Please enable JavaScript.
Coggle requires JavaScript to display documents.
A+ (Peripherals, Networking, Hardware, Virtualization, Tools,…
A+
Peripherals
-
-
-
-
Thunder and Lightning
Thunderbolt
PCIe X Displayport. Pretty much good for anything. Three versions. Thunderbolt 1 10Gbps over 2 channels. Thunderbolt 2 20Gbps over 1 channel and Thunderbolt 3 which is the same but at 40Gbps
Lightning
Proprietary to Apple. Thunderbolt for IOS. Essentially lightning is like USB-C for Apple IOS with Thunderbolt being the MAC equivalent.
-
Keyboards and Mice
-
Can use a KVM switch to use one keyboard and mouse on multiple computers by just switching the KVM switch.
Sight and Sound
2.1 Speaker system, 2 tweeters and a subwoofer, Uses a 3.5mm jack.
-
-
-
-
-
-
Networking
LAN
-
-
-
-
-
-
-
Dynamic Addressing
Devices will make IP requests which target a DHCP server if there is one in scope. The DHCP server will dynamically allocate an address from a pool of addresses that it controls.
If a DHCP server is not present each device has APIPA which is a default protocol for obtaining an IP address in the absence of a DHCP server. APIPA always give 169.254.X.X address, which is a Class B address.
-
-
Port numbers
-
DNS utilizes port numbers tacced onto the end of the IP address so that the application can be found.
Port numbers go from 0-65535. There will always be a source and destination port as well as IP address.
-
All port numbers from 0-1023 are well-known ports. e.g. web, secure web.
1024-49151 are registered ports. These are for other companies that aren't well known but have their own ports.
49152-65535 are ephemeral ports. These are free ports used by the operating system for return ports in traffic.
-
DNS (Domain Name System)
-
-
If DNS server doesn't have a domain name, it will ping its closest root server which will direct the request down through the hierarchy to find the server for the Domain name that is requested.
If a Domain is found and used frequently the DNS server and localhost will both keep a copy of the IP conversion.
-
Working with DNS
DNS servers can fail. This is why alternate servers are useful, this can be configured statically.
-
DNS stores record. A regular record such as www. is an A record. MX is for mail servers and Cname records are for ip addresses with multiple names.
-
TCP,UDP and ICMP
TCP is a connection oriented protocol. Using handshakes for security / good for data transfer that doesn't require speed.
UDP is a connectionless protocol, good for streaming and speed but there is no handshake or verification.
-
These protocols can be separated using a PDU. An Ethernet frame is analysed from the outside. the IP packet is the overall frame without the IP addresses and FCS. Once inside a system we have port numbers and data left, This is called a TCP segment or a UDP datagram.
-
Routers
-
-
Every router has a default gateway to the internet. In home this is usually the interface out to the ISP.
Home routers these days are usually a router, a switch and a WAP all in the one box. Up stream connections in these cases use DOCSIS.
Rollover cable is common for first setup on enterprise routers and web interfaces are the case for most modern home routers.
Config
Basic
-
You can set the internal LAN IP for the router to be something different. This is for obfuscation mostly. Assuming everything is dynamic DHCP will handle the rest.
Admin for usernames and passwords as well as local management. Can set a filter so that only a single PC can edit the router settings. Can also enable remote management from outside the LAN. DO NOT TURN ON REMOTE MANAGEMENT.
Advanced
QoS
Can give certain IP or MAC addresses as well as ports extra bandwidth. Can also setup router so that extra bandwidth is given if a specific application is running.
-
-
-
-
-
VLAN
-
Must give a switch an IP for VLAN management (Managed Switch). Normally more expensive but has VLAN support
-
Troubleshooting
No connectivity
Look at physical connections and make sure everything is connected. If it is its probably an IP addressing issue, especially if there are static addressing schemes on some devices.
-
Limited connectivity
DHCP screamer, often related to APIPA addresses. If addresses are not APIPA but the IPs are different eg 192.168.4.X to 192.168.7.X this often means there's a rouge DHCP server.
Unavailable resources
If you can get to the system, shared resources problem. if cant system issue.
-
Hexadecimal
All binary values in a computer are divisible by 4. As a result memory can be represented using base 16 values.
16 values, 0-9 and then A-F
-
Cables and connectors
-
-
Coaxial cable. Uses RG ratings (RG-58, RG-59 and RG-6)
-
-
Often these use twisted pair cabling (UTP [Unshielded twisted pairs], run about 100m) (STP [Shielded twisted pair], runs about the same but better)
-
Telephone was the beginning of the RJ connectors using RJ-11, Ethernet now uses RJ-45
-
-
Crimping
Take cable and specific crimp. Cut the cable to length and remove about an inch of jacket on end that needs crimping.
-
-
-
-
Wireless
Hardware
-
-
Infrastructure mode of 802.11 is the most common. WAP is the cornerstone of infrastructure mode. a WAP also needs a WNC / NIC (Wireless network card).
Laptop NIC is located in the monitor. Every mobile device has a NIC which is built into the case in modern mobile devices.
-
Rarer mode (Ad hoc mode)
No WAP just NICs that setup a specific NIC as a WAP for other devices to use. Hot spotting is an example of this.
Antennas
-
Highly directional
Propagation looks like a stretched American football. Great for long distance signals in a specific direction.
-
-
Standards
Original 802.11 was 1Mbps, not seen though
-
-
802.11 based on ISM bands (Industrial, scientific and medical bands). Uses the 2.4 and 5Ghz bands. These bands need to be used to avoid interference. 2.4 runs from 2.412 to 2.484Ghz.
Channels were created for each. the 2.4Ghz band has 14 different channels. 14 for Japan. In Europe there is 13 and In the US there's 11.
5Ghz runs from 5.150 to 5.875Ghz, many more channels. A lot of these channel numbers are skipped. It goes from 36-64, then from 100-144 and lastly from 149 to 165.
802.11g
54Mbps and ran on 2.4Ghz, as a result is backward compatible with 802.11b
802.11n (Wifi 4)
100Mbps and ran on both 2.4 and 5Ghz, meaning backward compatible with everything. Introduced MIMO
MIMO (multiple in / multiple out) allows a single WAP to use multiple antennas to change radiation signals to zero in on devices that don't move.
802.11ac (Wifi 5)
Very fast and backward compatible. Introduced multi-user MIMO. Also 802.11ac has a 2.4Ghz radio in there purely for backward compatibility.
WAP
SOHO routers work straight away, this is bad for security.
-
-
-
-
-
Connecting
-
-
Connecting to a network creates a profile on the device. You can see these in network settings by clicking manage known networks.
-
On many devices the NIC is configured as a DHCP client. This means for an incorrect password you may obtain an APIPA address.
-
-
-
Troublshooting
-
No connectivity
-
Could also have a low RF signal, Get closer to the box or antennas to make sure they are working properly.
Could also mean someone turned off the SSID broadcast. To get onto an SSID without broadcast, you need to know the SSID, the security and encryption standards and password. From there you need to make a manual SSID profile.
Limited connectivity
Means slow transfer speeds, often times signifies an interference on the network.
-
-
Internet
-
-
-
-
-
Tiers
A number of large providers that together span an entire landmass work together to provide coverage. To do this they need peering agreements to share information. This is done at scattered centres across the landmass known as NOCs (Network Operation Centres) These are known as tier 1 internet services.
Tier 2
Entities that aren't quite as big but have decent coverage. Tier 2s don't have peering agreements and they have to pay for their internet. Only for basic internet coverage. Everything else is peered.
Tier 3
Tier 3 are the ISPs, they aren't interconnected and they sell their services to customers.
Dial Up
Term for both POTS (Plain Old Telephone Service) and PSTN (Public Switched Telephone Network). Old school telephone connections. Provides a solution for taking analogue voice and sending digital data.
Dial up Modem has RJ-11 connectors and a DB-25 serial connector. You can plug this into the back of a computer and this establishes a Comport.
Dial up needs a phone number to make a connection. You can connect to the internet using a dial up modem on windows even now.
-
ISDN (Integrated Service Digital) Is a dial up connection, this was a completely digital line that ran at 64 or 128Kbps. Faster than original dial up and entirely digital.
-
Broadband
DSL (Digital Subscriber Line). Earlier version of broadband, piggy backed off phone lines. Came in ADSL (Asymmetric DSL) and SDLS (Symmetric DSL). Upload went from 768Kbps to 3Mbps and Download from 1.5 to 7+Mbps
DSL uses PPoE (Point to Point Protocol over Ethernet). Can put multiple users on a single internet connection.
Cable, incoming F-Type connection for internet. Uses DOCSIS (Data Over Cable Service Interface Specification)
Cable speeds are upload/download between 1.5/10Mbps in the old days but today its 50/100Mbps or better.
-
-
Firewalls and Servers
All servers have firewalls, often time they can use stateful firewalls that monitor for bad behaviour.
-
E-mail
-
Email protocols, SMTP (Simple Mail Transfer Protocol)-port 25, POP (Post Office Protocol)-port 110, IMAP (Internet Message Access Protocol)-Port 143
Either POP3 or IMAP are used with SMTP not both. POP3 operates by taking your email down to the email client, setting up folders on the client itself. IMAP copies all folders onto the client.
-
Most mail these days are secured mail on ports like 587. the SMTP ports 25 etc are almost never used.
Proxys
Essentially these are intermediary servers that a packet must travel to before going through to the internet.
-
-
VPN
A VPN Client will make a direct connection between itself and the WAN side router on the local network.
VPN routers have different protocols such as PPTP, IPsec and L2TP
-
-
IOT (Internet of things)
Internet connected devices that aren't commonplace. Lightbulbs etc. 802.11 is the common way to talk to IOT devices ZigBee can also be used.
-
-
Hardware
The visible computer
-
-
-
-
-
Inside the PC
-
-
-
-
-
-
-
-
What do these all mean?
A computer is essentially a very complex math machine (Turing machine) That uses stored data to implement and execute programs to display obtain and communicate information.
On boot a program (Often OS) is loaded from SSD to RAM to run / Also stored from RAM to SSD when closed
A computer is made up primarily of a CPU, RAM and Storage as well as an OS.
Computers are not only desktops, but laptops, Webcams, raspberry pi, Routers and even dishwashers.
CPU
-
-
-
Instructions
Using the machine language we can specify instructions in the following order. Define binary ordering for all registers, press the clock, wait until CPU is complete and repeat these steps.
The binary ordering is presented on the external data bus for both calculation and presentation of programs.
Comprises in modern CPUs of 4 "men" known as the prefetch, Math, Number and Cache guy. Doing it this way is a great way to utilize pipelining, each pipeline is a segment of a single core inside a potentially multicore CPU. Each of the "men" in this case can be considered a bus or register.
-
Multi core CPUs
Hyper-Threading
Essentially each "man" in the pipeline handles multiple different tasks, eg. A smart pipeline which ends up looking more like multiple pipelines in a single core. Hyper threading is a single pipeline that can handle 2 programs at the one time.
A CPU has multiple pipelines, each pipeline being a single core.
-
Caching
-
-
-
-
Set association.
A number of blocks in cache memory are divided into sets. Instructions in the main memory are broken into addresses with a block offset, set number and tag. These are used to associate instructions in main memory with a set, reducing the number of comparisons per cache search.
Sockets
-
Different CPUs commonly has a different microarchitecture. Even if they have a similar or identical form factor.
Each CPU producer will often pick a specific microarchitecture and give it a family name eg. Kaby Lake for intel. It will then make as broad range of CPUs with different capabilities all utilizing the same microarchitecture.
-
-
Intel vs AMD
AMD has an AM4 (Mainstream) Socket which is a PGA, and the TR4 (High end) which is also a PGA
-
RAM
-
DDR
DDR2
-
Clock speed of system crystal is multiplied by 4 for the DDR2 speed rating rating, and once again the PC rating is then found by multiplying that by 8. for DDR2 the PC rating is PC2.
DDR3
Also uses the 240 pin connector with the notch offset as compared to DDR2. DDR3 speed is computed by multiplying system crystal speed by 2^3 or 8. PC3 is found by multiplying that by 8.
DDR4
288 pin stick with another large offset for the notch. Very fast compared to the others. Uses DDR4 speed rating and PC4, both multiply the same as the DDR3 by 8.
Capacity
Based on a square. Memory sizes are based on a times 4 multiplier. But if using a double sided stick the size of the stick is only doubled.
Channels
Motherboards usually have between 2 and 4 slots. But for large server systems this can go up to 16. Extra slots are useful because we can have sticks with smaller form factors adding up to a higher total memory count.
If the mother board supports dual channel, we can use both sticks at once in parallel. Most modern motherboards use dual channel. These are necessary for using the motherboards full capacity.
A single channel needs two identical RAM sticks, each channel can contain different types of RAM often different sizes, but commonly not different speeds or types.
Features
Parity / ECC
RAM commonly has 8 chips per stick that relate to a bit each, often however RAM will be error correcting which will result in an extra chip that handles what's known as a parity bit. A demonstration of why these are useful can be found when researching Hamming codes.
Parity is memory that supports an error in at most 1 message bit. ECC can support at most two error bits in the message portion. Parity is outdated and ECC is now most often used. However very expensive and must be supported by motherboard which is not so common.
-
-
Firmware
-
-
-
CMOS
-
In newer systems there are Single Flash ROM chips. You can flash (reprogram) this chip to upgrade built in BIOS using this chip.
To keep time on each system there used to be an RTC (Real time clock) chip, this is not a chip anymore but still exists to synchronize the times on all devices.
-
-
UEFI BIOS
-
Often user and admin passwords can be set in the UEFI BIOS to prevent unauthorized users from even booting the OS.
-
-
Enables changes to CPU speed RAM timings, Passwords, boot options, etc.
-
Motherboards
-
Chipsets
-
-
A chipset defines what specs a system needs and what is compatible with it. RAM capacity, USB capabilities, etc.
Contents
-
-
-
-
Expansion slots
PCIe
-
Essentially single lane serial data transfer port. Sophisticated in modern motherboards, and is used for speed. Parallel vs Serial discovery led to this technology.
-
-
-
-
-
-
-
Power Supplies
-
20 pin connector that can provide 12 (Yellow cable), 5 (Red cable) and 3.3 (Orange cable) volts.
ATX12V standards allow more electricity to the motherboard. It means ATX 12 Volt. Usually an extension cable.
Connectors
-
Mini-connector (Provides power to older hardware like floppy drives but sometimes can be found in modern systems.
-
-
Modular power supplies
-
Much more convenient, but can potentially lose wattage efficiency. compared to soldered PSUs
-
80 plus rating. It is a rating of efficiency, it is a guarantee of a percentage of wattage rating in all conditions.
-
Troubleshooting
Ways they die
Fast
Smoke / Burning smell, fried system. No recovery.
-
Core components
Troubleshooting
If you can get BIOS it means CPU, RAM and GPU are working properly. CPU fault is most sinister boot issue.
-
-
-
-
Loud noises are often cables stuck in fans, not a whole heap of moving parts internally. Potentially in the power supply but not as often. This will most likely be a blown capacitor.
If RAM problems arise, you can use active recovery or firmware to do recon on the issue.
Virtualization
-
Emulation is the process of faking certain hardware to virtualize a machine that needs different hardware.
-
Making a VM
Can set Disk image types based on needs. They are also dynamically allocated by default, this is good considering each individual machine may be smaller or larger depending.
Advanced
VirtualBox comes with extensions packs. These extension packs allow for features such as dynamic resizing etc.
-
Cloud computing
-
In the old days IaaS was the main way of creating web products. These days PaaS and SaaS are more common thanks to the cloud.
-
Cloud Based Applications
Storage and Synchronization, these are things like Google drive, drop box, etc.
-
-
-
-
-
-
-
Hardware
Mass Storage
-
Magnetic media
-
-
Made up of platters that have data stored in them, a little arm reads and writes to the platter.
-
-
Capacity
-
-
-
-
-
-
You can also do the same thing but for base 2 numbers which relates to binary combinations, or number of possible instructions.
-
-
-
-
-
-
1.8 inch mass storage, not common because SSD systems adopted m.2 format storage instead.
-
Boot Order
-
Essentially you set the order of each motherboard SATA connection in the system setup and it will go down the list looking for the first OS it can find.
-
-
Troubleshooting
-
-
-
RAID
Not found
Never been installed, check that RAID controller is active and drivers are setup properly. Is everything as it should be in the system setup.
-
Read/Write failures
Common in HDD. Each HDD has a lifespan and at the end of this read/write failures are common. use S.M.A.R.T technologies to troubleshoot.
-
-
-
-
-
-
Monitors
A pixel is 3 LCDs (Liquid Colour Display) with a number of small RGB film put over it. When electricity is given to it light passes otherwise it is opaque.
-
Panels
-
-
-
OLED (Organic LED), used for thin monitors and flexible monitors.
DLP (Digital Light Processing), tiny mirrors setup in a grid to define a resolution. An RGB wheel spins and reflects colours off of mirrors to reflect coloured light.
-
-
-
-
-
Troubleshooting
-
-
Artifacts
Pictures that were on the screen but shouldn't be anymore. Often a video RAM issue, keep and extra card around for testing. No replacement for this.
-
DIM image
Check brightness, check cables
-
-
Burn In / Persistence
On old technology burn in would happen which is a constant fixed image on the screen. Usually fixed by replacement of panels.
Portable Devices
Laptops
-
Function keys on laptops maintain all peripheral features like aeroplane/eco mode and toggling of I/O.
Laptops have bluetooth and wifi, some laptops can use a proprietary docking station for home use. Also port replicators can extend functionality.
Hardware
-
-
-
-
Display
Laptop monitors are usually sealed systems. The best practice is just to replace the whole monitor when there's a monitor issue.
Often has wireless antenna, multifunction connector, camera cable and a touchscreen connector all connected to the controller.
Mobile
A mobile device is a sealed single unit, that runs specific mobile OS such as Android and IOS. Also many embedded mobile system OSs. They have bluetooth, cellular, wifi etc.
Usually have GPS, Accelerometer, Camera
Types of mobile devices include Smartphones, Tablets, wearables , e-readers, GPS device, other connected readers, Micro/mini SD cards for mobile devices
Connections
Mini-USB, not so common these days.
-
-
-
-
-
OS
-
IOS
-
-
-
IOS has permissions for apps same as android. Spotlight search is the only real customizable windows in the phone.
-
VR
Contains Controllers, sensors and headset. Its not the same as AR which is more akin to IG filters etc.
Care
-
E-mail
Incoming protocol can either be POP3 or IMAP, outgoing is SMTP
-
Need username, password and port number
Will need to know FQDN for incoming protocol server, as well as username and password and incoming port number.
Back in 2010 they came up with encrypted versions of POP3 (port 995), IMAP (port 993) and SMTP (port 465 or 587)
SSL and STARTTLS need encrypted ports 90 percent of the time. Old ports are not safe but if the new ports are used you get P2PE (Point to Point encryption)
-
Synchronization
-
-
-
Bookmarks, browser synchronization
-
-
Can sync social media data. Either count on the applications to handle the synchronization. Hootsuite is an external application that propagates social media data
Avoiding threats
Securing a host
Patch the system, this includes not only the OS but servers and applications.
-
-
Securing the network
-
-
Endpoint management
A single device in the network monitoring Firewalls, malware, etc.
UTM (Unified Threat Management) is a simple device that combines all network security services in one. These can even be cloud based