All concepts Flashcards
What port is for SSH?
22
What port is for DNS?
53
What port is for SMTP?
25
What port is for SFTP?
22
What port is for FTP?
20, 21
What port is for TFTP?
69
What port is for DHCP?
67, 68
What port is for HTTP?
80
What port is for HTTPS?
443
What port is for SNMP?
161
What port is for RDP?
3389
Share a desktop from a remote location over RDP.
Remote Desktop Services on many Windows.
What port is for NTP?
123
What port is for SIP?
5060, 5061
What port is for SMB?
445
What port is for POP?
110
What port is for IMAP?
343
What port is for LDAP?
389
What port is for LDAPS?
636
What port is for H.323?
1720
What is ICMP?
Internet Control Message Protocol (ICMP) is a network layer protocol used by network devices to communicate.
What is UDP?
User Datagram Protocol, or UDP, is a communication protocol used across the Internet for especially time-sensitive transmissions such as video playback
What is TCP?
Transmission Control Protocol a communications standard that enables application programs and computing devices to exchange messages over a network. It is designed to send packets across the internet and ensure the successful delivery of data and messages over networks.
What is IP?
IP network is a group of computers connected via their unique internet protocol (IP) addresses.
What is connection-oriented vs connectionless service?
Connection-oriented service involves the creation and termination of the connection for sending the data between two or more devices. In contrast, connectionless service does not require establishing any connection and termination process for transferring the data over a network.
What equipment is in and what is Layer 1 of OSI?
Data cables, cat6, etc.
Layer 1 is the first layer of the Open Systems Interconnect (OSI) Model. Layer 1 consists of the various networking hardware and transmission technologies being employed by networks.
What equipment is in and what is Layer 2 of OSI?
Switching, MAC addresses, etc.
Layer 2 refers to the second layer of the Open Systems Interconnection (OSI) Model, which is the data link layer. This is where data packets are encoded and decoded into actual bits. It is the protocol layer that enables the transfer of data between adjacent network nodes in a network segment, such as a local or wide area network
What equipment is in and what is Layer 3 of OSI?
IP Addresses, routing, etc.
Layer 3 refers to the third layer of the Open Systems Interconnection (OSI) Model, which is the network layer.
For IP addressing and routing.
Layer 3 is responsible for all packet forwarding between intermediate routers, as opposed to Layer 2 (the data link layer), which is responsible for media access control and flow control, as well as error checking of Layer 1 processes
What equipment is in and what is Layer 4 of OSI?
TCP/UDP.
Layer 4 refers to the fourth layer of the Open Systems Interconnection (OSI) Model, known as the transport layer.
It provides the transparent transmission or transfer of data between end systems or hosts and is responsible for end-to-end error recovery, as well as flow control.
As the name suggests, the transport layer ensures complete data transfers.
What equipment is in and what is Layer 5 of OSI?
Session Management.
Layer 5 refers to the fifth layer of the Open Systems Interconnect (OSI) Model, and is known as the session layer.
As the name suggests, this layer is dedicated to connection sessions and is the layer that establishes and manages the connections between two or more applications. Layer 5 coordinates, sets up and subsequently terminates communications between applications. The session layer is in charge of dealing with session connection and coordination
What equipment is in and what is Layer 6 of OSI?
WMV,JPEG, MOV, etc
Layer 6 refers to the sixth layer of the Open Systems Interconnect (OSI) Model and is known as the presentation layer.
Works with presentation components of applications like WMV, JPG, MOV, etc.
What equipment is in and what is Layer 7 of OSI?
HTTP, SMTP, etc.
Layer 7 refers to the seventh and topmost layer of the Open Systems Interconnect (OSI) Model known as the application layer.
This is the highest layer which supports end-user processes and applications. Layer 7 identifies the communicating parties and the quality of service between them, considers privacy and user authentication, as well as identifies any constraints on the data syntax. This layer is wholly application-specific
What is Broadcast Domains?
A broadcast domain is a collection of devices that receive broadcast traffic from each other.
What is CSMA/CD?
Short for carrier sense multiple access/collision detection, CSMA/CD is a MAC (media access control) protocol. It defines how network devices respond when two devices attempt to use a data channel simultaneously and encounter a data collision. The CSMA/CD rules define how long the device should wait if a collision occurs. The medium is often used by multiple data nodes, so each data node receives transmissions from each of the other nodes on the medium.
What is CSMA/CA?
Carrier-sense multiple access with collision avoidance (CSMA/CA) in computer networking, is a network multiple access method in which carrier sensing is used, but nodes attempt to avoid collisions by beginning transmission only after the channel is sensed to be “idle”. When they do transmit, nodes transmit their packet data in its entirety.
It is particularly important for wireless networks, where the collision detection of the alternative CSMA/CD is not possible due to wireless transmitters desensing their receivers during packet transmission.
What are collision domains?
A collision domain is a network segment connected by a shared medium or through repeaters where simultaneous data transmissions collide with one another.
What are protocol data units?
single unit of information transmitted among peer entities of a computer network. A PDU is composed of protocol-specific control information and user data. In the layered architectures of communication protocol stacks, each layer implements protocols tailored to the specific type or mode of data exchange.
What is MTU?
In computer networking, the maximum transmission unit (MTU) is the size of the largest protocol data unit (PDU) that can be communicated in a single network layer transaction.[1] The MTU relates to, but is not identical to the maximum frame size that can be transported on the data link layer, e.g. Ethernet frame.
What is Broadcasting?
In computer networking, telecommunication and information theory, broadcasting is a method of transferring a message to all recipients simultaneously. Broadcasting can be performed as a high-level operation in a program, for example, broadcasting in Message Passing Interface, or it may be a low-level networking operation, for example broadcasting on Ethernet.
What is Multi-casting?
In computer networking, multicast is group communication where data transmission is addressed to a group of destination computers simultaneously.
What is Unicast?
transmission of a data package or an audiovisual signal to a single recipient.
What are VLANs?
VLANs allow network administrators to automatically limit access to a specified group of users by dividing workstations into different isolated LAN segments. When users move their workstations, administrators don’t need to reconfigure the network or change VLAN group
What is trunking?
Trunking, a term frequently used in IT and telecommunications, refers to a network configuration that efficiently conveys data between multiple entities without using one-to-one links
What are tagging and untagging ports?
The purpose of a tagged or “trunked” port is to pass traffic for multiple VLAN’s, whereas an untagged or “access” port accepts traffic for only a single VLAN. Generally speaking, trunk ports will link switches, and access ports will link to end devices
What is port mirroring?
The concept behind port mirroring is quite simple. When you configure a switch, you reserve one port. Then you configure the switch to “mirror” all traffic that passes through to that reserved port. Whenever the switch processes a packet, it makes a copy and sends it to whatever is connected to the aforementioned port.
What is switching loops/spanning tree?
The Spanning Tree Protocol (STP) is responsible for identifying links in the network and shutting down the redundant ones, preventing possible network loops. In order to do so, all switches in the network exchange BPDU messages between them to agree upon the root bridge.
What are PoE and PoE+?
Defines what kind of power draw devices create, and what they actually require, and networks they can be on. On a PoE network, VOIP devices and wireless is supported. On a PoE+ network, Pan/Tilt/Zoom cameras, video IP phones, and alarm systems are supported.
What is a screened subnet?
A screened subnet (also known as a “triple-homed firewall”) is a network architecture that uses a single firewall with three network interfaces. The purpose is to protect a subnet from attacks by having three access “doors”.
What is the MAC address table?
The MAC address table is a way to map each port to a MAC address. This makes it efficient to forward traffic directly to a host. Without the MAC address table, traffic would be forwarded out each port, like a hub
What is an ARP table?
The ARP table is used to maintain a correlation between each MAC address and its corresponding IP address.
What are distance-vector routing protocols?
A simple routing protocol that uses distance or hop count as its primary metric for determining the best forwarding path. RIP, IGRP and EIGRP are examples.
What is RIP?
Router Information Protocol (RIP) uses a distance-vector algorithm to decide which path to put a packet on to get to its destination. Each RIP router maintains a routing table, which is a list of all the destinations the router knows how to reach. Each router broadcasts its entire routing table to its closest neighbors every 30 seconds
What is EIGRP?
EIGRP is a simple CISCO protocol to understand and deploy. It’s IPv6-ready, scales effectively in a well-designed network, and provides extremely quick convergence times.
What is OSPF?
The OSPF (Open Shortest Path First) protocol is used to distribute IP routing information throughout a single Autonomous System (AS) in an IP network.
What is BGP?
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information between autonomous systems (AS) on the Internet.
What is Static Routing?
Static routing is a form of routing that occurs when a router uses a manually-configured routing entry, rather than information from dynamic routing traffic.
What is Dynamic Routing?
Dynamic routing is a networking technique that provides optimal data routing. Unlike static routing, dynamic routing enables routers to select paths according to real-time logical network layout changes.
Dynamic routing uses multiple algorithms and protocols. The most popular are Routing Information Protocol (RIP) and Open Shortest Path First (OSPF).
Dynamic routing protocols allow routers to share information about the network with other routers to allow them to select the best path to reach a destination.
What is Default Routing?
A default route is the route that takes effect when no other route is available for an IP destination address.
What is IPv6 addressing?
numeric label that is used to identify and locate a network interface of a computer or a network node participating in an computer network using IPv6. IP addresses are included in the packet header to indicate the source and the destination of each packet. The IP address of the destination is used to make decisions about routing IP packets to other networks. Size is 128 bits.
What is Tunneling?
Tunneling is a way to move packets from one network to another. Tunneling works via encapsulation: wrapping a packet inside another packet.
What is Dual Stack?
Dual stack means that devices are able to run IPv4 and IPv6 in parallel. It allows hosts to simultaneously reach IPv4 and IPv6 content, so it offers a very flexible coexistence strategy.
What is Router Advertisement?
Router advertisements contain a list of subnet prefixes that is used to determine if a host is on the same link (on-link) as the router. The list of prefixes is also used for autonomous address configuration. Flags that are associated with the prefixes specify the intended uses of a particular prefix.
What is Neighbor Discovery?
Neighbor discovery functions are used by IPv6 nodes (hosts or routers) to discover the presence of other IPv6 nodes, to determine the link-layer addresses of nodes, to find routers that are capable of forwarding IPv6 packets, and to maintain a cache of active IPv6 neighbors.
What is Traffic Shaping?
Traffic shaping (also known as packet shaping) is bandwidth management technique that delays the flow of certain types of network packets in order to ensure network performance for higher priority applications. Traffic shaping essentially limits the amount of bandwidth that can be consumed by certain types of applications. It is primarily used to ensure a high quality of service for business-related network traffic.
What is QoS?
Quality of service is the description or measurement of the overall performance of a service, such as a telephony or computer network or a cloud computing service, particularly the performance seen by the users of the network.
What is Diffserv?
Way of classifying networks with Quality of Service (QoS).
What is CoS?
Class of Service (CoS) is a 3 bit field in an ethernet frame header when a VLAN tag is present. Quality of Service uses the CoS value to differentiate and police network traffic. This field specifies a priority value between 0 and 7, inclusive, that can be used by Quality of Service (QoS) to differentiate traffic.
What is NAT/PAT?
Network Address Translation (NAT) and Port Address Translation (PAT) are the protocols used to map the unregistered private (inside local) address of an internal network to a registered public (inside global) address of an external network before transferring the packet.
What is Port Forwarding?
In computer networking, port forwarding or port mapping is an application of network address translation that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall.
What is Access Control List?
In computer security, an access-control list is a list of permissions associated with a system resource. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Each entry in a typical ACL specifies a subject and an operation.
What is Distributed Switching?
A distribution switch is a distribution layer switch, which uplinks to upper layer core switch and links down to the access/edge switch.
What is Packet-Switched vs Circuit-Switched networks?
Packet-switched networks move data in separate, small blocks – packets – based on the destination address in each packet. When received, packets are reassembled in the proper sequence to make up the message. Circuit-switched networks require dedicated point-to-point connections during calls.
What is Software-Defined Networking?
Software-defined networking technology is an approach to network management that enables dynamic, programmatically efficient network configuration in order to improve network performance and monitoring, making it more like cloud computing than traditional network management.
What is Private vs Public networks?
A public network is a network to which anyone can connect. The best, and perhaps only pure, example of such a network is the Internet. A private network is any network to which access is restricted. A corporate network or a network in a school are examples of private networks
What are Loopback Reserved addresses?
Loopback addresses, enable the Server and Client processes on a single system to communicate with each other. When a process creates a packet with destination address as loopback address, the operating system loops it back to itself without having any interference of NIC. On such loopback reserved address is 127.0.0.1
What is Default Gateway?
A default gateway = that node that connects a network to the internet.
What is Virtual IP?
A virtual IP address is an IP address that doesn’t correspond to an actual physical network interface. Uses for VIPs include network address translation, fault-tolerance, and mobility.
What is Subnet Mask?
A subnet mask is used to divide an IP address into two parts. One part identifies the host (computer), the other part identifies the network to which it belongs.
What are Class A Subnets, and what is their range of IP addresses?
Class A addresses are for networks with large number of total hosts. Class A allows for 126 networks by using the first octet for the network ID. The first bit in this octet, is always zero. The remaining seven bits in this octet complete the network ID. The 24 bits in the remaining three octets represent the hosts ID and allows for approximately 17 million hosts per network. Class A network number values begin at 1 and end at 127.
Public IP Range: 1.0.0.0 to 127.0.0.0 First octet value range from 1 to 127 Private IP Range: 10.0.0.0 to 10.255.255.255 Subnet Mask: 255.0.0.0 (8 bits) Number of Networks: 126
What are Class B Subnets, and what is their range of IP addresses?
Class B addresses are for medium to large sized networks. Class B allows for 16,384 networks by using the first two octets for the network ID. The first two bits in the first octet are always 1 0. The remaining six bits, together with the second octet, complete the network ID. The 16 bits in the third and fourth octet represent host ID and allows for approximately 65,000 hosts per network. Class B network number values begin at 128 and end at 191.
Public IP Range: 128.0.0.0 to 191.255.0.0
First octet value range from 128 to 191
Private IP Range: 172.16.0.0 to 172.31.255.255
Subnet Mask: 255.255.0.0 (16 bits)
Number of Networks: 16,382
Number of Hosts per Network: 65,534
What are Class C Subnets, and what is their range of IP addresses?
Class C addresses are used in small local area networks (LANs). Class C allows for approximately 2 million networks by using the first three octets for the network ID. In a class C IP address, the first three bits of the first octet are always 1 1 0. And the remaining 21 bits of first three octets complete the network ID. The last octet (8 bits) represent the host ID and allows for 254 hosts per network. Class C network number values begins at 192 and end at 223.
Public IP Range: 192.0.0.0 to 223.255.255.0
First octet value range from 192 to 223
Private IP Range: 192.168.0.0 to 192.168.255.255
Special IP Range: 127.0.0.1 to 127.255.255.255
Subnet Mask: 255.255.255.0 (24 bits)
Number of Networks: 2,097,150
Number of Hosts per Network: 254
What are Class D Subnets, and what is their range of IP addresses?
Class D IP addresses are not allocated to hosts and are used for multicasting. Multicasting allows a single host to send a single stream of data to thousands of hosts across the Internet at the same time. It is often used for audio and video streaming, such as IP-based cable TV networks. Another example is the delivery of real-time stock market data from one source to many brokerage companies.
Range: 224.0.0.0 to 239.255.255.255
First octet value range from 224 to 239
Number of Networks: N/A
Number of Hosts per Network: Multicasting
What are Class E Subnets, and what is their range of IP addresses?
Class E IP addresses are not allocated to hosts and are not available for general use. These are reserved for research purposes.
Range: 240.0.0.0 to 255.255.255.255
First octet value range from 240 to 255
Number of Networks: N/A
Number of Hosts per Network: Research/Reserved/Experimental
What are Private IP Addresses? And what is the range of addresses in each class.
Within each network class, there are designated IP address that is reserved specifically for private/internal use only. This IP address cannot be used on Internet-facing devices as that are non-routable. For example, web servers and FTP servers must use non-private IP addresses. However, within your own home or business network, private IP addresses are assigned to your devices (such as workstations, printers, and file servers).
Class A Private Range: 10.0.0.0 to 10.255.255.255
Class B Private Range: 172.16.0.0 to 172.31.255.255
Class C Private Range: 192.168.0.0 to 192.168.255.255
What are Special IP Addresses?
IP Range: 127.0.0.1 to 127.255.255.255 are network testing addresses (also referred to as loop-back addresses). These are virtual IP address, in that they cannot be assigned to a device. Specifically, the IP 127.0.0.1 is often used to troubleshoot network connectivity issues using the ping command. Specifically, it tests a computer’s TCP/IP network software driver to ensure it is working properly.
What is VLSM?
Variable-Length Subnet Masking (VLSM) amounts to “subnetting subnets,” which means that VLSM allows network engineers to divide an IP address space into a hierarchy of subnets of different sizes, making it possible to create subnets with very different host counts without wasting large numbers of addresses.
What is CIDR notation (IP4 vs IPv6)?
CIDR notation is also used for the newer IPv6 standard, and the syntax is the same. The only difference is that IPv6 addresses may contain up to 128 bits instead of the 32-bit maximum of IPv4
What is DHCP?
The Dynamic Host Configuration Protocol is a network management protocol used on Internet Protocol networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client–server architecture
What is DHCPv6?
The Dynamic Host Configuration Protocol version 6 is a network protocol for configuring Internet Protocol version 6 hosts with IP addresses, IP prefixes and other configuration data required to operate in an IPv6 network. It is the IPv6 equivalent of the Dynamic Host Configuration Protocol for IPv4.
What are Static address assignments?
A static IP address is simply an address that doesn’t change. Once your device is assigned a static IP address, that number typically stays the same until the device is decommissioned or your network architecture changes. Static IP addresses generally are used by servers or other important equipment.
What is APIPA?
With Automatic Private IP Addressing (APIPA), DHCP clients automatically configure an IP address and subnet mask when a DHCP server is not available. The device chooses its own IP address in the range 169.254.
What is EUI64?
EUI-64 (Extended Unique Identifier) is a method we can use to automatically configure IPv6 host addresses. An IPv6 device will use the MAC address of its interface to generate a unique 64-bit interface ID. However, a MAC address is 48 bit and the interface ID is 64 bit.
What are IP Reservations?
When you use DHCP IP reservation, you’re telling your Wi-Fi network to assign the same IP address to a specific device whenever that device connects to your network.
What are Logical vs Physical topologies?
A logical topology is how devices appear connected to the user. A physical topology is how they are actually interconnected with wires and cables.
What is an Ad Hoc topology?
In Wireless Ad hoc network topology, devices are connected without using any additional network infrastructure devices like a wireless Access Point (AP). … In Wireless Ad hoc network topology, wireless capable devices communicate directly each other without using a wireless Access Point (AP).
What is an Infrastructure topology?
An infrastructure topology is used to extend a wired LAN to include wireless devices. In this topology the devices communicate with the wired LAN via base stations called an AP, which acts as a bridge between wired and wireless LANs (WLANs).
What is a LAN?
A local area network is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building. By contrast, a wide area network not only covers a larger geographic distance, but also generally involves leased telecommunication circuits.
What is a WLAN?
A wireless LAN is a wireless computer network that links two or more devices using wireless communication to form a local area network within a limited area such as a home, school, computer laboratory, campus, or office building.
What is a MAN?
A metropolitan area network is a computer network that interconnects users with computer resources in a geographic region of the size of a metropolitan area.
What is a WAN?
A wide area network (WAN) is a large network of information that is not tied to a single location.
What is a CAN?
A Controller Area Network (CAN bus) is a robust vehicle bus standard designed to allow microcontrollers and devices to communicate with each other’s applications without a host computer.
What is a SAN?
A storage area network or storage network is a computer network which provides access to consolidated, block-level data storage. SANs are primarily used to access data storage devices, such as disk arrays and tape libraries from servers so that the devices appear to the operating system as direct-attached storage.
What is a PAN?
A personal area network is a computer network for interconnecting electronic devices within an individual person’s workspace. A PAN provides data transmission among devices such as computers, smartphones, tablets and personal digital assistants.
What is the IoT Z-wave?
Z-Wave is a wireless communication protocol used primarily in smart home networks, allowing smart devices to connect and exchange control commands and data with each other.
What is IoT Ant+?
ANT+ takes benefits of low power and low cost transceiver devices available. It supports various network configurations such as peer to peer, tree, star, mesh topologies and network to network connections. It has fast over the air transfer rates. It has a master and slave components.
What is IoT Bluetooth?
It is a short-distance wireless network and the primary strength of Bluetooth is communication between devices such as smartphones or tablets and specific Bluetooth-enabled appliances.
What it NFC?
Near-Field Communication is a set of communication protocols for communication between two electronic devices over a distance of 4 cm or less. NFC offers a low-speed connection with simple setup that can be used to bootstrap more-capable wireless connections.
What is IR in networking?
IR wireless is the use of wireless technology in devices or systems that convey data through infrared (IR) radiation. Infrared is electromagnetic energy at a wavelength or wavelengths somewhat longer than those of red light. … IR wireless is used for short- and medium-range communications andcontrol.
What is RFID?
RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person.
What is 802.11?
IEEE 802.11 is part of the IEEE 802 set of local area network technical standards, and specifies the set of media access control and physical layer protocols for implementing wireless local area network computer communication
What is 802.11a frequency and speed?
5 GHz, maximum bandwidth of 54 Mbps
802.11a uses radio frequencies in the 5 GHz band and supports theoretical throughput of up to 54 Mbps
What is 802.11b?
2.4 GHz, maximum bandwidth of 11 Mbps
wireless networking specification that extends throughput up to 11 Mbit/s using the same 2.4 GHz band.
What is 802.11g?
2.4 GHz, maximum bandwidth of 54 Mbps
The standard has extended throughput to up to 54 Mbit/s using the same 20MHz bandwidth as 802.11b uses to achieve 11 Mbit/s.
What is 802.11n and what is the speed of it?
- 4GHz & 5 GHz, maximum bandwidth of 600 Mbps
- 11n is a wireless-networking standard that uses multiple antennas to increase data rates. It has a speed of 300 Mbps.
What speed is 802.11ac?
5 GHz, maximum bandwidth of 7 Gbps
802.11ac is a wireless networking standard in the 802.11 set of protocols, providing high-throughput wireless local area networks on the 5 GHz band. 5th generation of Wi-Fi.
What is GSM?
GSM (Global System for Mobile communication) is a digital mobile network that is widely used by mobile phone users in Europe and other parts of the world.
What is TDMA?
Time-division multiple access is a channel access method for shared-medium networks. It allows several users to share the same frequency channel by dividing the signal into different time slots. The users transmit in rapid succession, one after the other, each using its own time slot.
What is CDMA?
Code-division multiple access is a channel access method used by various radio communication technologies. CDMA is an example of multiple access, where several transmitters can send information simultaneously over a single communication channel. This allows several users to share a band of frequencies.
What is 2.4Ghz?
The 2.4 GHz band provides coverage at a longer range but transmits data at slower speeds.
What is 5 Ghz?
The 5 GHz band provides less coverage but transmits data at faster speeds
What are wireless speed and distance requirements?
The further you move from your router the lower your Wi-Fi signal and, accordingly, the lower your network’s speed.
Why do we care about Wireless Channel Bandwidth?
The channel bandwidth of a wireless signal determines that signal’s data rate. The higher the channel bandwidth, the faster the connection. … These routers have a higher number of streams for more bandwidth. More bandwidth means top speeds to every connected device.
What is wireless Channel Bonding?
Channel bonding is a practice commonly used in IEEE 802.11 implementations in which two adjacent channels within a given frequency band are combined to increase throughput between two or more wireless devices. Channel bonding is also known as Ethernet bonding, but it is used heavily in Wi-Fi implementations.
What is MIMO/MU-MIMO?
MU-MIMO stands for multi-user, multiple input, multiple output, and is wireless technology supported by routers and endpoint devices.
What is Unidirectional/Omnidirectional?
The Omni-Directional antenna emits a spherical shaped signal. This is much like a common light bulb in our homes. This makes the Omni-Directional antenna an ideal choice for many situations. It works great for vehicles on the move, such as campers, RVs, boats, semi-cabs, etc.
What are Site Surveys?
Site surveys are inspections of an area where work is proposed, to gather information for a design or an estimate to complete the initial tasks required for an outdoor activity. It can determine a precise location, access, best orientation for the site and the location of obstacles.
What is SaaS?
Software as a service is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. SaaS is also known as “on-demand software” and Web-based/Web-hosted software.
What is PaaS?
Platform as a service (PaaS) is a cloud computing model where a third-party provider delivers hardware and software tools to users over the internet.
What is IaaS?
Infrastructure-as-a-Service, commonly referred to as simply “IaaS,” is a form of cloud computing that delivers fundamental compute, network, and storage resources to consumers on-demand, over the internet, and on a pay-as-you-go basis.
What are private cloud delivery model?
A private cloud consists of cloud computing resources used exclusively by one business or organization. The private cloud can be physically located at your organization’s on-site datacenter, or it can be hosted by a third-party service provider.
What is a Public cloud delivery model?
The public cloud refers to the cloud computing model in which IT services are delivered via the internet. As the most popular model of cloud computing services, the public cloud offers vast choices in terms of solutions and computing resources to address the growing needs of organizations of all sizes and verticals.
What is a hybrid cloud delivery model?
A hybrid cloud is a type of cloud computing that combines on-premises infrastructure—or a private cloud—with a public cloud. Hybrid clouds allow data and apps to move between the two environments.
What are connectivity methods, in networking?
Dedicated network connections between two devices (that no other devices can share) are also called direct connections. Direct networks differ from peer-to-peer networks in that peer networks contain a larger number of devices, among which many point-to-point connections may be made.
What are security implications/considerations, in networking?
Data security consideration involves the protection of data against unauthorized access, modification, destruction, loss, disclosure or transfer whether accidental or intentional.
What is the relationship between local and cloud resources?
A cloud is a type of a server, which is remote (usually in Data Centers), meaning you access it via the internet. You are renting the server space, rather than owning the server. A local (regular) server is one that you do buy and own physically, as well as have on site with you.
What are A records in DNS?
The “A” stands for “address” and this is the most fundamental type of DNS record: it indicates the IP address of a given domain. For example, if you pull the DNS records of cloudflare.com, the A record currently returns an IP address of: 104.17. 210.9. A records only hold IPv4 addresses.
What are AAAA records in DNS?
AAAA records are DNS records that use an IP address to connect a domain to a website, and can be added to your domain at any time. They are similar to A records, but AAAA records point to 128–bit/IPv6 addresses, instead of the IPv4 addresses used by A records.
What are TXT records in DNS?
TXT records are a type of Domain Name System (DNS) record that contains text information for sources outside of your domain. You add these records to your domain settings. You can use TXT records for various purposes. Google uses them to verify domain ownership and to ensure email security.
What are SRV records in DNS?
The SRV record is a Domain Name System (DNS) resource record. It’s used to identify computers hosting specific services. SRV resource records are used to locate domain controllers for Active Directory.
What are MX records in DNS?
A DNS ‘mail exchange’ (MX) record directs email to a mail server. The MX record indicates how email messages should be routed in accordance with the Simple Mail Transfer Protocol (SMTP, the standard protocol for all email). Like CNAME records, an MX record must always point to another domain.
What are CNAME records in DNS?
A Canonical Name or CNAME record is a type of DNS record that maps an alias name to a true or canonical domain name. CNAME records are typically used to map a subdomain such as www or mail to the domain hosting that subdomain’s content.
What are NS records in DNS?
A DNS Name Server (NS) record specifies the domain name of the name server servicing a particular domain. For example, an NS record with a time-to-live (TTL) of 1100 seconds, and for the com domain serviced by the name server a.gtld-servers.net , would be defined as below: com.
What are PTR records in DNS?
A PTR (or Pointer) record is a security tool. Essentially, when you receive an email, your mail server uses the PTR record that comes in with the email message to check that the mail server sending the email matches the IP address that it claims to be using. This is also known as “reverse DNS lookup”.
What is the function of internal vs external DNS?
2 Answers. If you mean Internal as the DNS that may provide you firewall, it is your own DNS that is resolving (or forwarding requests) in your internal LAN. On the other side, the external DNS is the public DNS that resolves the domain request from internet.
What is a third-party/cloud-hosted DNS?
Third-party DNS servers are public DNS servers that are maintained by various operators around the globe, and represent an alternative to the DNS servers provided by our ISP (Internet Service Providers)
What is DNS hierarchy?
The DNS hierarchy, also called the domain name space, is an inverted tree structure, much like eDirectory. The DNS tree has a single domain at the top of the structure called the root domain. … Below the root domain are the top-level domains that divide the DNS hierarchy into segments.
What is a forward vs reverse zone in DNS?
You can use a Forward Lookup Zone to map a domain with its IP address. On the other hand, a Reverse Lookup Zone will map an IP address to its domain records. These may seem simple but are powerful tools to secure your network and to identify where visitors are coming from.
What are DHCP reservations?
DHCP Servers support something called a “DHCP Reservation”, which essentially allows you to provide a pre-set IP address to a specific client based on it’s physical MAC address. This means that the device will always get the same IP address and it will never change (whereas they typically do on occasion).
What are DHCP Pools?
The DHCP server maintains a pool of IP addresses and leases an address to any DHCP-enabled client when it starts up on the network. Because the IP addresses are dynamic (leased) rather than static (permanently assigned), addresses no longer in use are automatically returned to the pool for reallocation.
What are DHCP IP exclusions?
A DHCP exclusion range is a specified range of IP addresses residing within a DHCP range. … IP addresses residing within the exclusion range are excluded from the pool of available IP addresses and are un-leasable. The DHCP server is prevented from assigning IP addresses within the exclusion range to network devices.
What are DHCP Scope Options?
Scope options are used to set additional network information when a host is assigned an IP address. This can be used to set the default gateway, DNS server, local time server (NTP), and many others. … Options defined at the scope level will override options set at the DHCP server level.
What are DHCP Lease Times?
In short, DHCP Lease Time is the amount of time in minutes or seconds a network device can use an IP Address in a network. The IP Address is reserved for that device until the reservation expires. For computers and other network devices, to communicate on a network they need a unique IP Address.
What are DHCP relays/IP helpers?
A DHCP relay agent is a host or router that forwards DHCP packets between clients and servers. Network administrators can use the DHCP Relay service of the SD-WAN appliances to relay requests and replies between local DHCP Clients and a remote DHCP Server.
What is NTP?
The Network Time Protocol is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks.
What is IPAM?
IP address management is a methodology implemented in computer software for planning and managing the assignment and use of IP addresses and closely related resources of a computer network.
What is copper UTP?
Unshielded twisted pair (UTP) is a ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs). … There are benefits and tradeoffs to each type of cabling, but broadly speaking, most enterprises favor UTP cable due to its low cost and ease of installation.
What is copper STP?
(Shielded Twisted Pair)
In this case, each pair is covered by a conductive mesh which acts as a screen against interferences and electrical noise. Its impedance is 150 Ohm. The level of protection of the STP to external shocks is greater than the one offered by UTP.
What is copper coaxial?
Coaxial cable is a type of copper cable specially built with a metal shield and other components engineered to block signal interference. It is primarily used by cable TV companies to connect their satellite antenna facilities to customer homes and businesses.
What is Fiber single-mode?
In fiber-optic communication, a single-mode optical fiber is an optical fiber designed to carry only a single mode of light - the transverse mode.
What is Fiber multimode?
Multi-mode optical fiber is a type of optical fiber mostly used for communication over short distances, such as within a building or on a campus. Multi-mode links can be used for data rates up to 100 Gbit/s.
What is Plenum vs PVC?
PVC (Polyvinyl Chloride) is what your standard Category 5e and Category 6 cable jacket is constructed of. This PVC jacket when burning or smoldering releases hydrochloric acid and dioxin which are both toxic. Plenum cable is made of Teflon or FEP which gives off much less poisonous gas than PVC when it burns.
What is an RJ-45?
The eight-pin RJ45 connector is a standardised interface which often connects a computer to a local area network (LAN). This type of connector was originally developed for telephone communications but is now used in a range of applications. The abbreviation, RJ45, stands for Registered Jack-45
What is an RJ-23?
RJ21 uses a 25-pair (50-pin) miniature ribbon connector.
What is an BNC connector?
The BNC connector is a miniature quick connect/disconnect radio frequency connector used for coaxial cable.
what is a DB-9 connector?
The DB9 connector (originally named DE-9) is an analog socket, with 9 pins, from the D-Subminiatures (D-Sub) connector family. … The DB9 connector is mainly used in serial ports.
What is an DB-25 connector?
A DB25 connector is an established parallel port connection in computers often referred to as a printer port. These 25-pin d-subs offer rugged connections of peripherals and have excellent shock and vibration resistance.
What is an F-type connector?
A two-wire (signal and ground) coaxial cable connector used to connect antennas and set-top boxes to TVs, VCRs and DVDs. F connector cables typically carry analog NTSC TV signals, and the plug’s socket is easily identified by its threads. Plugs come threaded and unthreaded, both of which fit the threaded socket.
What is LC Fiber connector?
A miniaturized version of the fiber-optic SC connector. LC and SC optical connectors use a push-pull plug similar to audio and video plugs and sockets.
What is ST Fiber connector?
A fiber-optic cable connector that uses a bayonet plug and socket. It was the first de facto standard connector for most commercial wiring.
What is a SC APC connector?
The Subscription Channel (SC) Connector is known for its locking mechanism which gives an audible click when pushed in or pulled out. This push-pull design prevents rotational misalignment.
What is a SC UPC connector?
The SC/PC connector incorporates a Physical Contact (PC) curved polished ferrule end face that greatly reduces backreflection over a ferrule with flat endface.
What is MTRJ connector?
MTRJ is a Small Form Factor duplex connector. Meaning: It holds two fibers at the same time in a small body. Its body and ferrule are made of plastic and it has male and female versions that stay in place with metal pins.
What is SFP transceiver?
The small form-factor pluggable is a compact, hot-pluggable network interface module used for both telecommunication and data communications applications. An SFP interface on networking hardware is a modular slot for a media-specific transceiver in order to connect a fiber-optic cable or sometimes a copper cable.
What is a GBIC transceiver?
A gigabit interface converter (GBIC) is a transceiver that converts electric currents (digital highs and lows) to optical signals, and optical signals to digital electric currents. The GBIC is typically employed in fiber optic and Ethernet systems as an interface for high-speed networking.
What is a SFP+ transceiver?
The SFP+ (enhanced small form-factor pluggable) is an enhanced version of the SFP that supports data rates up to 16 Gbit/s.
What is a QSFP transceiver?
QSFP also called QSFP+, it stands for Quad (4-channel) Small Form-factor Pluggable Optics Transceiver. It is a compact, hot-pluggable fiber optical transceiver used for 40 Gigabit Ethernet (40GbE) data communications applications.
What are the characteristics of bidirectional fiber transceivers?
BiDi transceiver, also known as the bidirectional transceiver, usually consists of two different wavelengths to achieve transmission in both directions on just one fiber (single-mode or multi-mode). Unlike general optical transceivers which have two ports, BiDi transceivers have only one port.
What are the characteristics of duplex fiber transceivers?
Duplex fiber cable can be regarded as two simplex cables, either single mode or multimode, having their jackets conjoined by a strip of jacket material, usually in a zipcord (side-by-side) style. Use duplex multimode or singlemode fiber optic cable for applications that require simultaneous, bi-directional data transfer(
What are 66 block termination points?
A 66 block is a type of punchdown block used to connect sets of wires in a telephone system. … 66 blocks are designed to terminate 22 through 26 AWG solid copper wire
What are 110 block termination points?
A 110 block is a type of punch block used to terminate runs of on-premises wiring in a structured cabling system.
What is a patch panel termination point?
A patch panel is a piece of hardware with multiple ports that helps organize a group of cables. Each of these ports contains a wire that goes to a different location. Patch panels can be quite small, with just a few ports, or very large, with many hundreds of ports. They can also be set up for fiber optic cables, cat5 cables, RJ45 cables, and many others
What is a fiber distribution panel?
Fiber distribution panel, also known as fiber optic patch panel, is mainly used for accommodating fiber cable terminations, connections and patching.
What can a Cat 3 cable used for?
A Category 3 cable (Cat 3 cable) is a type of unshielded twisted pair (UTP) cable that is used for voice and data communications in computer and telecommunication networks.
What is a Cat 5 cable?
Category 5 cable (Cat 5) is a twisted pair cable for computer networks. Cat5 cable is able to support networks that are running at 10-100 megabits per second
What is a Cat 5e cable?
Cat5e cable is able to support networks that run up to 1 gigabit
What distance and speed are supported with a Cat 6 cable?
CAT6 cables support Gigabit Ethernet segments up to 55 m, but they also allow for use in 10-Gigabit networks over a limited distance.
What is a Cat 6a cable?
CAT6A cable allows for the transmission of up to 10Gbps and is fast becoming the cabling infrastructure of choice for VoIP, CCTV and data networks. Specified for use in Class Ea networks, CAT6A cable allows for extremely high data rate transmission of up 10Gbps and at a frequency of 500Mhz.
What is a Cat 7 cable?
A Category 7 cable, more commonly known as a CAT 7 or Cat-7 cable, is used for the cabling infrastructure of Gigabit Ethernet. A CAT 7 cable offers performance of up to 600MHz. Put simply, a CAT 7 cable is what we recommend you use when wiring your smart home!
What is a RG-6 cable?
The RG-6 is primarily used for cable and satellite signal transmission for residential or commercial installations. This coax cable is thin and easy to bend for wall or ceiling installations and remains the preferred choice to relay cable television signals.
What is a RG-59 cable?
Although RG59 can be used for cable TV applications (CATV), there is a significant amount of signal loss over higher frequencies when run at longer distances. RG59 is typically used to carry baseband video in CCTV applications . Today RG6 is the more commonly used RG-type.
What is wiring schematic for 568a?
Pin # Wire Color 1 White/Green 2 Green 3 White/Orange 4 Blue 5 White/Blue 6 Orange 7 White/Brown 8 Brown 568-A Color Code
What is the wiring schematic for 568b?
Pin # Wire Color 1 White/Orange 2 Orange 3 White/Green 4 Blue 5 White/Blue 6 Green 7 White/Brown 8 Brown 568-B Color Code
What is a crossover cable?
An Ethernet crossover cable is a crossover cable for Ethernet used to connect computing devices together directly. It is most often used to connect two devices of the same type, e.g. two computers or two switches to each other.
What is a straight-through cable?
Straight-through cable is used to connect computers and other end-user devices (e.g., printers) to networking devices such as hubs and switches. DCE to DTE: straight-through cable is used to connect a computer to a router DTE to DCE or vice versa devices have no cable crossover.
What speed is 100BaseT?
fast data transfer rates up to 100 Mbps.
What speed is 1000BaseT?
1000BASE-T is Gigabit Ethernet – 1 gigabit is 1,000 megabits per second (Mbps) on copper cables, using four pairs of Category 5 (Cat5) unshielded twisted pair (UTP) to achieve the gigabit data rate
What speed is 1000BaseLX?
1000Base-LX is a type of standard for implementing Gigabit Ethernet networks. The LX in 1000BaseLX stands for long, and it indicates that this version of Gigabit Ethernet is intended for use with long-wavelength transmissions over long cable runs of fiber-optic cabling.
What speed is 1000BaseSX, and what distance it can travel?
1000BASE-SX is a fiber optic Gigabit Ethernet standard for operation over multi-mode fiber using a 770 to 860 nanometer, near infrared (NIR) light wavelength. The standard specifies a distance capability between 220 meters and 550 meters.
What speed is 10GbaseT?
10 Gigabit Ethernet is a group of computer networking technologies for transmitting Ethernet frames at a rate of 10 gigabits per second.
Where is a Firewall installed?
Normally a firewall is installed where your internal network connects to the Internet. Although larger organizations may also place firewalls between different parts of their own network that require different levels of security, most firewalls screen traffic passing between an internal network and the Internet.
Where is the best placement for a router?
The ideal router position will be in a central location, rather than at one end of the home. Since routers broadcast in all directions, you’ll want to put it roughly in the middle of your home to get the best coverage and signal strength.
Where is a Switch installed?
Inside the network between the router and end nodes.
What is a Multilayer Switch?
A multilayer switch is a computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers.
What is a wireless controller?
A WLAN controller manages wireless network access points that allow wireless devices to connect to the network. … It takes the bandwidth coming from a router and stretches it so that many devices can go on the network from farther distances away.
What is a load balancer?
In computing, load balancing refers to the process of distributing a set of tasks over a set of resources, with the aim of making their overall processing more efficient. Load balancing can optimize the response time and avoid unevenly overloading some compute nodes while other compute nodes are left idle.
What is IDS/IPS?
IDS doesn’t alter the network packets in any way, whereas IPS prevents the packet from delivery based on the contents of the packet, much like how a firewall prevents traffic by IP address.
Intrusion Detection Systems (IDS): analyze and monitor network traffic for signs that indicate attackers are using a known cyberthreat to infiltrate or steal data from your network. IDS systems compare the current network activity to a known threat database to detect several kinds of behaviors like security policy violations, malware, and port scanners.
Intrusion Prevention Systems (IPS): live in the same area of the network as a firewall, between the outside world and the internal network. IPS proactively deny network traffic based on a security profile if that packet represents a known security threat.
What is a proxy server?
In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource.
What is a VPN concentrator?
A VPN concentrator is a type of networking device that provides secure creation of VPN connections and delivery of messages between VPN nodes. It is a type of router device, built specifically for creating and managing VPN communication infrastructures.
What is an AAA/RADIUS server?
The AAA server is a network server that is used for access control. Authentication identifies the user. Authorization implements policies that determine which resources and services an authenticated user may access. Accounting keeps track of time and data resources that are used for billing and analysis.
What is a UTM appliance?
Unified threat management, commonly abbreviated as UTM, is an information security term that refers to a single security solution, and usually a single security appliance, that provides multiple security functions at a single point on the network.
What is NGFW/Layer 7 firewall?
An NGFW inspects Layer 7 traffic and identifies what ports the application packets should be connecting from and if those don’t match, the NGFW can block the packets.
What is VoIP PBX?
An IP PBX is a system that connects telephone extensions to the public switched telephone network and provides internal communication for a business.
An IP PBX is a PBX system with IP connectivity and may provide additional audio, video, or instant messaging communication utilizing the TCP/IP protocol stack.
What is VoIP gateway?
A VoIP gateway is a gateway device that uses Internet Protocols to transmit and receive voice communications.
The general term is ambiguous and can mean many different things. There are many such devices. They are quickly becoming the most common type of voice phone service in many areas.
What is a content filter?
A program residing on a web browser or server that limits the information that can be viewed by the end user.
What is a virtual switch?
A virtual switch (vSwitch) is a software application that allows communication between virtual machines. A vSwitch does more than just forward data packets, it intelligently directs the communication on a network by checking data packets before moving them to a destination.
Virtual switches are usually embedded into installed software, but they may also be included in a server’s hardware as part of its firmware. A virtual switch is completely virtual and can connect to a network interface card (NIC).
What is a virtual firewall?
A virtual firewall is a network firewall service or appliance running entirely within a virtualized environment and which provides the usual packet filtering and monitoring provided via a physical network firewall.
What is a virtual NIC?
A virtual network interface is an abstract virtualized representation of a computer network interface that may or may not correspond directly to a network interface controller.
What is a virtual router?
Virtual router is a software-based routing framework that allows the host machine to perform as a typical hardware router over a local area network.
A virtual router can enable a computer/server to have the abilities of a full-fledged router by performing the network and packet routing functionality of the router via a software application. Virtual Router Redundancy Protocol (VRRP) may implement virtual routers to increase the reliability of the network. This is done by advertising a virtual router as the default gateway, backed by a group of physical routers.
What is a hypervisor?
A hypervisor is a kind of emulator; it is computer software, firmware or hardware that creates and runs virtual machines. A computer on which a hypervisor runs one or more virtual machines is called a host machine, and each virtual machine is called a guest machine
What is NAS network storage?
Network-attached storage is a file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients. NAS is specialized for serving files either by its hardware, software, or configuration.
What is SAN network storage?
A SAN (storage area network) is a network of storage devices that can be accessed by multiple servers or computers, providing a shared pool of storage space.
What is a FCoE connector type?
FCoE uses a lossless Ethernet fabric and its own frame format. It retains Fibre Channel’s device communications but substitutes high-speed Ethernet links for Fibre Channel links between devices. It facilitates in Layer 2
What is a fiber channel? And what is the speed of it?
Fibre Channel is a high-speed data transfer protocol that provides in-order, lossless delivery of raw block data. It is designed to connect general purpose computers, mainframes and supercomputers to storage devices. Offers connectivity up to up to 32 Gbps
What is ISCSI?
In computing, iSCSI is an acronym for Internet Small Computer Systems Interface, an Internet Protocol-based storage networking standard for linking data storage facilities. It provides block-level access to storage devices by carrying SCSI commands over a TCP/IP network.
What is Infiniband?
InfiniBand is a computer-networking communications standard used in high-performance computing that features very high throughput and very low latency. It is used for data interconnect both among and within computers. Offers connectivity of up to 200 Gbps
What is a jumbo frame?
In computer networking, jumbo frames are Ethernet frames with more than 1500 bytes of payload, the limit set by the IEEE 802.3 standard. Commonly, jumbo frames can carry up to 9000 bytes of payload, but smaller and larger variations exist and some care must be taken using the term.