All Course Flashcards
Application Layer (7th layer)
Interacts with application programs that incorporate a communication component such as your Internet
browser and email (provides user interface)
Bus Topology
The computers share the media (coaxial cable) for data transmission
CAT6 (category 6)
Twisted-pair cables capable of carrying up to 1000Mbps (1 gigabit) of data up to a length of 100
meters
Crossover
Transmit and receive signal pairs are crossed to properly align the transmit signal on one device with
the receive signal on the other device
CSMA/CD
Carrier sense multiple access with collision detection is the Ethernet LAN media-access method (used to
prevent collisions in wired Ethernet networks) Used in wireless networks for to reduce collisions.
Data Link Layer (2nd layer)
Layer of the OSI reference model that handles error recovery, flow control (synchronization), and
sequencing (controls which terminals are sending and receiving. Media access is controlled by the Data Link Layer
Deterministic
Access to the network is provided at fixed time intervals
Ethernet, Physical, Hardware, or Adapter Address
Other names for MAC address
Firewall Protection
Used to prevent unauthorized access to your network
Host Address
The portion of the IP address that defines the location of the networking device connected to the network;
also called the host address - Same as host number
Hotspots
A limited geographic area that provides wireless access for the public
Hub
Broadcasts the data it receives to all devices connected to its ports… it is possible for network devices to pick up a data intended for a different device… considered
a multiport repeater
IANA
The Internet Assigned Numbers Authority is the agency that assigns IP addresses to computer networks
ICMP
Internet Control Message Protocol (perform diagnostics, report errors, control the flow of data in
the network)
IEEE
Institute of Electrical and Electronics Engineers, one of the major standard-setting bodies for technological
development
Intranet
An internal network that provides file and resource sharing but ifs not accessed from the Internet
IP Address
Unique 32-bit address that identifies on which network the computer is located as well as
differentiates the computer from all other devices on the same network; they are logical addresses and can be found using the ipconfig/all command
IP Internetwork
A network that uses IP addressing for identifying devices connected to the network
ipconfig/all
Enables the MAC address information to be displayed
from the command prompt
ISP
Internet service provider
Link Integrity Test
Protocol used to verify that a communication link between two Ethernet devices has been established
Link Light
Indicates that the transmit and receive pairs are properly aligned
Link Pulses
Sent by each of the connected devices via the twisted- pair cables when data is not being transmitted to
indicate that the link is still up
Local Area Network (LAN)
Network of users that share computer resources in a limited area
MAC Address
A unique 6-byte address assigned by the vendor of the network interface card; A MAC address has two
portions. The OUI is comprised of the first 6 digits and the last half is assigned by the manufacturer.
Mbps
Megabits per second
Mesh Topology
All networking devices are directly connected to each other (fault tolerant; stations can still communicate if
some segments go down)
Multiport Repeater
Another name for a hub
Network Address Translation (NAT)
Translates the private IP address to a public address for routing over the Internet
Network Interface Card (NIC)
The electronic hardware used to interface the computer to the network
Network Layer (3rd layer)
Defines how data packets are routed in a network. Accepts outgoing messages and combines messages
or segments into packets, adding a header that includes routing information (provides a logical path for data)
Network Number
The portion of the IP address that defines which network the IP packet is originating from or being
delivered to
Organizationally Unique Identifier (OUI)
The first 3 bytes of the MAC address that identifies the manufacturer of the network hardware (ex. Network
interface card has MAC address of 00-00-86-15-7A, the OUI is 00-00-86).
OSI
Open system interconnect
OSI Model
The seven layers describing network functions
Overloading
Where NAT translates the home network’s private IP addresses to a single public IP address
Packet
Provides grouping of the information for transmission
Ping
Command used to test that a device on the network is reachable (If you can’t connect to a networked
computer, you can use the ping command to check connectivity) Used in windows in the command window
Port Address Translation (PAT)
A port number is tracked with the client computer’s private address when translating to a public address
Ports
The physical input/output interfaces to the networking hardware
Presentation Layer (6th layer)
Layer of the OSI reference model that accepts and structures the messages for the application
Private Addresses
IP addresses set aside for use in private intranets
Protocol
Set of rules established for users to exchange information
Range Extender
Device that relays the wireless signals from an access point or wireless router into areas with a weak signal
or no signal at all
RJ-45
The 8-pin modular connector used with CAT6/5e/5 cable
Service Set Identifier (SSID)
Name that is used to identify your wireless network and is used by your access point or wireless router to
establish and association
Session Layer (5th layer)
Layer of the OSI reference model that provides the control functions necessary to establish, manage, and terminate the connections (SQL and NFS technologies
are on the session layer)
SSID
Service set identifier
Star Topology
The most common networking topology in today’s LANs where all networking devices connect to a central
switch or hub, each device connects to a central point via a point-to-point link. Each device is connected to its own port
Stateful Packet Inspection (SPI)
Type of a firewall that inspects
6to4 Prefix
a technique that enables IPv6 hosts to communicate over the IPv4 Internet
Access Control Lists (ACLs)
A basic form of firewall protection
ACK
Acknowledgement packet
AES
Advanced Encryption Standard
AH
Authentication Header
Anycast Address
Is obtained from a list of addresses
ARIN
American Registry for Internet Numbers
ARP
Address Resolution Protocol, used to map and IP address to its MAC address (the destination gets the
sender’s addresses from the ARP request)
ARPAnet
Advanced Research Projects Agency network
Brute Force Attack
Attacker uses every possible combination of characters for the password
Buffer Overflow
Happens when a program tries to put more data into a buffer than it was configured to hold
CHAP
Challenge Handshake Authentication Protocol
CIDR
Classless interdomain routing
CIDR Block
The grouping of two or more class networks together; also called supernetting
Class A, B, C, D, and E
The five classes of IPv4
Classful
The IP and subnet addresses are within the same network
Connection-Oriented Protocol
Establishes a network connection, manages the delivery of data, and terminates the connection
Denial of Service (DoS)
A service is being denied to a computer, network or server
DES, 3DES
Data Encryption Standard, Triple Data Encryption Standard
Dictionary Attack
Uses known passwords and many variations (upper- and lowercase and combinations) to try to log in to
your account
Diffie-Hellman
Key generation algorithm
Directed Braoadcast
The broadcast is sent to a specific subnet
EAP
Extensible Authentication Protocol
ESP
Encapsulating Security Protocol
Firewall
Used in computer networks for protecting the network; Personal firewall software is typically based on basic packet filtering inspections where the firewall accepts or denies incoming network traffic based on information contained int he packet’s TCP or IP headers.
Full IPv6 Address
All 32 hexadecimal positions contain a value other than 0 (double colons, 32 hex characters, 128 bits)
GRE
Generic Routing Encapsulation
Hex
Hexadecimal, base 16
ICANN
The Internet Corporation of Assigned Names and Numbers
IGMP
Internet Group Message Protocol (Used for streaming media… data is passed through to the application layer
for immediate processing without error checking
IKE
Internet Key Exchange
Internet Layer
Defines the protocols used for addressing and routing data packets
IP (Internet Protocol)
Defines the addressing used to identify the source and destination addresses of data packets being delivered
over an IP network
IP Tunnel
An IP packet encapsulated in another IP packet (a secure VPN connection between two endpoints in
known as an IP Tunnel)
IPng
The next generation IP
IPsec
IP security is used to encrypt data between various networking devices (AES, ESP, and DES are security
protocols, not TKIP which is wireless protocol).
IPv4
The IP version currently being used on the Internet (Dotted decimal) Uses five classes of IP addresses, is
being replaced by IPv6. Made of up 4 bytes and octets. An octet is 8 bits. 4 make up 32 bits of an IP address.
IPv6
IP version 6 (unicast, multicast, and anycast all IPv6 addresses)
ISAKMP
Internet Security Association and Key Management Protocol
L2F
Layer 2 Forwarding
L2TP
Layer 2 Tunneling Protocol
Malware
Malicious programs
MD5
Message Digest 5
Multicast Address
Data packets sent to a multicast address are sent to the entire group of networking devices, such as a
group of routers running the same routing protocol
Multicasting
When one host sends data to many destination hosts
NCP
Network Control Protocol
netstat -a -b
(a) Command used to display the ports currently open on a Windows operating system and (b) used to display
the executable involved in creating the connection or listening port
Network Interface Layer
Defines how the host connects to the network
Non-Internet Routable IP Addresses
IP addresses not routed on the Internet
Packet Filtering
A limit is placed on the information that can enter the network
Packet Sniffing
A technique in which the contents of data packets are watched (assumes that the attacker can see the
network data packets; performed using a machine attached to the network)
PAP
Password Authentication Protocol
PPP
Point-to-Point Protocol (the de facto standard in dial- up VPNs)
PPTP
Point to Point Tunneling Protocol
Prefix length notation
Another shorthand technique for writing the subnet mask except class boundaries are not being crossed
Proxy Server
Clients go through a proxy to communicate with secure systems
RIRs
Regional Internet registries, IANA-designated governing organizations responsible for IP address
allocation by geographical location
SHA-1
Secure Hash Algorithm
Social Engineering
A way for an intruder to obtain enough information from people to gain access to the network
Spoof
Inserting a different IP address in place of an IP packet’s source address to make it appear that the
packet came from another network
Stateful Friewall
Keeps track of the data packet flow
Supernets
The grouping go two or more class networks together; also called CIDR blocks
Supernetting
Allows multiple networks to be specified by one subnet mask (allows the representation of multiple networks
with one address)
SYN
Synchronizing packet
SYN ACK
Synchronizing Acknowledgement packet
TCP
Transport Control Protocol (example of a connection- oriented protocol)
Transport Layer Protocols
Define the type of connection established between hosts and how acknowledgements are sent
UDP
User Datagram Protocol; UDP is a connectionless protocol that doesn’t use acknowledgements
Unicast Address
Used to identify a single network interface address, and data packets are sent directly to the computer with
the specified IPv6 address
Virus
A piece of malicious computer code that, when opened, can damage your hardware, software, or other
files
Well-known Ports
Ports reserved by ICANN
Worm
A type of virus that attacks computers, typically proliferates by itself, and can deny service to networks
10GBASE-T
10Gbps over twisted-pair copper cable (splits the data into 4 channels of 2.5G each) Uses multilevel encoding
to reduce required bandwidth for transmission
ACR
The attention-to-crosstalk ratio measurement compares the signal level from a transmitter at the far
end to the crosstalk measured at the near end. A larger ACR indicates that the cable has a greater data capacity and also indicates the cable’s ability to handle a greater bandwidth. Essentially, it is a combined measurement of the quality of the cable. A higher ACR value (dB) is desirable.
Alien Crosstalk (AXT)
Unwanted signal coupling from one permanent link to another
Attenuation (Insertion Loss)
The amount of loss in the signal strength as it propagates down a wire or fiber strand (leakage and
resistance cause attenuation in fiber optic systems).
Balanced mode
Neither wire in the wire pairs connects to ground
Bottlenecking
Another term for network congestion
Building Entrance
The point where the external cabling and wireless services interconnect with the internal building cabling
Campus Network
A collection of two or more interconnected LANs in a limited geographic area
CAT7/7a and CAT6a
UTP cable standards that support 10GB data rates for a length of 100 meters
Color Map
The specification of which wire color connects to which pin on the connector
Cross-connect
A space where you are going to take one or multiple cables and connect them to one or more cables or
equipment
Crossover Cable
Transmit and receiver wire pairs are crossed (transmit and receive wires crossed, don’t connect to the same
pins on each end)
Crosstalk
Signal coupling in a cable
Delay Skew
This is a measure of the difference in arrival time between the fastest and the slowest signal in a UTP
wire pair
EIA
Electronic Industries Alliance
EIA/TIA 568-B
The standard that defines the six subsystems of a structured cabling system
ELTCTL
Equal Level Transverse Conversion Transfer Loss
EMI
Electromagnetic Interference
Entrance Facilities (EF)
A room set aside for complex electronic equipement
Equal Level FEXT (ELFEXT)
This measurement differs from NEXT in that the measurement is for the far end of the cable. Additionally, the LFEXT measurement does not depend on the length of the cable. This is because ELFEXT is obtained by subtracting the attenuation value from the far-end crosstalk (FEXT!!) loss
Equipment Room (ER)/Backbone Cabling
Cabling that interconnects telecommunication closets in the same building and between buildings
F/UTP
Foil over twisted-pair cabling (better security, noise immunity for EMI) It minimizes signal leakage and
provides noise immunity from EMI
FastEthernet
An Ethernet system operating at 100MBps
Full Channel
Consists of all the link elements from the wall plate to the hub or switch
Full Duplex
Computer system can transmit and receive at the same time (full duplex gigabit Ethernet uses 4 pairs)
Gigabit Ethernet / twisted pair cables
1000Mbps Ethernet; CAT6 and CAT5e rated for 1000Mbps
Horizontal Cabling
Cabling that extends out from the telecommunications closet into the LAN work area
Horizontal Cross-connect (HC)
The connection between the building distributors and the horizontal cabling to the work area or workstation
outlet-another term used for the HC is the floor distributors (FD)
Hybrid Echo Cancellation Circuit
Removes the transmitted signal from the receive signal
IEEE 802.3an-2006 10GBASE-T
The standard for 10 Gbps