1.0 Explaining Network Topologies Flashcards

1
Q

Full-duplex

A

Bidirectional, simultaneous transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Duplex

A

Bidirectional data flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Half Duplex

A

Bidirectional, non-simultaneous transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

VPN (Virtual Private Network):

A

A VPN creates a secure, encrypted connection over a public network, allowing remote access to a private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VLAN (Virtual Local Area Network):

A

VLANs are like creating separate virtual networks on the same physical network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Host

A

Any Device on a network that can send or receive data(e.g., computers, servers, routers).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Datagram

A

A datagram is a self-contained, independent packet of data sent over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Client

A

A device or software that request services from a server(e.g., a web browser accessing a website).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OSI Model

A

A 7-layer framework for network communication:
1. Physical – Transmits raw data.
2. Data Link – MAC addresses, frames.
3. Network – IP addressing, routing.
4. Transport – Reliable delivery (TCP/UDP).
5. Session – Manages connections.
6. Presentation – Formats, encrypts data.
7. Application – User-facing protocols (HTTP, FTP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Physical Layer (L1)

A

Transfers raw bits over a medium.

-Cables,fiber optics, radio waves.
- Devices: Hubs, repeaters, network adapters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Link Layer (L2)

A

Frames data, manages MAC addresses, and detects errors in Ethernet, Wi-Fi, VLANs, and ARP using switches, NICs, and bridges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network Layer (3)

A

Routes packets using IP addresses.

  • IP, ICMP, subnets, routing tables
  • Devices: Routers, layer 3 switches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Transport Layer (L4)

A

Reliable, ordered data delivery between applications using port numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Session Layer(L5)

A

Manages the establishment, maintenance, and termination of communication between devices. (Function)

*Authentication, API sessions, handshakes.(Process/ Example)
* Devices : Proxies, session managers (Device/Software)

Function: What the Session Layer does.
• Processes/Examples: How it does it (specific mechanisms).
• Devices/Software: What performs these functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Presentation Layer (6)

A

Formats, encrypts, and compresses data.

*SSL/TLS, ASCII, Unicode, MIME.
* Devices: Codecs, encryption appliances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encapsulation (Packing Data)

A

Encapsulation is the process of adding headers to data as it moves through network layers. Each layer wraps the data with extra information needed for delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Application Layer(L7)

A

Interfaces with user applications and services.

  • HTTP, FTP, SMTP, IMAP
  • Devices: Web servers, email clients, browsers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Protocol Data Unit (PDU)

A

A chunk of data that is formatted and processed at each layer of the OSI model as it moves through the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Decapsulation (Unpacking Data)

A

Decapsulation is like unwrapping layers of packaging to get to the actual message (the data).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Adjacent Layer Interaction

A

Adjacent layer interaction is when each network layer passes information directly up or down to the layer next to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cabled

A

: Physical connections between nodes, like copper or fiber optic cables. Also called bounded media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Wireless

A

Communication without wires, using radio waves in the air.” (Specifically mentions radio waves and air as the medium)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Node:

A

A device (e.g., computer, router) connected to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Physical Topology

A

The layout of network connections, often divided into segments for better performance and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Physical Interface:

A

The design of network connections, like cables, connectors, and antennas.

26
Q

Signaling

A

The method of sending data via electrical, light, or radio signals.

27
Q

Tranceiver

A

Sends and receives signals over the network.

28
Q

Repeater

A

Boosts a signal to extend its range.

29
Q

Hub

A

A device that connects multiple nodes, working like a central hub.

30
Q

Repeater

A

Boosts a signal to extend its range.

31
Q

Data Link

A

The layer responsible for transferring data between nodes over a physical connection. It handles error checking and data formatting.

32
Q

Media Converter:

A

Changes one type of network signal to another.

33
Q
A

Network Adapter (NIC): A device that connects a computer to the network so it can send and receive data.

34
Q

Bridge

A

A device that connects two parts of a network to reduce traffic and improve performance.

35
Q

Frame

A

A piece of data that is sent between devices over a network. This is at the data link level.

36
Q

Switch

A

A device with many ports that connects multiple devices on a network more efficiently.

37
Q

Wireless Access Point (AP)

A

A device that allows wireless devices to connect to a wired network.

38
Q

Name 4 devices that operate at the data link level.

A

1)Network adapter
2) Bridge
3) Switch
4) Wireless Access Point(AP)

39
Q

Heterogeneous

A

Heterogeneneous means the networks are made up of a mix of different technologies, not all the same.

40
Q

What is the main device or appliance working at level 3?

A

A router is the main appliance working at level 3 which is a networking device.

41
Q

Firewall (Layer 3):

A

A device that acts like a security gate, blocking or allowing data to pass between networks based on rules.

42
Q

Access Control List (ACL)

A

A list of rules that tells the firewall which types of data (based on address or type) are allowed or blocked.

44
Q

Internet work

A

A group of connected networks that allows communication between them.

45
Q

What are some devices at the transport level(L4).

A

Devices at the Transport layer include multilayer switches that help balance traffic across servers and security devices like advanced firewalls and intrusion detection systems (IDS) that protect against attacks.

Think of Level 4 as the TRAFFIC CONTROLLER!

46
Q

LAN

A

A network in a single location is often described as a local area network (LAN). LAM+

47
Q

A Small Office/Home Office (SOHO) network

A

A LAN for a small number of users, typically using a single wireless router for routing, switching, Wi-Fi, and firewall functions, providing both local and Internet connectivity.”

49
Q

ARP Table

A

A temporary list stored in memory that maps IP addresses to MAC addresses, helping ARP find devices on a network. Entries are removed after a while to stay accurate.

50
Q

Proxy

A

A proxy is a network node acting as an intermediary.

51
Q

Intermediary Node

A

Forwards data between nodes, not the source/destination. Receives, processes, retransmits.

Examples:

Router (Internet)
Satellite (Space Comm.)
Mesh Node (Bluetooth)

52
Q

Trouble Shooting Methodology

A

Structured approach to problem-solving using identification, theory of cause, testing, planning, implementation, verification, and documentation steps.

53
Q

What is the Question the Obvious Trouble Shooting Approach?

A

A quick method that steps through what should happen, identifying failures or errors (e.g., checking if a network cable is plugged in). Best for spotting simple oversights early in troubleshooting.

54
Q

What is the “Methodically Prove Functionality” approach?

A

A thorough method that tests each component in sequence to confirm functionality. Best for complex problems requiring detailed validation, though it is more time-consuming.

55
Q

What is the “Top-to-Bottom/Bottom-to-Top OSI Model” approach?

A

A methodical process testing each OSI layer (e.g., starting at Physical Layer 1 or Application Layer 7) in sequence, moving only after ruling out a layer. Best for structured troubleshooting of network issues, like diagnosing a workstation from hardware to software.

56
Q

What is the Divide and Conquer approach

A

A strategy starting at the most likely Problematic layer, then moving up or down based on results. Best for efficient trouble shooting when the issue’s source is uncertain, adapting to findings.

57
Q

Define escalation

A

Escalation is when you pass a problem to someone who has more expertise, authority, or resources to solve it, because you can’t fix it yourself within the required time.

58
Q

Framework for defining words

A
  1. Comprehensive Definition: Start with a complete and accurate definition, including key elements and nuances.
  2. Elaboration/Explanation: Provide detailed explanations of the components of the definition, clarifying any ambiguous terms or concepts.
  3. Contextualization: Discuss the term’s significance and usage in various relevant contexts (e.g., support procedures, incident response, software development, etc.).
  4. Examples: Offer real-world examples to illustrate the term’s application.
  5. Differentiation (If Applicable): Distinguish the term from similar or related concepts, highlighting the key differences.
  6. Simplified Definition: Provide a concise, easy-to-understand definition that captures the core essence of the term.
59
Q

Failover services

A

Failover services are a strategy to minimize the impact of network downtime by having a backup system that automatically takes over if the primary system fails.

61
Q

ARP

A

ARP (Address Resolution Protocol) acts like a translator on local networks, converting logical IPs to physical MACs so devices can connect.