2.0 Networking Flashcards
2.1
Transmission Control Protocol (TCP)
- What happens during a TCP session?
- What happens if packets are dropped?
A connection-oriented protocol that ensures(verifies) reliable delivery of data to the destination computer.
- every packet in a transmission is checked to be sure that it is delivered
- the receiving computer requests that they be resent.
2.1
UDP(User Datagram Protocol)
(hint: unprotected)
- What happens to packets that are dropped?
connectionless-protocol in which packets are not checked for accuracy of delivery
-The packets are not resent
2.1
Protocol
A set of rules used to enable communication between network devices.
2.1
FTP(File Transfer Protocol)
(Drinking age) and -1
-What port does it use?
Protocol that transfers data between computers to servers on a network
Ports 20 and 21
2.1
SSH(Secure Shell)
-What port(look at first 2 letters)
protocol for a remote terminal that works securely over the internet
Port 22
2.1
Telnet
-What port?
A protocol that enables a user to make a text-based connection to a remote computer or networking device
-Port 23
2.1
SMTP(Simple Mail Transfer Protocol)
(Samta)
-What port?
Used by your computer or other devices to send email
-Port 25
2.1
HTTP(Hypertext Transfer Protocol)
-What port?
application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems
-Port 80
2.1
HTTPS(Hypertext Transfer Protocol Secure)
(1 less than 444)
-What port?
network protocol that is often used for payment transactions on the Web and for sensitive transactions in corporate information systems.
Port 443.
2.1
IMAP4(Internet Message Access Protocol)
-What port?(think I and 4)
Used to retrieve email messages
Port 143
2.1
NetBIOS(NetBT)
a protocol that allows some legacy applications to work on larger networks and the Internet.
2.1
SLP(Service Location Protocol) (think LAN)
- Port (stoned + lucky)
- Ex:
(listens on networks broadcasting SSIDs)
- service discovery protocol that allows computers and other devices to find services in a LAN without prior configuration
- Runs on port 427
Ex: displays printers on a LAN
2.1
AFP(Apple Filing Protocol )
-What port?
- file management protocol that allows us to copy or move files, delete and make changes to the file system(Apple)
- Port 548
2.1
SMB(Server Message Block)
- Ex of this?(printing)
- What’s a port it shared with CIFS?
- Windows file sharing protocol that allows your devices to communicate with remote computers or servers.
- Allows you to print from your laptop to an office printer
- Port 445
2.1
CIFS(Common Internet File System)
-What’s a port it shared with SMB?
(Windows) Legacy protocol that allows for file sharing, printer sharing
-Port 445
2.1
RDP(Remote Desktop Protocol)(Windows)
(1/3 + Berlin fall)
-What port?
allows you to view and control someone else’s desktop while you’re sitting at your own desk by using the network
-RDP uses port 3389.
2.1
Dynamic Host Configuration Protocol
-What ports does it run on?
It automatically assigns an IP address to all devices on the network, dynamic addressing.
-UDP 67 and 68
2.1
SNMP(Simple Network Management Protocol)
-What ports are they used for?
management protocol used between devices to gather details, metrics, about how multiple devices are performing
-UDP 161 to query devices and 162 to receive alarms/traps from devices
2.1
LDAP(Lightweight Directory Access Protocol)
-Default port?
database of everybody who’s in your organization, and it makes it very easy to manage things from a central location
Ex: Active Directory
-TCP 389
2.3
port forwarding(tunneling)
(Destination NAT)?
-Ex:
Forwards visitors to a specific ip address and port within a LAN
- It changes the destination IP address for inbound traffic.
- IF any device accesses my external IP address over ports 8088,it will translate those ports to port 80 on the inside and send that traffic to 10.1.10.221.
2.3
port triggering
opens an outgoing port or range of ports on demand by a particular service, such as Internet Relay Chat (IRC).
-Port triggering can be used without being tied to a specific IP address.
2.1
Port
A number or range of numbers assigned to a particular connection session or connection type.
2.3
WEP(Wired Equivalent Privacy)
(used with older routers)
legacy encryption protocol
2.3
WPA(WiFi Protected Access)
wireless security standard that uses TKIP
2.3
TKIP(Temporal Key Integrity Protocol)
an encryption protocol used in the IEEE 802.11 wireless networking standard
2.3
WPA2(WiFi Protected Access version 2)
-How good?
Uses AES for encyption
-Best encryption
2.3
Advanced Encryption Standard (AES)
-You want to configure your wireless network to use __ encryption
A protocol that is similar to TKIP but more secure and that is used with the WPA2 wireless encryption standard.
-It uses a block size of 128 bits with variable key lengths up to 256 bits.
2.1
DNS(Domain Name System)
- What kind of addresses are usually assigned?
- What port?(2 quarters + dns initials)
It maps domain names to IP addresses
ex: 192.34.22.4 - bob.com
- Static
- UDP Port 53
2.6
domain name
A unique alphanumeric identifier for a website.
2.2
Router
-How does it determine where to forward it’s traffic
A networking device that routes internet packets(data) between LANs and WANs
-forwards traffic based on destination IP address
2.3
Firewall
- How do they filter traffic
- Common use for firewalls
A hardware appliance or software application that protects a computer from unwanted intrusion.
- Check UDP and TCP ports, and programs
- They are used as a routing device
2.2
patch panel
A box designed as a junction point for twisted pair (TP) cable and fiber cable used in networks.
2.6
NAT(Network address translation)
-Example of this when you want to access a website, and send your traffic to your router
translates(changes) one IP address to another.
-Your router takes the source IP(your pc) and translates it to an external address on public internet and sends it to that web server
2.6
DNAT(Destination network address translation)
provides port forwarding for incoming traffic.
2.3
DMZ(Demilitarized zone)
-Purpose?
allows people to access a device that would not allow them access to the internal network, and access these resources from the internet
-to add an additional layer of security to an organization’s local area network (LAN)
2.3
UPnP(Universal Plug and Play)
-How is this commonly used with SOHO routers?
(zero configuration)
allows network devices to automatically configure and find other network devices.
-other devices on your network can automatically configure your SOHO router and make changes to the configuration at any time.Ho
2.4
RFID(Radio-frequency identification)
-Example
small tags that we can put in anything that we’d like to track
-scan office badge
2.7
Fiber optic
-What kind of fiber?
network cable that uses glass fibers to transmit photons to carry data over long distances
2.8
cable stripper
A tool used to strip a portion of the plastic jacket off of a cable to expose the individual wires.
2.8
Cable Crimper
device that pinches the modular connector onto the end of the cable.
2.8
punchdown tool
creates the termination inside a patch panel.
2.8
Multimeter
-Great for performing continuity tests
A tool that can be used to test both coaxial and TP cabling and AC/DC voltage.
-Checking for an open or closed circuit
2.8
tone generator
- tone generator?
- Connections?
This allows you to follow or track where a wire is going from one end to the other by simply following a tone.
- plug it into the wire and it places an analog sound onto that wire.
- Can connect to many connections, like RJ11 or RJ45
2.8
cable tester
A tool that tests each wire in a cable and makes sure each one is wired properly.
2.8
loopback plug
-It’s also good for fooling ___
used to send traffic going out of a particular interface, loop them around, and send them back into that same interface
-different applications that are expecting to have an ethernet connection available
2.8
WPS(WiFi Protected Setup)
network security protocol for new users to set up their wifi
2.4
- 11a
- What frequency range?
- Megabits a second?
- 5ghz range
- 54 megabits a second
2.4
- 11b
- What frequency range?
- Megabits a second?
- 2.4 gigahertz range
- 11 megabits a second.
2.4
- 11g
- What frequency range?
- Megabits a second?
- 2.4 gigahertz range
- 54 megabits a second
2.4
- 11ac(MIMO)
- What frequency range?
- Megabits a second?
- 5 ghz
- 7 gigabits
2.4
- 11n(MIMO)
- What frequency range?
- Megabits a second?
- 5 and 2.4 ghz
- 600 megabits a second
2.7
line-of-sight wireless
- Where?
- Common LOS service(WiMAX)
wireless internet service that’s able to provide access over a very wide geographical area
- Used in MAN networks
- wireless high-speed internet connectivity
2.7
LAN( Local area network)
-How are devices connected to each other on a LAN
small network usually confined to a single building, although it could encompass more than just one building.
-Connected to each other by switches or hubs and use a router to reach other networks on a WAN
2.7
WAN( Wide area network)
-What onnections get sent to where?
Ex:
covers a large area and consists of many smaller networks usually connected to each other by public communication lines.
-A satellite
2.7
PAN(Personal area network)
Ex:
a small network a single user might connect for his own personal use, such as a PCmice, keyobards, and printers
-Bluetooth, NFC
2.7
MAN(Metropolitan Area Network)
- Who is it managed by?
- How is it usually connected(wiring)
is between a LAN and a WAN in size and complexity, and it might encompass an entire city.
- managed by one central network provider that’s in your area
- Ethernet
2.7
DSL(Digital Subscriber Line)
- What kind of bandwidth?
- Max range
carries voice and internet data over phone lines
- dedicated bandwidth
- 10,000 feet
2.7
Asymmetric Digital Subscriber Line (ADSL)
-How is it provided and used by who?
a form of DSL that enables faster downloads than uploads.
-Can be provided over high-quality existing phone lines and is well suited for residential and small business use.
2.7
Symmetric Digital Subscriber Line(SDSL)
-For who?
a type of DSL connection in which upload and download speeds are the same.
-SDSL connections are marketed to business rather than to home users and almost always require a newly installed circuit to the location and professional installation.
2.5
legacy system
An outdated operating system, programming language, application, or hardware.
2.5
embedded systems
Dedicated computing devices used for specific tasks such as machine control, point-of-sale systems, or ATMs. Embedded systems are often legacy systems.
2.6
subnet mask
An IPv4 network addressing feature used to specify how much of an IP address is the host address and what part is the extended network address.
2.6
VLAN(Virtual local area network)
VLANs allow us to take the hardware interfaces on a switch and separate them out into logical groups.
2.8
WiFi analyzer
A device or an app that detects which SSIDS are using which channels
-Monitors traffic and frequency on networks
2.3
NIC(network interface controller )
piece of hardware on a computer (or other device) for connecting to Ethernet network or multiple networks
2.2
Repeater
A device that resends a network signal to enable it to extend over longer cable or wireless distance than normal.
2.2
(ethernet) Hub
(dumb version of a switch)
information sent from one interface on this hub is automatically repeated to every other interface on this hub.
-It must split its available bandwidth among all the connected computers, which slows its communication speed.
2,2 hub half-duplex
two devices can’t communicate at the same time on a hub. Once one device is done, another device can then begin sending information.
2.2
(network )Switch
-MAC address(relation)
A network device that forwards and filters a path for data to run from one system to another
-it looks at the destination MAC address, and it sends that info to the appropriate interface on that switch
2.2 Managed switch
allow you to configure different VLANs on different interfaces
-You might also be able to connect switches together in a trunk.
- 2
(network) Bridge
- _____ by software
- Example of a bridge?
Similar to a switch, but connects less network subnets
- forwards decisions made by software
- WAP(Wireless Access Point)
2.2
Modem
- Demodulates _ into _
- Modulates _ into _
Demodulates(extracts) incoming analog signals into digital signals
Modulates(converts) outgoing digital signals into analog signals
2.2
Router
a network device that connects LAN to internet
2.2
cable modem
- What kidn of networks do they appear on?
- What kind of bandwidth?
allow you to connect to a broadband network
- home and corporate networks
- Shared bandwidth
2.2
DSL modem(Digital Subscriber Line modem)
-
A DSL modem connects to your computer through which of the following ports?
-A DSL modem connects to a computer via an RJ-45 (Ethernet) connector and port.
2.2
wireless access point (WAP)(bridge)
-What does it use to identify computers on a network?
a networking device that allow Wi-Fi devices to connect to a LAN/WAN
-MAC addresses of the destination
2.3
SOHO router (Small office/home office)
- What other services can it provide?
- What kind of server is it?
network device that supports functions of a data center but scaled down
- extensive network configuration options that include a DHCP, firewall, and wired/wireless security settings
- DHCP server
2.2
cloud-based controller
A virtual device that administrators can use to manage wireless LAN networks and branch offices that are located anywhere on the Internet from a central location.
2.7
Satellite
An Internet provider option that uses dish antennas similar to satellite TV antennas to receive and transmit signals between geosynchronous satellites and computers.
2.2
PoE( Power over Ethernet)
-Example of a device that a PoE can charge
allows us to power devices using our ethernet cables
-WAP
2.5
print server
software/hardware that act as a middleman between you and that printing device.
2.5
DHCP server
a server that automatically assigns(leases) an IP and subnet mask, default gateway and DNS server and is usually incorporated into a SOHO wireless router.
2.5
syslog server
A server that tracks events, such as user logins and crashes, that happen on devices on a network.
2.5
UTM(Unified threat management)
(web security gateway.
- capabities as a URL filter
- Network connectivity
- It might provide some type of content inspection from your users. It can look for malware going across your network, and it could stop spam from coming into your network.
- So it may have a wide area network CSU/DSU associated with it. And of course, it may have routing and switching technology as well. This could act as your firewall. It may include an IPS as part of its technology, and it might even be able to do bandwidth shaping and quality of service all from one single device.
2.5
IDS(Intrusion Detection System)
or
IPS(Intrusion Prevention System)
designed to look at traffic going through your network identify any known attacks that may be inside of that traffic and block or mitigate those attacks in some way
2.3
QoS(Quality of Service) configurations
(routers(
set priorities based on the type of application, the port numbers in use, IP addresses, and other settings.
2.5
endpoint management server
- What capabilties does it have for updating?
- What does it requiew you to install?
A server that tracks devices using the network and ensures that they comply with the security parameters of the network.
- Update an entire operating system
- An agent on everyones workstation
2.5
file server
Typically a computer with a single large drive or a RAID array for shared storage on a network.
NAS(Network attached storage)
a special kind of file server designed to store large amounts of data in a central location for users on a network.
2.8
Identify the tool in the following diagram and describe its use.
Wire stripper for removing the outer jacket from a cable.
2.1
Post Office Protocol
-What is it’s default port?
(look at the 0)
application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server.
-Port 110