2. Networking Flashcards
Ports and protocols of 20/21.
FTP stands for File Transfer Protocol and is used to transfer files between computers on a network.
FTP uses two ports: port 21 for control information (such as login credentials and commands), and port 20 for data transfer.
FTP uses TCP as its transport protocol, which ensures reliable delivery of data.
FTP can operate in two modes: active mode and passive mode. In active mode, the client computer sends a port number to the server, which then initiates a connection to that port on the client computer. In passive mode, the client initiates the connection and the server sends a port number for the client to connect to.
FTP can be secured using SSL/TLS encryption, which adds an additional layer of security to the data transfer process.
FTP is often used by website administrators to upload files to a web server, and by users to download files from public servers.
Ports and protocols of 22.
SSH stands for Secure Shell and is used to securely connect to and manage remote computers over a network.
SSH uses port 22 by default, but this can be changed if necessary.
SSH uses TCP as its transport protocol, which ensures reliable delivery of data.
SSH provides encrypted communication between the client and server, which prevents unauthorized access and eavesdropping.
SSH uses public-key cryptography to authenticate the client and server, which adds an additional layer of security.
SSH can be used to execute commands on a remote computer, transfer files between computers, and forward ports between computers.
Ports and protocols of 23.
Telnet is a protocol used for remote access to computers over a network.
Telnet uses port 23 by default, but this can be changed if necessary.
Telnet uses TCP as its transport protocol, which ensures reliable delivery of data.
Telnet does not provide encrypted communication, which means that all data sent between the client and server is sent in clear text, making it vulnerable to interception and eavesdropping.
Telnet is typically used for accessing legacy systems and network devices, such as routers and switches.
Telnet can be secured using Secure Shell (SSH) or Virtual Private Networks (VPNs) to encrypt communication.
Ports and protocols of 25.
SMTP stands for Simple Mail Transfer Protocol and is used to transfer email messages between servers.
SMTP uses port 25 by default, but can also use ports 587 and 465 for secure email transmission.
SMTP uses TCP as its transport protocol, which ensures reliable delivery of data.
SMTP can be secured using Transport Layer Security (TLS) or Secure Sockets Layer (SSL) encryption, which encrypts the communication between the email client and server, protecting the email content and login credentials.
SMTP can also be used to receive email messages from other servers, in which case it is referred to as POP3 or IMAP.
SMTP is a widely used protocol for sending and receiving emails and is supported by most email clients and servers.
Ports and protocols of 53.
DNS stands for Domain Name System and is used to translate domain names (such as www.example.com) into IP addresses (such as 192.0.2.1) that can be understood by computers on a network.
DNS uses port 53 by default for both TCP and UDP protocols.
DNS uses TCP for zone transfers and larger queries, and UDP for regular queries and responses.
DNS is a distributed system, which means that it consists of many servers that work together to provide domain name resolution.
DNS can be configured to use forwarders and root hints to resolve queries when it does not have the answer in its cache.
DNS can be secured using Domain Name System Security Extensions (DNSSEC), which provides authentication and integrity of DNS data.
Ports and protocols of 67/68.
DHCP stands for Dynamic Host Configuration Protocol and is used to automatically assign IP addresses and other network configuration information to devices on a network.
DHCP uses ports 67 and 68 for server-client communication, with the server using port 67 and the client using port 68.
DHCP uses UDP as its transport protocol, which allows for fast and efficient communication between the server and clients.
DHCP can provide a range of network configuration information to clients, including IP address, subnet mask, default gateway, and DNS server addresses.
DHCP can be configured to provide IP addresses dynamically or statically, with dynamic allocation being the most common method.
DHCP can be configured to provide IP addresses to different types of devices, including desktops, laptops, mobile devices, and servers.
Ports and protocols of 80.
HTTP stands for Hypertext Transfer Protocol and is used for transmitting data over the internet.
HTTP uses port 80 by default for unencrypted communication, and port 443 for encrypted communication using HTTPS.
HTTP uses TCP as its transport protocol, which ensures reliable delivery of data.
HTTP is used by web servers to transmit data to web browsers, including HTML pages, images, and other media.
HTTP requests are initiated by the client (web browser) and responses are sent by the server, with each request and response consisting of a series of headers and a message body.
HTTP can be secured using HTTPS, which encrypts the communication between the client and server, protecting sensitive data from interception and eavesdropping.
Ports and protocols of 110.
POP3 stands for Post Office Protocol version 3 and is used for retrieving email messages from a mail server.
POP3 uses port 110 by default for unencrypted communication, and port 995 for encrypted communication using POP3S.
POP3 uses TCP as its transport protocol, which ensures reliable delivery of data.
POP3 allows email clients to download and store email messages on the client’s device, removing them from the server.
POP3 can be configured to keep a copy of the email messages on the server, allowing multiple devices to access the same messages.
POP3 can be secured using Transport Layer Security (TLS) or Secure Sockets Layer (SSL) encryption, which encrypts the communication between the email client and server, protecting the email content and login credentials.
Ports and protocols of 137/139.
NetBIOS stands for Network Basic Input/Output System and is used for communication between devices on a local network.
NetBIOS uses ports 137 and 138 for UDP communication, and port 139 for TCP communication.
NetBIOS is used for naming and browsing on a local network, allowing devices to discover and communicate with each other using their NetBIOS name.
Ports and protocols of 143.
IMAP stands for Internet Message Access Protocol and is used for retrieving email messages from a mail server.
IMAP uses port 143 by default for unencrypted communication, and port 993 for encrypted communication using IMAPS.
IMAP uses TCP as its transport protocol, which ensures reliable delivery of data.
IMAP allows email clients to access and manipulate email messages stored on the mail server, without removing them from the server.
IMAP can be configured to keep a copy of the email messages on the server, allowing multiple devices to access the same messages.
IMAP can be secured using Transport Layer Security (TLS) or Secure Sockets Layer (SSL) encryption, which encrypts the communication between the email client and server, protecting the email content and login credentials.
Ports and protocols of 161/162.
SNMP stands for Simple Network Management Protocol and is used for managing and monitoring network devices.
SNMP uses port 161 for sending requests and receiving responses, and port 162 for receiving SNMP trap messages.
SNMP uses UDP as its transport protocol, which is connectionless and does not guarantee reliable delivery of data.
SNMP consists of a manager and agents, where the manager sends requests to the agents to retrieve information about network devices, and the agents respond with the requested information.
SNMP allows the monitoring of various network parameters, such as bandwidth utilization, CPU and memory usage, and network errors.
SNMP can also be used for configuring network devices, such as changing the settings of routers and switches.
Ports and protocols of 389.
LDAP stands for Lightweight Directory Access Protocol and is used for accessing and managing directory information services.
LDAP uses port 389 for unencrypted communication, and port 636 for encrypted communication using LDAPS.
LDAP uses TCP as its transport protocol, which ensures reliable delivery of data.
LDAP allows clients to access and modify directory information stored on a server, such as user accounts and group memberships.
LDAP is used in many authentication and authorization scenarios, such as managing user accounts in an organization or granting access to resources based on group memberships.
LDAP can be secured using Transport Layer Security (TLS) or Secure Sockets Layer (SSL) encryption, which encrypts the communication between the client and server, protecting the directory information and login credentials.
Ports and protocols of 443.
HTTPS stands for Hypertext Transfer Protocol Secure and is used for secure communication over the internet.
HTTPS uses port 443 by default for encrypted communication.
HTTPS uses TCP as its transport protocol, which ensures reliable delivery of data.
HTTPS is used to encrypt and secure communication between a web browser and a web server, protecting sensitive information such as login credentials and credit card numbers.
HTTPS uses SSL/TLS encryption to encrypt the communication, which prevents eavesdropping and tampering of data in transit.
HTTPS is indicated by a lock icon in the web browser’s address bar, and the URL starts with “https://” instead of “http://”.
Ports and protocols of 445.
SMB stands for Server Message Block, and CIFS stands for Common Internet File System. They are used for sharing files, printers, and other resources between computers on a network.
SMB/CIFS uses port 445 for communication.
SMB/CIFS uses TCP as its transport protocol, which ensures reliable delivery of data.
SMB/CIFS allows users to access files and printers on remote computers as if they were local resources.
SMB/CIFS supports various authentication and authorization mechanisms, such as username and password, or Active Directory domain authentication.
SMB/CIFS can be secured using various methods, such as encryption, signing, and access control.
Ports and protocols of 3389.
RDP is a proprietary protocol developed by Microsoft and is used for remote access to Windows-based systems.
RDP uses port 3389 for communication.
RDP uses TCP as its transport protocol, which ensures reliable delivery of data.
RDP allows users to connect to a remote Windows computer and access its desktop, applications, and files as if they were sitting in front of it.
RDP supports various authentication and encryption mechanisms to secure communication between the client and server.
RDP is commonly used by IT professionals to remotely manage and troubleshoot Windows-based systems.
TCP vs UDP.
TCP vs UDP: Differences between the protocols. The main difference between TCP (transmission control protocol) and UDP (user datagram protocol) is that TCP is a connection-based protocol and UDP is connectionless. While TCP is more reliable, it transfers data more slowly. UDP is less reliable but works more quickly.
Connection-oriented vs. connectionless: TCP is connection-oriented, which means that a connection is established between the sender and receiver before any data is exchanged. UDP, on the other hand, is connectionless, which means that data can be sent without first establishing a connection.
Reliability: TCP provides reliable transmission of data by ensuring that all packets are received and in the correct order. It uses acknowledgement messages and retransmission of lost packets to achieve this. UDP, on the other hand, does not provide any guarantee of delivery or order of packets.
Error checking: TCP uses checksums to ensure that data is transmitted without errors. UDP also uses checksums, but they are optional and not always used.
Flow control: TCP uses a mechanism called flow control to prevent the sender from overwhelming the receiver with too much data. UDP does not have any flow control mechanism.
Speed: Because TCP provides reliability, it can be slower than UDP, which does not have the overhead of reliability and error checking.
Applications: TCP is commonly used for applications that require reliable data transmission, such as email, file transfer, and web browsing. UDP is commonly used for applications that require low latency and do not require reliable transmission, such as online gaming and video streaming.
Connectionless TCP vs UDP for DHCP.
Connectionless DHCP over UDP is used because it is a lightweight protocol that does not require the overhead of establishing and maintaining a connection. The DHCP server simply broadcasts DHCP packets, called DHCPDISCOVER, which are received by all devices on the network.
The devices that need an IP address to respond with a DHCPOFFER packet, and the DHCP server then selects one of the offers and sends a DHCPREQUEST packet to that device, which then responds with a DHCPACK packet. All of these DHCP packets are sent over UDP.
The use of connectionless DHCP over UDP allows for faster communication and less network overhead, as there is no need to establish a connection before transmitting data. This is important for DHCP, as the protocol is used to dynamically assign IP addresses, which can occur frequently on a network with many devices.
Overall, the use of UDP for connectionless DHCP allows for a faster and more efficient protocol than using TCP, which requires a connection to be established and maintained throughout the communication.
Connectionless TCP vs UDP for TFTP.
TFTP (Trivial File Transfer Protocol) is a simple file transfer protocol that is commonly used for transferring firmware images, configuration files, and other small files between networked devices. TFTP operates over UDP, which makes it a connectionless protocol.
Here are some key differences between TCP and UDP in the context of TFTP:
Connection-oriented vs. connectionless: TCP is connection-oriented, which means that a connection is established before any data is exchanged, while UDP is connectionless, which means that data can be sent without first establishing a connection. TFTP uses UDP, which makes it a connectionless protocol.
Reliability: TCP provides reliable transmission of data by ensuring that all packets are received and in the correct order. It uses acknowledgement messages and retransmission of lost packets to achieve this. UDP, on the other hand, does not provide any guarantee of delivery or order of packets. This means that TFTP, which uses UDP, does not guarantee the reliable delivery of data.
Error checking: TCP uses checksums to ensure that data is transmitted without errors. UDP also uses checksums, but they are optional and not always used. TFTP uses a simple checksum mechanism to verify the integrity of the data being transferred.
Flow control: TCP uses a mechanism called flow control to prevent the sender from overwhelming the receiver with too much data. UDP does not have any flow control mechanism. TFTP does not implement any flow control, which means that it is susceptible to network congestion and can result in packet loss.
Speed: Because UDP provides no guarantee of reliable data transmission, it can be faster than TCP. This means that TFTP, which uses UDP, can be faster than other file transfer protocols that use TCP.
Connection-oriented HTTPS and SSH.
Both HTTPS (Hypertext Transfer Protocol Secure) and SSH (Secure Shell) are connection-oriented protocols that use TCP as their underlying transport protocol. This means that before any data is transmitted, a connection is established between the client and the server, and this connection is maintained until the data transfer is complete.
Here are some key features of connection-oriented HTTPS and SSH:
Encryption: Both HTTPS and SSH use encryption to secure the data being transmitted over the network. HTTPS uses SSL/TLS (Secure Sockets Layer/Transport Layer Security) encryption, while SSH uses its own encryption algorithm.
Authentication: Both HTTPS and SSH use authentication mechanisms to ensure that the client is communicating with the intended server. HTTPS uses digital certificates to verify the identity of the server, while SSH uses public key authentication.
Reliable data transfer: Because both HTTPS and SSH use TCP, they provide reliable data transfer by ensuring that all packets are received and in the correct order. They use acknowledgement messages and retransmission of lost packets to achieve this.
Connection setup: Both HTTPS and SSH require a connection setup phase before any data is transmitted. During this phase, the client and server negotiate the parameters of the connection, including the encryption algorithm to be used.
Port numbers: HTTPS uses port 443 as its default port number, while SSH uses port 22 as its default port number.
In summary, HTTPS and SSH are connection-oriented protocols that use TCP as their underlying transport protocol. They both provide encryption and authentication to secure the data being transmitted over the network, and they both provide reliable data transfer by ensuring that all packets are received and in the correct order.
Compare and contrast common networking hardware for routers.
Routers: A router is a networking device that is used to connect multiple networks together. It operates at the OSI Network Layer (Layer 3) and uses logical addressing (such as IP addresses) to direct traffic between networks. Routers typically have multiple interfaces, each connected to a different network.
WAN Interface: A WAN interface on a router is used to connect the router to a Wide Area Network (WAN). This can be done using technologies such as T1/E1, T3/E3, DSL, cable, or fibre optic connections.
LAN Interfaces: LAN interfaces on a router are used to connect the router to Local Area Networks (LANs). These interfaces can be Ethernet, Wi-Fi, or other types of interfaces.
NAT: Network Address Translation (NAT) is a technology used by routers to translate between the private IP addresses used on a LAN and the public IP address used on the WAN. This allows multiple devices on a LAN to share a single public IP address.
DHCP: Dynamic Host Configuration Protocol (DHCP) is a protocol used by routers to automatically assign IP addresses to devices on a network. DHCP can also be used to assign other network configuration parameters, such as subnet masks, default gateways, and DNS server addresses.
VPN: Virtual Private Networks (VPNs) allow remote users to connect to a private network over the Internet. Routers can be configured to support VPN connections, allowing remote users to securely access the private network.
Quality of Service (QoS): QoS is a set of technologies used by routers to prioritize certain types of network traffic over others. This can help ensure that critical traffic, such as voice or video traffic, is given priority over less important traffic, such as file downloads.
Compare and contrast common networking hardware for managed switches.
Managed switches: A managed switch is a networking device that is used to connect devices within a local area network (LAN). Unlike unmanaged switches, managed switches allow for configuration and monitoring of network traffic.
VLANs: A VLAN (Virtual Local Area Network) is a logical grouping of devices within a LAN. Managed switches can be used to create VLANs, which can help with network segmentation and security.
Port Mirroring: Port mirroring is a feature of managed switches that allows network administrators to monitor network traffic by duplicating traffic from one port and forwarding it to another port. This can be useful for troubleshooting network issues or monitoring network security.
Quality of Service (QoS): QoS is a set of technologies used by managed switches to prioritize certain types of network traffic over others. This can help ensure that critical traffic, such as voice or video traffic, is given priority over less important traffic, such as file downloads.
Spanning Tree Protocol (STP): STP is a protocol used by managed switches to prevent network loops. Network loops can occur when there are multiple paths between switches in a network, which can cause network congestion or even network failures. STP helps to ensure that there is only one path between switches in the network.
Link Aggregation Control Protocol (LACP): LACP is a protocol used by managed switches to combine multiple physical links between switches into a single logical link. This can help increase bandwidth and improve network redundancy.
Port Security: Port security is a feature of managed switches that allows network administrators to limit the number of devices that can be connected to a particular switch port. This can help prevent unauthorized access to the network and reduce the risk of network attacks.
Compare and contrast common networking hardware for UNmanaged switches.
Unmanaged switches: An unmanaged switch is a basic networking device that is used to connect devices within a local area network (LAN). Unlike managed switches, unmanaged switches are plug-and-play devices that do not require any configuration or monitoring.
Port-based: Unmanaged switches operate on a port-based system, which means that all devices connected to the switch share the same bandwidth. If multiple devices are trying to communicate at the same time, network congestion and slow speeds can occur.
No VLANs: Unmanaged switches do not have the ability to create VLANs. This means that all devices connected to the switch are on the same network segment, which can make it more difficult to implement network segmentation and security measures.
No Quality of Service (QoS): Unmanaged switches do not have the ability to prioritize certain types of network traffic over others. This means that all network traffic is treated equally, which can result in slow network speeds and poor network performance.
No Spanning Tree Protocol (STP): Unmanaged switches do not have the ability to run STP. This means that network loops can occur if there are multiple paths between switches in a network, which can cause network congestion or even network failures.
No Port Security: Unmanaged switches do not have the ability to limit the number of devices that can be connected to a particular switch port. This means that any device can be connected to the network, which can increase the risk of network attacks and unauthorized access.
Compare and contrast common networking hardware for access points.
Access points: An access point (AP) is a device that allows wireless devices to connect to a wired network. Access points are commonly used to extend the range of a wireless network or to provide wireless connectivity to devices that do not have built-in Wi-Fi capabilities.
Wireless Standards: Access points support different wireless standards, such as 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac. These standards specify the maximum data transfer rates, range, and other features of the wireless network.
Channel and Frequency: Access points operate on specific channels and frequencies. In areas with multiple access points, it’s important to choose a channel and frequency that is not being used by other access points to avoid interference.
SSID and Security: Access points broadcast a Service Set Identifier (SSID), which is the name of the wireless network. Access points also support different security protocols, such as Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and WPA2, to ensure that only authorized users can connect to the network.
Antennas: Access points have antennas that transmit and receive wireless signals. The number and type of antennas can affect the range and performance of the wireless network.
Power over Ethernet (PoE): Some access points support Power over Ethernet (PoE), which allows them to receive power and data over the same Ethernet cable. This can simplify installation and reduce the number of cables needed.
Mesh Networking: Some access points support mesh networking, which allows multiple access points to work together to create a single wireless network. This can extend the range of the network and improve coverage in areas with weak signals.
Compare and contrast common networking hardware for patch panels.
Definition: A patch panel is a device that provides a central location for terminating network cables and connecting them to network devices. Patch panels are commonly used in data centers and server rooms to organize and manage network cables.
Types of Patch Panels: There are two main types of patch panels: punch-down and modular. Punch-down patch panels require the wires to be punched down into the panel with a special tool. Modular patch panels use pre-terminated cables that snap into place.
Port Density: Patch panels come in different port densities, which determines the number of connections that can be made. The most common port densities are 24 and 48 ports.
Wiring Standards: Patch panels support different wiring standards, such as T568A and T568B, which determine the order of the wires in the Ethernet cable. It’s important to use the same wiring standard for the patch panel and all network devices to ensure proper connectivity.
Cable Management: Patch panels often include cable management features, such as cable ties and loops, to help organize and secure the cables. Proper cable management can help reduce cable clutter and make it easier to trace cables when troubleshooting.
Labeling: Patch panels should be labeled to identify the ports and cables. This can help simplify troubleshooting and make it easier to identify the correct cable when making changes or additions to the network.
Compatibility: Patch panels should be compatible with the network devices they are connecting to, such as switches, routers, and servers. It’s important to choose a patch panel that supports the same network speed and technology as the connected devices to ensure optimal performance.
Compare and contrast common networking hardware for firewalls.
Definition: A firewall is a network security device that monitors and controls incoming and outgoing network traffic. Firewalls are designed to prevent unauthorized access to or from a network.
Types of Firewalls: There are several types of firewalls, including hardware and software-based firewalls. Hardware firewalls are standalone devices that are installed between the network and the internet. Software-based firewalls are installed on individual computers or servers and provide protection for that device only.
Firewall Rules: Firewalls are configured with rules that determine what traffic is allowed to pass through the firewall and what traffic is blocked. These rules can be based on the source and destination IP addresses, ports, protocols, and application type.
Stateful vs. Stateless Firewalls: Stateful firewalls keep track of the state of network connections and can make decisions based on the context of the traffic. Stateless firewalls do not keep track of the state of network connections and make decisions based on individual packets.
Network Zones: Firewalls often divide networks into different zones, such as a DMZ (demilitarized zone) and an internal network. The DMZ is a separate network that provides controlled access to services that are accessible from the internet, while the internal network is restricted to authorized users and devices.
Intrusion Detection and Prevention: Some firewalls include intrusion detection and prevention capabilities, which can detect and block suspicious network traffic and prevent attacks.
VPN Support: Some firewalls include VPN (virtual private network) support, which allows remote users to securely access the network over the internet.
Unified Threat Management: Some firewalls offer unified threat management (UTM) capabilities, which combine multiple security functions into a single device, such as antivirus, antispam, and web filtering.
Compare and contrast common networking hardware for PoE injectors.
Definition: Power over Ethernet (PoE) injectors are devices that allow Ethernet-enabled devices to receive power and data over the same cable. PoE injectors are often used to power wireless access points, IP cameras, and other network devices that do not have built-in power supplies.
PoE Standards: There are several PoE standards, including 802.3af, 802.3at, and 802.3bt. The different standards provide varying levels of power to connected devices.
Power Output: PoE injectors can provide power ranging from 15.4 watts to 90 watts, depending on the standard and the device being powered.
PoE Compatibility: Not all devices are PoE-compatible, and some devices may require additional adapters or equipment to be used with PoE injectors.
PoE Injector Placement: PoE injectors should be placed close to the device being powered to minimize power loss over the Ethernet cable.
PoE Injector Safety: PoE injectors should be used with caution and should be kept away from water, heat sources, and other potential hazards.
PoE Injector Troubleshooting: If a PoE-enabled device is not receiving power, check the connections between the device and the PoE injector, as well as the power source for the PoE injector itself.
Compare and contrast common networking hardware for PoE switches.
Definition: Power over Ethernet (PoE) switches are network switches that provide power and data over the same cable to connected devices. PoE switches are often used to power devices such as wireless access points, IP cameras, and VoIP phones.
PoE Standards: There are several PoE standards, including 802.3af, 802.3at, and 802.3bt. The different standards provide varying levels of power to connected devices.
Power Output: PoE switches can provide power ranging from 15.4 watts to 90 watts per port, depending on the standard and the device being powered.
PoE Compatibility: Not all devices are PoE-compatible, and some devices may require additional adapters or equipment to be used with PoE switches.
PoE Switch Placement: PoE switches should be placed close to the device being powered to minimize power loss over the Ethernet cable.
PoE Switch Safety: PoE switches should be used with caution and should be kept away from water, heat sources, and other potential hazards.
PoE Switch Troubleshooting: If a PoE-enabled device is not receiving power, check the connections between the device and the PoE switch, as well as the power source for the PoE switch itself.
Compare and contrast common networking hardware for PoE standards.
Definition: Power over Ethernet (PoE) is a technology that allows network cables to carry electrical power, which is used to power connected devices such as wireless access points, IP cameras, and VoIP phones.
PoE Standards: There are several PoE standards, including 802.3af, 802.3at, and 802.3bt. The different standards provide varying levels of power to connected devices.
802.3af: This PoE standard provides up to 15.4 watts of power per port, which is suitable for many devices such as IP phones, wireless access points, and IP cameras.
802.3at: This PoE standard, also known as PoE+, provides up to 30 watts of power per port, which is suitable for high-power devices such as pan-tilt-zoom (PTZ) cameras and access points with multiple radios.
802.3bt: This PoE standard, also known as PoE++, provides up to 60 watts or even 90 watts of power per port, which is suitable for devices that require high levels of power such as LED lighting, video conferencing systems, and virtual desktop infrastructure (VDI) endpoints.
PoE Compatibility: Not all devices are PoE-compatible, and some devices may require additional adapters or equipment to be used with PoE switches.
PoE Switch Placement: PoE switches should be placed close to the device being powered to minimize power loss over the Ethernet cable.
PoE Switch Safety: PoE switches should be used with caution and should be kept away from water, heat sources, and other potential hazards.
PoE Switch Troubleshooting: If a PoE-enabled device is not receiving power, check the connections between the device and the PoE switch, as well as the power source for the PoE switch itself.
Compare and contrast common networking hardware for hubs.
Definition: A hub is a network device that allows multiple devices to connect and communicate with each other on a network.
Function: A hub operates by receiving incoming data packets and forwarding them to all other connected devices.
Types: There are two main types of hubs: active (powered) and passive (unpowered). Active hubs amplify the signal of incoming data packets, while passive hubs do not.
Speed: Hubs are typically available in 10/100 Mbps or 10/100/1000 Mbps (Gigabit) speed configurations.
Limitations: Hubs have several limitations, including limited bandwidth, increased network latency, and a lack of network security features.
Advantages: Hubs are typically inexpensive and easy to install.
Disadvantages: Hubs are largely outdated and have been replaced by more advanced network devices such as switches and routers.
Recommendation: When setting up a network, it is recommended to use a switch instead of a hub, as switches provide greater network efficiency and security.