2.0 Networking - sections 12, 13 Flashcards
DSL and ISP
(ISP)Internet Service Provider. (DSL)Dial-up internet oldest type of WAN(Wide Area Network).
Three types of Digital Subscriber Line(DSL)
Asymmetric DSL(ADSL), Symmetric DSL(SDSL), Very High Bit-rate DSL(VDSL).
Asymmetric DSL(ADSL)
Has different speeds of download and upload. Maximizes download - minimizes uploads.
Symmetric DSL(SDSL)
Has equal speeds of download and upload.
Very High Bit-Rate DSL(VDSL)
Has high speeds of download and upload. 50Mbps download, 10Mbps upload.
Fiber Connections
Fiber to the Curb(FTTC), Fiber To The Premises(FTTP).
Fiber to the Curb(FTTC)
Runs a fiber optic cable from an internet provider access point to curb.
Fiber To The Premises(FTTP)
Fiber Optic that connects directly to a building and connects to an optical network terminal(ONT: Physcial devices that convert optical signals to electrical signals)
What does the “G” in 5G mean
Refers to the generation of cellular technology being used.
What is LTE
Long-Term Evolution that came out with 4G, and has speeds of 100Mbps. Then came LTE-A speed was 1Gbps.
the three 5G bands
Low-band, Mid-band, High-band
Low-band 5G
Lowest 5G band, has longer range. 600-850 MHz, 30-250 Mbps.
Mid-band 5G
Most Common 5G band. 2.5-3.7GHz, 100-900Mbps.
High-band 5G
highest 5G band, 25-39 GHz, 1Gbps
WISP Connections
Uses microwave beams of radio waves in the microwave frequency range to transmit information between two fixed locations
Satellite Connections
A method of using communication satellites located in space to connect a user to the internet. Seen on rural homes in the country.
What is TCP/IP
Transmission Control Protocol/Internet Protocol. A set of standardized protocol/or layers used to interconnect network devices on the internet.
What are the TCP/IP protocols/layers
Link/Network Interface Layer, Internet Layer, Transport Layer, Application layer.
Link/Network Interface Layer of TCP/IP
Lowest layer of TCP/IP. Puts fames in the physical network’s transmission media. Data can only travel through the local area network.
Internet Layer of TCP/IP
Second Layer of TCP/IP. Used to address packets and route them access the network.
Transport Layer of TCP/IP
Third Layer of TCP/IP. Shows how to send the packets.
Application Layer of TCP/IP
Fourth and top layer of TCP/IP. Contains all the protocols that perform higher-level functions. And performs the function e.g. sending an email, file transfer.
The two types of Transport Lays in TCP/IP
Transmission Control Protocol(TCP)guaranteed delivery of data. User Datagram Protocol(UDP)connectionless protocol faster, data delivery not guaranteed.
IPv4
Internet Protocol Version 4(IPv4): IPv4 is the most common type of IP addressing used in our networks today, 4.2 billion addresses.
IPv4 classes
Highest amount of possible host to lowest. Classes A, B, C, D, and E.
Multicast Address IPv4
A logical Identifier for a group of hosts in a computer network.
Classful Mask
Default subnet mask for a given class of IP addresses.
255.255.255.0 for class C
CIDR
Classless Internet-Domain Routing(CIDR): Allows for borrowing some of the host bits and reassigning them to the network portion.
The Two Types of IPv4 Addresses
Public(Routable), Private(Non-Routable)
Public IPv4 addresses
Public(Routable) IPv4: Can be accessed over the internet and is assigned to the network by an internet service provider.
Private IPv4 addresses
Private(Non-Routable) IPv4: Can be used by anyone any time, but only within their own local area network. Start with 10, 172(172.16 - 172.31), 192
NAT
Network Addresssing Translation(NAT): Allows for routing of private IPs through a public IP.
Loopback IPS
Loopback: A specialized IP that creates a loopback to the host and is often used in troublshooting and testing network protocols on a system.
APIPA
Automatic Private IP Address(APIPA): Used when a device does not have a static IP address or cannot reach a DHCP server. Always starts with 169.254, range 169.254.0.0 to 169.254.255.255
Static Assignment of IPv4
Static Assignment: Manually type the IP address for the host, its subnet mask, default gateway, and DNS server. Is impratical to use on a large corporate/enterprise network.
Dynamic Assignment of IPv4
Dynamic Assignment: Dynamic allocation of IP addresses
Components of IPv4 assignment
IP address, subnet mask, default gateway(router), server address
DNS
Domain Name System: Converts the domain names used by websites to the IP address of its server. The internets verison of a phone book.
WINS
Windows Internet Name Service(WINS): Identifies NetBIOS systems on a TCP/IP network and converts those NetBIOS names to IP addresses.
The four methods of dynamic assignment
APIPA, BOOTP, DHCP, ZeroConf
BOOTP
Bootstrap Protocol(BOOTP): A type of dynamic IP assignment that dynamically assigns IP addresses and allows a workstation to load a copy of boot image to the network. Made in 1985
DHCP
Dynamic Host Configuration Protocol(DHCP): Assigns an IP based on an assignable scope of addresses and provides the ability to configure other options. Most common, modern verison of BOOTP. Addresses are given out and returned
APIPA
Automatic Private IP Addressing(APIPA): Used when a device does not have a static IP address or cannot reach a DHCP server.
ZeroConf
New technology that provides the same features as APIPA.
DHCP Scope
List of valid IP addresses available for assignment or lease to a client computer or endpoint device on a given subnet.
DHCP Reservation
Excludes some IP addresses from being handed to devices unless they meet a certain condition.
Four Steps of DHCP
D.O.R.A- Discover, Offer, Request, Acknowledge
What is FQDN
Fully-Qualifed Domain Name(FQDN): Domain name under a top-level provider.
DNS Hierarchy
Root, Top-level Domain, Second-level Domain, Subdomain, Host
What is URL
Uniform Resource Locater(URL): Contains the FQDN with the method of accessing information.
Types of TXT DNS records
Sender Policy Framework(SPF). DomainKeys Identified Mail(DKIM), Domain-based Message Authentication, Reporting & Conformance(DMARC)
Sender Policy Framework(SPF)
Sendering Policy Framework(SPF): DNS records that identifies the host authorized to send mail for the domain.
DomainKeys Identified Mail(DKIM)
DominKeys Identified Mail(DKIM): Provides the cryptographic authentication mechanism for mail using a public key published as a DNS record.
Domain-based Message Authentication, Reporting & Conformance(DMARC)
Domain-based Message Authentcation, Reporting & Conformance(DMARC): Framework that is used for proper application of SPF and DKIM, utilizing a policy that’s published as a DNS record.
Internal DNS
Allows cloud instances on the same network to access each other using internal DNS names.
External DNS
Records created around the domain names from a central authority and used on the public internet.
Time to Live(TTL) for DNS
Time to Live(TTL): Tells the DNS resolver how long to cache a query before requesting a new one.
DNS Resolver/DNS Cache
Makes a local copy of every DNS entry it resolves when connecting to websites
Recursive Lookup DNS
DNS server communicates with serveral other DNS servers to hunt down the IP address and return to the client.
Iterative Lookup for DNS
Each DNS Server responds directly to the client with an address for another DNS server that may have the correct IP address.
VLAN
Virtual Local Area Network(VLAN): Allows different logical networks to share the same physical hardware and provides added security and efficiency.
The two 4-byte identifiers for VLAN
Tag Protocol Identifier(TPI), Tag Control Identifier(TCI)
VPN
Virtual Private Network(VPN): Extends a private network across a public network and enables sending and receiving data across shared or public networks
VPN Configurations
Site to Site, Client to Site, Clientless
Site to Site VPN configure
Site to site: Used to connected offices together
Client to site VPN configure
Client to site: Used to connect remote users back to corportate network
Clientless VPN configure is used for what?
Used for web browsing
Full Tunnel VPN
Routes and encrypts all network requests through the VPN connection back to the headquarters. Less proformance, better security
Split Tunnel VPN
Routes and encrypts only the traffic bound for the headquarters over the VPN, and sends the rest of the traffic to the regular Internet. Less secure, better proformance.
Clientless VPN
Creates a secure remote-access VPN tunnel using a web browser without requiring a software or hardware client.
SSL
Secure Socket Layer(SSL): Provides cryptography and reliability using the upper layers of the OSI model(layers 5, 6, and 7).
TLS
Transport Layer Security(TLS): Provies secure web browsing over HTTPS.
IPv6
Internet Protocol version 6(IPv6): The next step in IP addresssing that greatly increases the number of unqiue IP address. Made to replace/supersede IPv4. Uses hexadecimal digits and allows the use of shorthand notation, 340 undecillion addresses
Benefits of IPv6
Larger address space, no broadcasts, more secure, no fragmentation, backwards compatible with IPv4, Simplified header
Address Exhaustion
Running out of network addresses in IPv4.
IPv5
Internet Protocol version 5(IPv5): Was experimental protocol but some of its concepts have been incorporated into IPv6. Never went into production.
Dual Stack protocol for IPv4, and 6
Simultaneously runs both the IPv4 and IPv6 protocols on the same network devices.
Tunneling
Allows an existing IPv4 router to carry IPv6 traffic. Where IPv6 is going to be tunneled over an IPv4 device.
The Three types of IPv6
Unicast, Multicast, Anycast
Multicast IPv6
Used to identify a set of interfaces and begins with FF.
Anycast
Used to identify a set of interfaces so that packet can be sent to any member of a set.
Unicast IPv6
Used to identify a single interface, two types Globally-routed, and Link-local.
Globally-routed IPv6
Type of unicast IPv6 addressing, similar to IPv4’s unicast class A, B, and C, addresses and begins with 2000-3999
Link-local IPv6
Used like a private IP in IPv4 that can only be used on the local area network and begins with FE80. That uses SLAAC.
SLAAC
Stateless Address Autoconfiguration(SLAAC): Eliminats the need to obtain addresses or other configuration information from a central server. That uses EUI-64
EUI-64
Extended Unique identifier(EUI): Allows a host to assign itself a unique 64-bit IPv6 interface identifier called EUI-64.
DHCPv6 Protocol
Allows DHCP to automatically assign addresses from a DHCPv6 server. Not commonly used/seen.
Neighbor Discovery Protocol(NDP):
Used to determine the layer 2 addresses that are on a given network.
TCP
Transmission Control Protocol(TCP): Connection-oriented protocol, which means it’s a reliable way to transport segments across the network.
UDP
User Datagram Protocol(UDP): Unreliable and it transmit segments called datagrams. Better used for audio and streaming. Connectionlesss
TCP protocol types(connection-oriented)
SSH, HTTP, HTTPS
UDP protocol types(connection-less)
Audio/Video streaming, DHCP, TFTP