2.0 Networking Flashcards
2.1

Transmission Control Protocol (TCP)
- What happens during a TCP session?
- What happens if packets are dropped?
A connection-oriented protocol that ensures(verifies) reliable delivery of data to the destination computer.
- every packet in a transmission is checked to be sure that it is delivered
- the receiving computer requests that they be resent.
2.1

UDP(User Datagram Protocol)
(hint: unprotected)
- What happens to packets that are dropped?
connectionless-protocol in which packets are not checked for accuracy of delivery
-The packets are not resent
2.1
Protocol
A set of rules used to enable communication between network devices.
2.1

FTP(File Transfer Protocol)
(Drinking age) and -1
-What port does it use?
Protocol that transfers data between computers to servers on a network
Ports 20 and 21
2.1
SSH(Secure Shell)
-What port(look at first 2 letters)
protocol for a remote terminal that works securely over the internet
Port 22
2.1

Telnet
-What port?
A protocol that enables a user to make a text-based connection to a remote computer or networking device
-Port 23
2.1

SMTP(Simple Mail Transfer Protocol)
(Samta)
-What port?
Used by your computer or other devices to send email
-Port 25
2.1

HTTP(Hypertext Transfer Protocol)
-What port?
application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems
-Port 80
2.1
HTTPS(Hypertext Transfer Protocol Secure)
(1 less than 444)
-What port?
network protocol that is often used for payment transactions on the Web and for sensitive transactions in corporate information systems.
Port 443.
2.1

IMAP4(Internet Message Access Protocol)
-What port?(think I and 4)
Used to retrieve email messages
Port 143
2.1
NetBIOS(NetBT)
a protocol that allows some legacy applications to work on larger networks and the Internet.
2.1
SLP(Service Location Protocol) (think LAN)
- Port (stoned + lucky)
- Ex:
(listens on networks broadcasting SSIDs)
- service discovery protocol that allows computers and other devices to find services in a LAN without prior configuration
- Runs on port 427
Ex: displays printers on a LAN
2.1

AFP(Apple Filing Protocol )
-What port?
- file management protocol that allows us to copy or move files, delete and make changes to the file system(Apple)
- Port 548
2.1

SMB(Server Message Block)
- Ex of this?(printing)
- What’s a port it shared with CIFS?
- Windows file sharing protocol that allows your devices to communicate with remote computers or servers.
- Allows you to print from your laptop to an office printer
- Port 445
2.1
CIFS(Common Internet File System)
-What’s a port it shared with SMB?
(Windows) Legacy protocol that allows for file sharing, printer sharing
-Port 445

2.1

RDP(Remote Desktop Protocol)(Windows)
(1/3 + Berlin fall)
-What port?
allows you to view and control someone else’s desktop while you’re sitting at your own desk by using the network
-RDP uses port 3389.
2.1

Dynamic Host Configuration Protocol
-What ports does it run on?
It automatically assigns an IP address to all devices on the network, dynamic addressing.
-UDP 67 and 68
2.1

SNMP(Simple Network Management Protocol)
-What ports are they used for?
management protocol used between devices to gather details, metrics, about how multiple devices are performing
-UDP 161 to query devices and 162 to receive alarms/traps from devices
2.1
LDAP(Lightweight Directory Access Protocol)
-Default port?
database of everybody who’s in your organization, and it makes it very easy to manage things from a central location
Ex: Active Directory
-TCP 389
2.3
port forwarding(tunneling)
(Destination NAT)?
-Ex:
Forwards visitors to a specific ip address and port within a LAN
- It changes the destination IP address for inbound traffic.
- IF any device accesses my external IP address over ports 8088,it will translate those ports to port 80 on the inside and send that traffic to 10.1.10.221.

2.3
port triggering
opens an outgoing port or range of ports on demand by a particular service, such as Internet Relay Chat (IRC).
-Port triggering can be used without being tied to a specific IP address.
2.1
Port
A number or range of numbers assigned to a particular connection session or connection type.
2.3
WEP(Wired Equivalent Privacy)
(used with older routers)
legacy encryption protocol
2.3
WPA(WiFi Protected Access)
wireless security standard that uses TKIP
2.3
TKIP(Temporal Key Integrity Protocol)
an encryption protocol used in the IEEE 802.11 wireless networking standard
2.3
WPA2(WiFi Protected Access version 2)
-How good?
Uses AES for encyption
-Best encryption
2.3
Advanced Encryption Standard (AES)
-You want to configure your wireless network to use __ encryption
A protocol that is similar to TKIP but more secure and that is used with the WPA2 wireless encryption standard.
-It uses a block size of 128 bits with variable key lengths up to 256 bits.
2.1
DNS(Domain Name System)
- What kind of addresses are usually assigned?
- What port?(2 quarters + dns initials)
It maps domain names to IP addresses
ex: 192.34.22.4 - bob.com
- Static
- UDP Port 53
2.6

domain name
A unique alphanumeric identifier for a website.
2.2
Router
-How does it determine where to forward it’s traffic
A networking device that routes internet packets(data) between LANs and WANs
-forwards traffic based on destination IP address

2.3
Firewall
- How do they filter traffic
- Common use for firewalls
A hardware appliance or software application that protects a computer from unwanted intrusion.
- Check UDP and TCP ports, and programs
- They are used as a routing device
2.2
patch panel

A box designed as a junction point for twisted pair (TP) cable and fiber cable used in networks.
2.6
NAT(Network address translation)
-Example of this when you want to access a website, and send your traffic to your router
translates(changes) one IP address to another.
-Your router takes the source IP(your pc) and translates it to an external address on public internet and sends it to that web server
2.6
DNAT(Destination network address translation)
provides port forwarding for incoming traffic.
2.3
DMZ(Demilitarized zone)
-Purpose?
allows people to access a device that would not allow them access to the internal network, and access these resources from the internet
-to add an additional layer of security to an organization’s local area network (LAN)

2.3
UPnP(Universal Plug and Play)
-How is this commonly used with SOHO routers?
(zero configuration)
allows network devices to automatically configure and find other network devices.
-other devices on your network can automatically configure your SOHO router and make changes to the configuration at any time.Ho
2.4
RFID(Radio-frequency identification)
-Example
small tags that we can put in anything that we’d like to track
-scan office badge
2.7
Fiber optic
-What kind of fiber?
network cable that uses glass fibers to transmit photons to carry data over long distances
2.8

cable stripper
A tool used to strip a portion of the plastic jacket off of a cable to expose the individual wires.
2.8

Cable Crimper
device that pinches the modular connector onto the end of the cable.
2.8

punchdown tool
creates the termination inside a patch panel.
2.8
Multimeter
-Great for performing continuity tests
A tool that can be used to test both coaxial and TP cabling and AC/DC voltage.
-Checking for an open or closed circuit
2.8
tone generator
- tone generator?
- Connections?
This allows you to follow or track where a wire is going from one end to the other by simply following a tone.
- plug it into the wire and it places an analog sound onto that wire.
- Can connect to many connections, like RJ11 or RJ45
2.8
cable tester
A tool that tests each wire in a cable and makes sure each one is wired properly.
2.8
loopback plug
-It’s also good for fooling ___
used to send traffic going out of a particular interface, loop them around, and send them back into that same interface
-different applications that are expecting to have an ethernet connection available
2.8

WPS(WiFi Protected Setup)
network security protocol for new users to set up their wifi
2.4
- 11a
- What frequency range?
- Megabits a second?
- 5ghz range
- 54 megabits a second
2.4
- 11b
- What frequency range?
- Megabits a second?
- 2.4 gigahertz range
- 11 megabits a second.
2.4
- 11g
- What frequency range?
- Megabits a second?
- 2.4 gigahertz range
- 54 megabits a second
2.4
- 11ac(MIMO)
- What frequency range?
- Megabits a second?
- 5 ghz
- 7 gigabits
2.4
- 11n(MIMO)
- What frequency range?
- Megabits a second?
- 5 and 2.4 ghz
- 600 megabits a second
2.7
line-of-sight wireless
- Where?
- Common LOS service(WiMAX)
wireless internet service that’s able to provide access over a very wide geographical area
- Used in MAN networks
- wireless high-speed internet connectivity
2.7
LAN( Local area network)
-How are devices connected to each other on a LAN
small network usually confined to a single building, although it could encompass more than just one building.
-Connected to each other by switches or hubs and use a router to reach other networks on a WAN
2.7
WAN( Wide area network)
-What onnections get sent to where?
Ex:
covers a large area and consists of many smaller networks usually connected to each other by public communication lines.
-A satellite
2.7
PAN(Personal area network)
Ex:
a small network a single user might connect for his own personal use, such as a PCmice, keyobards, and printers
-Bluetooth, NFC
2.7
MAN(Metropolitan Area Network)
- Who is it managed by?
- How is it usually connected(wiring)
is between a LAN and a WAN in size and complexity, and it might encompass an entire city.
- managed by one central network provider that’s in your area
- Ethernet
2.7
DSL(Digital Subscriber Line)
- What kind of bandwidth?
- Max range
carries voice and internet data over phone lines
- dedicated bandwidth
- 10,000 feet
2.7
Asymmetric Digital Subscriber Line (ADSL)
-How is it provided and used by who?
a form of DSL that enables faster downloads than uploads.
-Can be provided over high-quality existing phone lines and is well suited for residential and small business use.
2.7
Symmetric Digital Subscriber Line(SDSL)
-For who?
a type of DSL connection in which upload and download speeds are the same.
-SDSL connections are marketed to business rather than to home users and almost always require a newly installed circuit to the location and professional installation.
2.5
legacy system
An outdated operating system, programming language, application, or hardware.
2.5
embedded systems
Dedicated computing devices used for specific tasks such as machine control, point-of-sale systems, or ATMs. Embedded systems are often legacy systems.
2.6
subnet mask
An IPv4 network addressing feature used to specify how much of an IP address is the host address and what part is the extended network address.
2.6
VLAN(Virtual local area network)
VLANs allow us to take the hardware interfaces on a switch and separate them out into logical groups.
2.8
WiFi analyzer
A device or an app that detects which SSIDS are using which channels
-Monitors traffic and frequency on networks

2.3
NIC(network interface controller )
piece of hardware on a computer (or other device) for connecting to Ethernet network or multiple networks

2.2
Repeater
A device that resends a network signal to enable it to extend over longer cable or wireless distance than normal.
2.2

(ethernet) Hub
(dumb version of a switch)
information sent from one interface on this hub is automatically repeated to every other interface on this hub.
-It must split its available bandwidth among all the connected computers, which slows its communication speed.
2,2 hub half-duplex
two devices can’t communicate at the same time on a hub. Once one device is done, another device can then begin sending information.
2.2

(network )Switch
-MAC address(relation)
A network device that forwards and filters a path for data to run from one system to another
-it looks at the destination MAC address, and it sends that info to the appropriate interface on that switch

2.2 Managed switch
allow you to configure different VLANs on different interfaces
-You might also be able to connect switches together in a trunk.
- 2
(network) Bridge
- _____ by software
- Example of a bridge?
Similar to a switch, but connects less network subnets
- forwards decisions made by software
- WAP(Wireless Access Point)
2.2

Modem
- Demodulates _ into _
- Modulates _ into _
Demodulates(extracts) incoming analog signals into digital signals
Modulates(converts) outgoing digital signals into analog signals

2.2
Router

a network device that connects LAN to internet
2.2

cable modem
- What kidn of networks do they appear on?
- What kind of bandwidth?
allow you to connect to a broadband network
- home and corporate networks
- Shared bandwidth
2.2

DSL modem(Digital Subscriber Line modem)
-
A DSL modem connects to your computer through which of the following ports?
-A DSL modem connects to a computer via an RJ-45 (Ethernet) connector and port.
2.2
wireless access point (WAP)(bridge)
-What does it use to identify computers on a network?
a networking device that allow Wi-Fi devices to connect to a LAN/WAN
-MAC addresses of the destination
2.3
SOHO router (Small office/home office)
- What other services can it provide?
- What kind of server is it?
network device that supports functions of a data center but scaled down
- extensive network configuration options that include a DHCP, firewall, and wired/wireless security settings
- DHCP server
2.2
cloud-based controller
A virtual device that administrators can use to manage wireless LAN networks and branch offices that are located anywhere on the Internet from a central location.
2.7
Satellite
An Internet provider option that uses dish antennas similar to satellite TV antennas to receive and transmit signals between geosynchronous satellites and computers.
2.2
PoE( Power over Ethernet)
-Example of a device that a PoE can charge

allows us to power devices using our ethernet cables
-WAP

2.5
print server
software/hardware that act as a middleman between you and that printing device.
2.5
DHCP server
a server that automatically assigns(leases) an IP and subnet mask, default gateway and DNS server and is usually incorporated into a SOHO wireless router.
2.5
syslog server
A server that tracks events, such as user logins and crashes, that happen on devices on a network.
2.5
UTM(Unified threat management)
(web security gateway.
- capabities as a URL filter
- Network connectivity
- It might provide some type of content inspection from your users. It can look for malware going across your network, and it could stop spam from coming into your network.
- So it may have a wide area network CSU/DSU associated with it. And of course, it may have routing and switching technology as well. This could act as your firewall. It may include an IPS as part of its technology, and it might even be able to do bandwidth shaping and quality of service all from one single device.
2.5
IDS(Intrusion Detection System)
or
IPS(Intrusion Prevention System)
designed to look at traffic going through your network identify any known attacks that may be inside of that traffic and block or mitigate those attacks in some way
2.3
QoS(Quality of Service) configurations
(routers(
set priorities based on the type of application, the port numbers in use, IP addresses, and other settings.
2.5
endpoint management server
- What capabilties does it have for updating?
- What does it requiew you to install?
A server that tracks devices using the network and ensures that they comply with the security parameters of the network.
- Update an entire operating system
- An agent on everyones workstation
2.5
file server
Typically a computer with a single large drive or a RAID array for shared storage on a network.
NAS(Network attached storage)
a special kind of file server designed to store large amounts of data in a central location for users on a network.
2.8

Identify the tool in the following diagram and describe its use.
Wire stripper for removing the outer jacket from a cable.
2.1
Post Office Protocol
-What is it’s default port?
(look at the 0)
application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server.
-Port 110
command to assign a new IP address to the computer?(Windows)
ipconfig/renew
-ipconfig/release
2.4
When configuring a channel for your 2.4GHz wireless home network, you decide to choose channel 11. For which of the following reasons did you make this selection?
Channel 11 does not overlap with other channels.
ipconfig
command to see the IPv4 and IPv6 addresses on a Windows-based computer
APIPA(private IPv4 link-local address)
Address ranges from 169. 254.0.1 through 169.254.255.254
automatic address for pc that allows communication on your local subnet
You want to use the highest possible level of encryption on your wireless network. Which of the following protocols should you configure on your router?
WPA-AES
2.7
Most cable Internet service providers build their long distance WAN networks using which of the following? (Choose two.)
Fiber optic cables
-Coaxial cables
What situation would require only a modem?
Having only one device
Hub vs switch
-Both are within
Switches can learn MAC addresses and filter them, unlike a hub which broadcasts to every port
-LAN
nslookup
IPv4
-What range is each byte(section)
32 bit address written as 4 numbers(octets) seperated by periods
-Between 0 and 255
IPv6
Hexadecimal
(think nibble)
- Split into how many sections(bytes) :
- What do we do with leading zeros and consecutive zeros
Ex: fe80:0000:0000:0000:5d18:0652:cffd:8f52
128 bit addresses
- 2 byte sections, made of 16 bits
- Chop them off, and double colon :
2.1
UDP vs TCP
- What does TCP do?
- What does UDP do?
-TCP/IP helps determine how a specific computer should connect to the internet, how you can transmit data between them + create a virtual network
-UDP is used for broadcast and multicast type of network transmission.
2.1
What kind of address is leased?
DHCP or AIPA address?
DHCP lease, because DCHP uses IP addresses multiple times for different computers
2.6
IP address
A numeric address that identifies a device on a network, and allows it to communicate with other devices
2.6
Default gateway
Your router’s internal ip address
2.1
POP3 Secure port
and IMAP Secure port
- Port 995
- Port 993
2.1
SMTP Secure
Port 465, 587
2.2
switch table
MAC address list for switch
2.2
Wireless LAN controller
allows for a central management console to be able to support 100s-1000s of WAPs
2.8
network topology
how a network is arranged, including the physical or logical description of how links and nodes are set up to relate to each other.
2.8
LAN topology
Star topology
SSID(Service Set Identifier)
a group of wireless network devices which share a service set identifier
subnetting
IOT(internet of things) devices
- Ex:
- How do they connect?
devices embedded with technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
-Thermostat, light switches, door lock
2.8
Cable modem topology
bus topology
2.7
ISDN(Integrated Services Digital Network)
set of communication standards for simultaneous digital transmission of data, voice + video over the circuits of the public switched telephone network.
2.7
PRI(Product Release Instructions ISDN)
-Which connections are they delivered over?
can be used as a reference during a mobile device update process
-T1 or E1 connection
2.7
BRI( ISDN Basic Rate Interface)
(2B+D)
-2 bearer channels(how many bits each?)
configuration intended primarily for use in subscriber lines, and can use telephoen lines
-64 kilobits each
2.6
PRL(Preferred Roaming List)
database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish connection with the right cell phone tower
2.6
IMEI(International Mobile Station Equipment Identity.)
a unique identifier that allows the mobile provider to identify your specific physical mobile device
2.6
IMSI(International Mobile Subscriber Identity)
A unique number used to identify a mobile network phone user
2.6
VPN
2.7 Examples of mobile device synchronization methods for Apple iOS devices
iTunes , iCloud
2.7
Which of the following are examples of universal connection types that enable mobile device synchronization?
IEEE 802.11
USB-C
Cellular
Bluetooth
IEEE 802.3
All of them
Which of the following are Apple-proprietary connector types that can be used for iOS mobile device synchronization?
Apple dock conenctor(30 pin) and lightning USB(8 pin)
2.7 Android device synchronization
USB Micro-B
2.1
Telnet features
Provides username & password authentication
- Transmits data in an unencrypted form
- 1 TCP/IP
- What physical connection uses it?
Popular protocols that are used by the internet and other networks
-Ethernet
2.1
FTP ports
What’s port 21 for?
-Port 20 for?
Control port, used to allow data through
-Send data between client and server
-
2
PLC(Power Line Communication)
A type of technology that enables sending data over wiring used for transmission of electrical power
2.1 encapsulation of protocols
2.1 What two protcols can IP contain?
TCP or UDP
2.1 multiplexing
put multiple applications inside of different (ethernet)frames and send them all across the network at one time
2.1 encapsulation(full)
Ethernet, inside has IP, inside has TCP/UDP
2.1 What are temporary ports, used only for a session?
Ephemeral ports
- 1 What two kinds of ports numbers must a client choose to communicate with a web server?
- port for the ___
- port for the ___
- probably using a non-ephemeral port number,
- TCP 80 port
2.1 FTP ports used for?
TCP port 20 is the active mode data port, and TCP port 21 which controls the communication.
2.1 TCP security features
you can configure a username and a password that gains access to another system.
2.1 Additional FTP features
-
-full featured functionality
anonymous log in
-list,add files, delete, rename files on the system
- 1 NetBIOS ports
- What ports?
(Compatible with WINS server)
-TCP port?
- UDP 137,name services 138, datagram service
- TCP 139, session service
- 1 DHCP leases + reservations
- Leases
- Reservation
- Lease is a specific time an IP adresss is “rented”
- when a workstation/server requests an IP address, the server can recognize the MAC address of that device and provide the same IP address to that device
-
- Current version of SNMP
version 3, which has provides message integrity and authentication method. And all of the information that’s sent between the client and the remote device is all encrypted.
2.2 Application-Specific Integrated Circuit,(ASIC)
switch hardware responsbile for scaling up hundreds of interfaces on a switch
2.2 multi-layer switches
both switching functionality and routing functionality within the same device
2.2 un-managed switch
network switch with little setup
2.2 Manage redunadacy in a managed switch
use Spanning Tree Protocol.
- 2 port mirrors
- What does this allow you to do?
traffic can be mirrored from one port to another.
-Connect a network analyzer to one of the ports on the switch and copy traffic from any other port on that switch to watch the traffic
- 2 wireless router
- What other functionality does it have?
router switch
2.3 encrypted tunnels(firewall)
So if you’re off site, you still need connectivity to the corporate network.
- 3 What to do if you want to surf a website(firewall)
- What would the proxy firewall do?
you would send that request to the firewall.
-then it wou;d make the request for you, receive the response, check the response, and make sure it’s appropriate for you to view and then send that traffic to you.
2.3 proxy firewalls
older firewalls that are in the middle of an intranet
- 2 DOCSIS(Data Over Cable Service Interface Specification)
- What standard is it?
- Speeds
- high speed networking for sending data on cable networks
- 4 to 250 megabits
- 7 DSL speeds
- upstream
- downstream
- 16 megabits per second sending traffic upstream
- 52 megabits per second downstream
- 2 patch panel
- create a simple patch between our patch panel and our networking equipment
terminates ethernet cables into a 110 blocl
- extending some ethernet patch cables inside of our closet.
2.2 on a different VLAN or a different network(patch panel)
If someone then moves from one desk to another or we need to plug that person into a different type of network connection
we can connect those users to a different switch or a different set of interfaces on the same switch.
-simply disconnect the rj-45 cable inside of our closet and plug it into the new connection.
- 2 Ethernet over Power(EoP)
- speed
we are extending our ethernet network using the power cables that we already have in our home.
-500 megabits a second
2.2 Ethernet Over Power
(Can be called PLC)
- What IEEE standard
- What’s it designed to connect?
- Ex: electric car
- IEEE standard 1901
- connect devices that normally wouldn’t be connected to our ethernet
- if we had an electric car that we recharged overnight, when we plugged it into the power source, it would also be connected to our ethernet network.
- 3 SOHO router features
- what frequencies can it use
- configure the SSID
- Choose security mode(with what encryption)
- 2.4 or 5ghz
- name of the wireless network
- which is how the data will be protected as it goes through the air, with WPA2 encryption
- 3 Many wireless routers have this feature(shared __)
- What’s alternative to this?
allow you to set a shared key that everyone will use,
-can configure an enterprise configuration where every user will put in their own user name and password to gain access to the wireless network.
- 3 SOHO router(IP)
- What networks need to have Ip addresses assigned to them?
- What do some service prociders require before a router is used on a network?
- LAN and WAN
- Provide authentication for the router’s configuration
- 3 What does a wired Ethernet device plugged into a SOHO router auto-configure
- What duplex setting can be configured?
- auto-negotiate its speed and duplex
- half or full duplex
2.3 What do you need to enable/disable when connectng a device over a wireless network?
-wireless adapter
- 3 DHCP settings(automatic)
- What do they configure automatically
-IP address, subnet mask router, and DNS information
- 3 SOHO router(DMZ)
- What setting can you configure(IP)
-adds the IP address of the device that would have access from the internet.
- 3 Source Network Address Translation(SOHO)
- definition?
- Always on feature in SOHO routers
- translates all of your internal(private) IP addresses to appear as a single external IP address on the internet.
2.3 port forwarding table(SOHO router)
The router then changes the destination IP address,where the inbound traffic is then directed
- 3 PnP advantage
- (and security concern)
(SOHO router)
ports are only open when you’re using that particular application.
-you can’t control when the prots are open
2.3 MAC Address(Media Access Control)
- 3 router filtering(what does it use to filter devices)
- However, these ___ can be viewed by a packet analyzer
- They are also easily __
- MAC addresses
- MAC addresses
- spoofed(changed)
2.4 What frequencies(802.11) use 20 megahertz channel bandwidth
802.11a, 802.11b, and 802.11g
- 4
- 11n bandwidth choices
20 mHz, or a 40 mHz bandwidth
2.4 802.11ac bandwidth options
80 megahertz bandwidths by default, and can use 160 megahertz .
2.4
If running 802.11n stations on a 802.11ac network, how much bandwidth?
40 megahertz bandwidth
2.4
What channels are available for 2.4 mghz freqencies
channels 1, channel 6, and channel 11
2.4 Wireless technology that uses tethering and file sharing between devices
Bluetooth
- 4 NFC(Near Field Communication)
- Relation with RFID?
allows us to use our phones as identification devices so we’re able to pay for systems with a credit card or an online wallet.
-Advanced form
- 4 Zigbee(PAN)
- Advantages over Bluetooth
wireless meshed network
-It uses less energy and less power than Wi-Fi and can go longer distances
- 4 Z-Wave(PAN)
- Examples of use?
- What band and frequencie(s)
wireless meshed network
- lights, your garage door, and other home automation
- ISM band and 900mhz frequency
- 4 What 2 standards does 2G use
- What were they built with in mind?
GSM(global system for mobile communications) and
CDMA(Code Division Multiple Access)
-Voice communication
- 4 3G(1998)
- What could we also run
-increased data, GPS technolgy, and video
- 4 LTE(Long Term Evolution) (4G)
- What technology is it based on?
- What dowload speeds
- GSM and EDGE
- 150 megabits a second
- 4 LTE advance
- What download speeds?
-300 megabits a seond
- 5 What kind of pages are stored on the web server?
- What protocols does it use?
static, previously created
dynamic, when client requests them
-HTML, HTML5
2.5 IPP(Internet Printing Protocol)
(Line Printer Daemon, LPD)
2.5 Enterprise DHCP server
Multiple ones that handle DSP configuration for devices
- 5 DNS servers
- Where are they run at home?
- In enterprise?
- ISP(Internet service Provider)
- In the data center
2.5 proxy server
an intermediate server that sits between you and some other third party resource
- 5 proxy server steps
- (steps)
- What security functions does it perform?
- you access a server> proxy makes your request > proxy receives the response >proxy checks the info> sends info to your work station
- access control, malware scanning, and content filtering on the proxy server.
- 5 mail server
- What is it managed by?
where we would store any incoming mail and be able to send any outgoing mail.
-internet service provider(ISP) or your mail provider,
- 5 authentication server
- What kind of organization is it used in?
centralized repository of all of the authentication credentials for your organization.
-Enterprise
2.5 SIEM (security information and event management device)
It allows you to consolidate logs from all of these different services into one single database. This is commonly used by the security team to look for real time alerts and be able to look at trends over time, but it’s also consolidating logs from many different devices– your routers, your switches, your file servers, your DCP servers, and more. And you can usually perform some advanced reporting with all of this data that you’ve stored.
2.5 log files(SIEM)
-syslog
2.5 Write Once Read Many(WORM)
you’re able to write once onto optical drives, and no one is able to change that information once it’s been written.
2.5 IDS vs IPS
- IDS can see you’re able to see the particular exploit was attempted.
- IPS additional capability of blocking that particular event from occurring on the network
-
- 6 IPv6 configuration
- first half or the first 64 bits of the address
- And then the last 64 bits of the address
- the network prefix
- are the node or the network address of the device.
- 6 troubleshoot IP4/configure IP6 for workstation
- 4 things to configure
-IP address, subnet mask, default gateway, dns ip address
2.6 BOOTP(bootstrap protocol)
legacy protocol for IP address assignment
- 6 DHCP process to obtain IP address
- 1.When we first turn on our client workstation, it does not have an IP address, so __
- 2.This broadcast will make its way to every device on our local subnet ___
- 3.Those DHCP servers will examine the request. ___
- 4.Those broadcasts from both DHCP servers will be seen by the original client workstation.
- it’s going to send a broadcast out to UDP port 67 over the network.
- and it will eventually end up at the DHCP servers that have been configured on our network.
- And if they have an IP address that’s available, they will make an offer to this client workstation using a broadcast to UDP ports 68.
2.6 IP helper-address
(DHCP relay address)
This tells this router that if it ever sees any requests for DHCP, to also send them to this DHCP server that’s outside of our local subnet
- 6 DHCP known IP address
- 1.Now that it knows that an IP address is available, our client workstation
- 2.Once the DHCP server receives the address,
- 3.And at this point, the client workstation can configure itself with that IP address.
When multiple offers are made to a device, the device usually chooses the first offer that was received.
- can send a broadcast over UDP port 67 to request that IP address.
- it can send a formal acknowledgment to that address to the client workstation over UDP port 68.
2.6
On each of those DHCP servers, there was a pool of addresses configured.
- So any time a request was made for an IP address,
any random set of IP addresses that was available could be sent down to that client
2.6 Way to ensure an IP address is the same for devices
Disable DHCP
create an IP reservation on the DHCP server where you can associate the MAC address of this device to a specific IP address
- 6 APIPA address assignment
- before it puts that address onto your workstation, it sends
ARP(Address Resolution Protocol) frame out to the network to make sure that nobody else is using the IP address that it wants to assign to your workstation
2.6 IP6 link local addresses
fe80 and all 0’s
-Are the last 64 bits of an IP6 address always random?
automatically assigned to every IPv6-enabled device
-No, they can be converted from the device MAC address
- 6 SSL VPN
- What protocol? Hint: same protocol that we use to communicate securely to web servers
client-to-site VPNs, or remote access VPNs
- used for end user communication so that you can have a secure tunnel between your device and your corporate network
- TCP 443
- 6 VPN concentrator
- What happens after this information is sent back to your remote laptop?
decrypts your traffic and sends it to the corporate network.
-the traffic is encrypted by the concentrator and sent over and decrypted by your laptop
2.6 Group of devices that share the same broadcast domain(network)
LAN
2.6
We often maintain the separation between different local area networks
-for security reasons and to maintain the efficiency of the network.
- 6 VLAN switch
- Allows multiple
- A single switch that logically seperates networks into 2 pieces
- multiple VLANs to use one switch
2.7 Upload/Download speed (DSL)
52 megabits per second downstream and 16 megabits per second upstream
- 7 dial up
- speeds
- Where are they used?
using our existing analog voice telephone lines and sending data communication over that connection
- 56 kb-320 kb a second
- Enterprise environments
2.7 Increase in bandwidth
What are the effects?
more HD channel connectivity , send and transfer more different types of data to the cloud,enhanced capabilities with DVR and video capabilities
- 7 satellite networking
- Upload/download stream
This satellite networking allows us to communicate directly to a satellite, which then sends that data to a station down on earth and then reverses that to get the data back to us
-50 megabits per second down, three megabits per second upstream
2.7 Problems with satellite networking
-
High latency
-Heavy thunderstorm
2.7 signalling channel(D channel)
What’s it do?
-How many bits when working with BRI
sets up the connection, it tears down the connection, and sends any management information while the call is going on.
-16 kilobit per second channel
- 7 T1 and E1
- How many bearer channels does a T1 connect support?
- How many bearer channels does a E1 connect support?
- T1 connection supports 23 bearer channels and a signaling channel
- E1 supports 30 bearer channels, a signaling channel, and a separate alarm channel
- 7 common to see PRI used ___
- If you’re not converting over to voice over IP
as voice channels that are coming from your public switched telephone network,(local telephone network) nd connecting to a private branch exchange or a local phone system inside of your company.
-you may be using some of these legacy ISDN connections to provide all of your voice communication.
- 7 point-to-point serial connection(MPLS connections)
- What kind of network are they used to connect to?
- What kind of wiring?
- Wide Area Network(WAN)
- Copper or fiber
- 7 WMN(Wireless Mesh Network)
- Usually associated with
- What networking technologies can be part of it?
- mesh network comprised of wireless devices
- Internet of Things
- 802.11, Zigbee , Z-WAVE
2.8 cable crimper has a connector on the end, one that is a six-position, which is for ___
And one connector is an eight-position, which is used for crimping ___
- RJ11
- RJ45
- 8 What does a crimper do?(modular connector)
- crimper pushes in a piece of plastic that
take the copper that’s inside of that modular connector and push it through the insulation of that wire
- holds the cable in place
- 8 electrician scissors(cable snips)
- Another tool for working with different kinds of wiring and need a quick way to strip away coax or other types of wired connections.
-Wire stripper
- 8 inductive probe
- ____ that allows you to listen in to see if you can hear that tone coming through a cable.
it doesn’t have to physically touch the copper to be able to listen in to that audio that’s being placed by the tone generato
-Small speaker
2.8 time domain reflectometer
perform cross-talk analysis or frequency tests