transport.

o The D channel carries signaling information (call setup) to control calls on B channels.

- PRI (Primary Rate Interface):

o Consists of 23 B channels and one D channel with a bandwidth of 1.544Mbps.

o PRI uses a DSU/CSU for a T1 connection. B stands for Bearer Channel.

17. TCP/IP port assignments used in the Internet: Originating source port numbers are dynamically assigned by source host, and usually greater than 1023. The following are the recommended port numbers:

- Numbers 0 - 255 are used for public applications

- Numbers 255 - 1023 are assigned to companies so that they can use these port numbers in their applications.

- Numbers above 1023 are used by upper layers to set up sessions with other hosts and by TCP to use as source and destination addresses.

18. Some of the important commands useful in trouble shooting TCP/IP networks:

I. Ipconfig: Displays TCP/IP configuration values, including IP address, subnet mask, and default gateway.

II. Ping: This command can be used to verify whether the target ip address or host name is present. You need to specify the target IP address or host name.

III. Route: Displays and manipulates route information.

IV. Tracert: Determines the route packets take to reach the specified destination.

19. HTTP is the protocol used for accessing the World Wide Web services. HTTP operates over TCP/IP. TCP/IP is the protocol, which is used by all internet applications such as WWW, FTP, Telnet etc. IPX/SPX is proprietary protocol stack of Novell NetWare.

20. TCP is a full-duplex, connection-oriented protocol. It incorporates error checking as well. UDP (User Data gram Protocol): UDP is a thin protocol. UDP is a connectionless protocol. It doesn't contact the destination before sending the packet and doesn't care whether the packet is reached at the destination. UDP uses port number 6.

ęCopyright 2024  Ogis-Uml-University.com All rights reserved.
Unauthorized duplication in part or whole strictly prohibited by international copyright law.