325 Flashcards
Client Server network
Form of internet network that consists of a single central computer functioning as a server and directing several other computers, referred to as clients
Peer-to-peer network
a group of computers or devices that share resources and access shared resources without centralized control.
Local Area Network types
Home/Residential, Soho Network, SME Network, Enterprise, Datacenter
Wide area network
a computer network in which the computers connected may be far apart, generally having a radius of half a mile or more.
Topology
The physical or logical structure of the network in terms of nodes
Types of network topology
Star, Mesh, Full Mesh, Partial Mesh
Star Topology
Each endpoint node is connected to a central forwarding appliance, such as a switch or router.
Mesh Topology
Requires that each device has a point to point link with every other device on the network
Full Mesh Network
Commonly used in WANs especially public networks.
Partial Mesh Network
Only most important devices interconnected in the mesh, perhaps with extra links for fault tolerance
Simplex
Sender can send the data but the sender unable receive the data
Full-duplex
Data is sent and received simultaneously. It is dual way communication where both directions of communication will happen at the same time.
Half-duplex
Data is sequentially sent and received. It is a bidirectional communication that is limited to only one sender or reciever at a time.
Logical topology
How data travels between nodes on a network. This topology emphasizes the data path that a message takes from one device to another, irrespective of the physical connections between them.
Addressing
Unique identifier for a network node, such as a MAC address, IPv4 address, or IPv6 address.
Encapsulation
A method by which protocols build data packets by adding headers and trailers to existing data.
Ethernet
System for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
Media access control
Layer that controls the hardware responsible for interaction with the wired (electrical or optical) or wireless transmission medium.
Collision domain
Network segment where simultaneous data transmissions collide with one another.
Carrier-sense multiple access with collision detection (CSMA/CD)
Ethernet protocol that uses carrier sensing to defer transmissions when a collision is detected.
The Protocol field in the IPv4 header
specifies the type of data encapsulated in the payload, allowing the receiving host to know how to process it
Three tier architecture
The core Server, distribution switches, and access switches which server users
Spine and leaf architechture
Two-layer architecture. Every leaf switch is connected to a spine switch in a full mesh topology. The leaf layer contains the access switches that connects to the servers and provide a connection for end users. Overcomes the limitations of three-layer hierarchical architecture
A hop
A packet passing through a router
Hop limit
“Time to live” for ipv6
default route
A route when no other route matches. Destination: 0.0.0.0/0
OSI Model
the Seven layers defined by the open systems interconnection reference model.
OSI Layers
“All People Seem To Need Data Processing” - Application, Presentation, Session, Transport, Network, Data Link, Physical.
Protocol Data Unit
Chunk of data with protocol-specific headers added at each OSI layer. The basic unit of exchange between entities that communicate using a specified networking protocol
Physical Layer
Responsible for transmission and reciept of signals that represent bits of data. Can be cabled or wireless
Data Link layer
Responsible for transferring data between nodes on the same logical segment.
Network Layer
Responsible for logical network addressing and forwarding, move data around an internetwork.
Transport Layer
Responsible for breaking upper-layer data into segments and ensuring reliable data control, error detection, and error correction.
Session Layer
Provides services for applications that need to exchange multiple messages (dialog control)
Presentation Layer
Transforms and translates data between the formats used by the network and applications, including data compression and encryption
Application Layer
Provides support to applications requiring network services (file transfer, printing, email, databases, and so on).
Bridge
Appliance or application that connects different networks as if they were one network
Router
Intermediate system working at the Network layer capable of forwarding packets around logical networks of different layer 1 and layer 2 types
Firewall
Software or hardware device that protects a network segment or individual host by filtering packets to an access control list.
Access Control List
Collection of ACEs that determines which subjects are allowed or denied access to the object or privileges.
Access Control Entry
A particular security identifier that is associated with Access rights.
Physical layer devices
Tranciever, Repeater, Hub, media converter.
Data Link layer devices
NIC, Bridge, Switch, Wireless Access Point, VLANs
Header fields added by the Data Link layer
Source Hardware address, Destination hardware Address, checksum for basic error checking
Network Layer Devices
Router
Functions of the Transport Layer
Data segmentation and reassembly, reliable message delivery, end to end flow control.
Transport Layer Devices
Multilayer Switches, Security Appliances, IDSs
Function of the Session Layer
The exchange of multiple messages between the client and server. This exchange is called a session or dialog.
Registered Jack
Series of jack/plug types used with twisted pair cabling, such as RJ45 and RJ11.
Shielded Twisted Pair
Copper twisted pair cabling with screening and shielding elements for individual wire pairs and/or the whole cable to reduce interference. Also referred to as a screened, shielded, or foiled twisted pair.
Digital Certificate
Identification and authentication information presented in the X.509 format and issued by a Certificate Authority
Certificate Authority
A server that guarantees subject identities by issuing signed digital certificate wrappers for their public keys.
Public Key
For Asymmetric encryption, is freely distributed and can be used to perform the reverse encryption ore decryption operation of the linked private key in the pair.
Network Time Protocol
Networking protocol for clock synchronization over packet-switched variable latency networks. Uses port 123.
Three types of Precision Time Protocols
Grandmaster is authoritative. Boundary has interfaces in PTP segments. Ordinary has a single interface.
Trunking
Connecting switches together
Port Bonding
Multiple ports are connected and perceived as a single whole by the switch
Port mirroring
Copies traffic from one interfaces
SPAN
Switch Port Analyzing Network
Ethernet frames payload
Frames support more than 1,500 bytes, up to 9216 in a jumbo frame
Jumbo Frames
Larger payload of an ethernet frame, and must be supported by the switch.
Ethernet flow control
As a non- deterministic form of communication, control is maintained by speed or IEEE.802.3x
Port Security
Prevents unauthorized use from a switch interface. Uses MAC addresses. Keeps a list of confirmed MAC sources.
Straight-through cables
Used for patch cables, and to connect workstations to network devices.
MDI
Media Dependant Interface
MDI-X
Media Dependant Crossover
10BASE-T and 100BASETX Straight Through cables
Won’t use pins 4,5,7,8. From the MDI, 1,2 are Transmitting. And 3,5 are receiving.
1000Base-T
For gigabyte cables, all four sets are transmitting and receiving data.
Ethernet crossover cables
For MDI to MDI, or MDI-X to MDI-X. Connects 1-3, 2-6, 3-1, 4-7, 5-8, 6-2, 7-4, 8-5
Auto-MDI-X
Automatically performs crossover on modern ethernet devices.
MIMO
Multiple Input Multiple Output
MU-MIMO
Multiple User MIMO
802.11A
5GHz MTT PS and total is 54 Mbit/s. No MIMO
802.11B
2.4GHz MTT PS and total is 11 Mbit/s. No MIMO
802.11G
2.4 GHz MTT PS and total is 54 MBits. No MIMO
802.11n
5GHz / 2.4 GHz and MTT PS is 150 MBits. Total is 600 MBits. 4xMIMO.
802.11ac
5GHz and MTT PS is 867 MBits, Total is 6.9 GBits. 8xDL MU-MIMO
802.11ax
5/2.4 GHz MTT PS is 1,201 MBits and total is 9.6 GBits. 8xDL and UL-MU-MIMO
Orthogonal Frequency-division multiple access
Similar to cellular communication, and improves high-density installations (OFDMA)
Channels
Groups of non overlapping frequencies numbered by the IEEE
Bandwidth
the width of a frequency defined in MHz. Defined by 802.11 standards
IBSS
Independent basic service set, ad hoc connection for temporary or long term communication
Physical network map
follows the physical wire and devices to simplify troubleshooting
Distribution frames
Passive cable termination, a series of punch down blocks or patch panels that can simplify network extensions or troubleshooting.
Main Distribution Frame
central hub of a network. Located at the primary entry point for internet connection, houses key equipment like routers, switches, and patch panels that manage and route the data to and from the external world to the internal network. Termination point for WAN links
Patch Panel
Allows for easy access and cable Identification,for troubleshooting and fault isolation in a server room.
Intermediate Distribution Frame
the IDF plays a supporting role to the MDF, acting as a relay point that extends the connectivity from the MDF to specific areas, floors, or sections of a building that the main distribution frame cannot reach directly due to distance limitations.
Severity levels
defined levels of events to force priority
Runt
frames that are less than 64 bytes
Giant frame
frames that are more than 1518
CRC error
failed the Frame Check sequence resulting from failed cable or port
Netflow
Gathers traffic statistics from all traffic flows, that is exported to a collector program
continuity of operations planning
The planing and coordination of performing essential functions during a range of emergencies
System Life Cycle
managing asset disposal, information disposal.
Standard operating procedures
Backup procedures that are planned for event outages
Password policy
Company policies regarding password setup, age, size, and lifecycle.
Remote access policy
External communications is difficult to control
Onboarding procedures
The process of integrating employees into an organization.
Offboarding procedures
The process of separating employees out of an organization.
Data Loss Prevention
involves multiple technologies that can catch sensitive data before it leaves the organization.
Fault Tolerance
Maintain uptime in the case of failure. It adds complexity. Single device fault tolerance is built on RAID, UPS, and NICs
redundant array of inexpensive disks
data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
Load balancer
a device with a Virtual IP, and connects users to servers as they are online
Port Aggregation
Multiple links to a single switch to use 2gigs from the connection.
Fire suppression
The amount of electronics used in a data center complicate fire suppression which uses and prefers modern liquids and gasses
Cold Site
no hardware, no data, no people