01 - Flash Cards
OSI Model
- The Open Systems Interconnection (OSI) model is a suggested standard for communication.
Seven OSI Layers
- Layer 7: The application layer
- Layer 6: The presentation layer
- Layer 5: The session layer
- Layer 4: The transport layer
- Layer 3: The network layer
- Layer 2: The data-link layer
- Layer 1: The physical layer
“All people seem to need data processing.”
Encapsulation
- Adding header and footer to data as it goes through one OSI layer to the next. Therefore, data is encapsulated at each layer as it moves from application to physical layer.
Deencapsulation
- This is a process in OSI when an incoming transmission received by the destination computer is unpacked as it moves up the protocol stack from physical layer to application.
Physical Layer (Layer 1)
- Layer that conveys the bits across the network over a physical connection medium, either by electricity or by mechanical or radio waves.
Data Link Layer (Layer 2)
- This layer formats packets from the physical layer into physical frames for transmission.
Network Layer (Layer 3)
- This layer is in charge of assigning address information to the data as well as routing.
Transport Layer (Layer 4)
- This layer manages integrity of a connection. It essentially controls packetization of data and delivery of the packets, including checking for errors in the data.
Session Layer (Layer 5)
- This layer establishes, maintains and ends communication sessions among two computers.
Simplex
- One way communication
Half-Duplex
- Two way communication (only one direction can be sending information at a given time)
Full Duplex
- Two way communication (information can be sent in both ways at the same time)
Presentation Layer (Layer 6)
- This layer converts incoming and outgoing information from one format to another – for example, from clear text to encrypted text and vice versa.
Application Layer (Layer 7)
- This layer is the layer at which user application, networks services and operating systems are combined with the protocol stack so that applications can communicate with the protocol stack.
List Two Categories of Routing Protocol
- Distance vector routing
- Link state routing
TCP/IP Model
- It is communications protocols used in computer networks. It is founded on Transmission Control Protocol and the
Internet Protocol - TCP/IP Layers
- Application
- Transport
- Internet
- Link
TCP/IP Protocol
- Consists of a great number of individual protocols rather than a sole protocol.
Transport Layer Protocols
- Transmission Control Protocol (TCP)
- User Data Protocol (UDP)
Transmission Control Protocol (TCP)
- Full duplex protocol
- User Data Protocol (UDP)
- Simplex
IANA Port Number Recommendations
- Ports 49152 to 655535 to be used as dynamic/private ports.
IP Classes
First binary digit Decimal range
Class A 0 1-126
Class B 10 128-191
Class C 110 192-223
Class D 1110 224-239
Class E 1111 240-255
What is a Loopback Address?
- Class A network 127
ICMP
- Internet Control Measure Protocol Used for establishing health of a link or a network.
Common ICMP Type Field Values
- 0 Echo reply
- 3 Destination unreachable
- 5 Redirect
- 8 Echo request
- 9 Router advertisement
- 10 Router solicitation
- 11 Time exceeded
IGMP
- Internet Group Management Protocol allows systems to achieve dynamic multicasting.
ARP
- Address Resolution Protocol
TCP/IP Vulnerabilities
- Buffer overflows, DoS attacks, fragment attack, hijack attacks and passive attacks via monitoring or sniffing.
Domain Name System
- It is hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet.
DNS Poisoning
- It is an attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from real servers and towards fake ones.
Domain Hijacking
- Malicious action of changing a registration of a domain registration without authorization.
Converged Protocols
- Protocols combining specialty or proprietary protocols with standard protocols.
Fibre Channel
- High-speed networking technology primarily used for transmitting data among data centers, computer servers, switches and storage at data rates of up to 128 Gbps.
MPLS
- Multiprotocol Label Switching (MPLS) is a routing technique in telecommunications networks that directs data from one node to the next based on short path labels thus reducing complexity of the process and increasing speed of traffic.
Small Computer System Interface
- Networking storage standard based on IP.
Voice Over IP
- It is technology that allows for to making of voice calls using a broadband Internet connection instead of a regular phone line.
Software Define Networking
- It is approach to cloud computing that aims to make networks flexible and improve network configuration in order to ameliorate performance and network monitoring.
Content Distribution Networks
- Group of network resources access the internet that improve availability and lower the latency of the hosted content.
Securing Wireless Access Points
- For each wireless access point it is essential to ensure its security. i802.11 is the IEEE standard for wireless network communications.
Wireless Channels
- WiFi channel is the medium of a certain frequency through which our wireless networks can send and receive data.
What Does SSID Stand For?
- It is the 32 alphanumeric character service set identifier (SSID) that is a case sensitive.
Beacon Frame
- It is a management frame in IEEE 802.11 based WLANs that contains all the information about the network and it is transmitted periodically.
Site Survey
- Site Survey softwares use signal strength data gathered by your computer’s wireless card to map the signal strength of every access point.
WEP
- Wired Equivalent Privacy is a security algorithm for IEEE 802.11 wireless networks designed to provide data confidentiality.
WPA
- Wi-Fi Protected Access (WPA) is a security standard for users of computing devices equipped with wireless internet connections.
WPA2
- Type of encryption used to secure the vast majority of Wi-Fi networks by providing unique encryption keys for each wireless client.
802.1X/EAP
- Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections
PEAP
- Protected Extensible Authentication Protocol is an authentication protocol used in wireless networks and Point-to-Point connections.
- It is designed to provide more secure authentication for 802.11 WLANs