AP Cyber Security - Chapter 2 Flashcards
UDP
User Datagram Protocol
What is UDP?
Transmission Protocol
Doesn’t acknowledge transmitted packets
Doesn’t allow for retransmission of lost packets
Faster than TCP
Less accurate than TCP
Packets aren’t guaranteed to arrive
(FLP)
TCP
Transmission Control Protocol
What is TCP?
Ensures accurate delivery of network communications between two hosts
What does TCP provide to ensure message delivery?
Sequencing of data packets
Flow control
Error checking
Retransmission of lost packets
Topology
Expresses how a network’s nodes are arranged and connected
Physical Topology
How a network’s devices are physically connected
Logical Topology
How data travels within the physical topology
Mesh Topology
Each node is connected directly to each other
Used in wireless and very large networks
Ring Topology
Nodes are connected in a circular chain that loops back to the originating node
Used in wide area networks (WANs)
Star Topology
Each node is connected indirectly to every other node through a central network device, typically a network switch
Very common in modern computer networks
Bus Topology
All nodes are connected to a single medium that transmits data
Outdated, but still used in modern cars and boats
Hybrid Topology
Created when two or more network topologies are joined together
IPv4
Consists of 32 bits that are typically grouped into four octets (group of eight bits)
Typically written in dotted decimal format, where four decimal numbers are period-separated.
IPV6
Consists of 128 bits that are typically grouped as 8 hextets (groups of 16 bits) written with hexadecimal digits separated by colons.
ALSO: An IPv6 address can be abbreviated with a double colon
IP is the abbreviation for?
Internet Protocol
What do we use an IP address for?
Connecting to different networks
Where would the IP address be found in the OSI model?
Network Layer
Where would the IP address be found in the TCP/IP model?
Internet Layer
What does MAC stand for?
Media Access Control
What is MAC referred to as?
Physical address, burned-in address, hardware address, or an ethernet address
MAC address
A unique 48-bit number that is used to identify an Ethernet host within a LAN.
Each MAC address is assigned to the NIC by the manufacturer
How are MAC addresses written?
MAC addresses are typically written as six pairs of hexadecimal numbers separated by hyphens or colons.
Mesh Topology
Advantages and Disadvantages
Advantages -
Redundant and Resilient
Can support high volumes of traffic
Disadvantages -
Most expensive
Complex to administer
May be overkill (unused connections)
Ring Topology
Advantages and Disadvantages
Advantages -
Simpler and less expensive than star and mesh
Easy to troubleshoot
Disadvantages -
Traffic goes in one direction so a single node may cause a network failure
Data may travel through nodes that are not intended
Star Topology
Advantages and Disadvantages
Advantages -
Less expensive to set up than mesh
Troubleshooting is easier
Traffic is easier to analyze
Easy to scale
Nodes only recieve data intented for them
Disadvantages -
Central device is a single point of failure
Bus Topology
Advantages and Disadvantages
Advantages -
Simplest and least expensive
Disadvantages -
Can’t handle a large number of nodes
Difficult to troubleshoot
Less secure