Block 4 Networking Flashcards
Hub
Operates at the physical layer and does not separate collision domains
Repeater
Operates at the physical layer and boosts signals, twisted pair max length of 100m
Modem
Operates at the physical layer and converts from analog to digital
Media converter
Operates at the physical layer and allows connection between different media types
NIC
Network Interface Controller, allows physical and data link layer connections
Bridge
Operates in the data link layer, reduces amount of traffic on a LAN by dividing collision domains
Switch
Operates at the data link layer, each port is a collision domain
Wireless access point
Allows wireless access to wired network
Router
Operates at the network layer, connects two or more networks by forwarding packets between them, breaks up broadcast domains
How do routers select the best path for network packets
Using it’s routing table
Firewall
Operates between the network and transport layers, allows monitoring and control of network traffic
How do firewalls work?
They act on pre-determined rules to enable a barrier between trusted and untrusted connections and devices
What are the layers in the OSI model?
Physical, Data Link, Network, Transport, Session, Presentation, Application
What are the layers in the old TCP/IP Model?
Link, Internet, Transport, Application
What are the layers in the new TCP/IP model?
Physical, Data Link, Network, Transport, Application
What is the PDU of the application layer?
Data
What is the PDU of the transport layer?
Segment (TCP), Datagram (UDP)
What is the PDU of the network layer?
Packet or IP Datagram
What is the PDU of the data link layer?
Frame
What is the PDU of the physical layer?
Bit
What are some application layer protocols and services?
HTTP/S, POP3, SMTP, DNS, FTP, Telnet, SSH
What are some transport layer protocols and services?
TCP, UDP
What are some network layer protocols and services?
IP, ARP, ICMP, IPv4/Ipv6
What are some application/presentation/session layer devices?
Clients, servers, application layer security appliances
What devices operates between the transport and network layers?
Firewall
What are some network layer devices?
Router, multilayer switch
What are some data link layer devices?
Switch, bridge, wireless AP
What device operates between the data link and physical layer?
The NIC (Network Interface Controller)
What are some physical layer devices?
Hub, modem, repeater, cables, media converters
What are the different network topologies?
Bus, ring, star, mesh, hybrid
In a bus topology how many nodes will a failure affect?
All of them
Are rings unidirectional or bidirectional?
They can be both but if it’s unidirectional a secondary link is needed for redundancy
What two devices can be used to set up a star topology?
Switch and hub
If a star topology is set up using a switch it’s a logical what?
Star
If a star topology is set up using a hub it’s a logical what?
Bus
What are the advantages of a mesh topology?
Extremely reliable, provides redundancy and fault tolerance between devices
What are the disadvantages of a mesh topology?
High administrative overhead, full mesh requires exponentially more cabling
What are the advantages of a hybrid topology?
Flexible, reliable, increased fault tolerance, easy to expand, network faults can be easily diagnosed and corrected without affecting the rest of the network
What are the disadvantages of a hybrid topology?
Difficult to manage and expensive
Circuit-Switched Network
A sequence of links between two nodes is determined ahead of the actual communication, data is sent as a stream of bits
Packet Switched Network
Routers determine packet addressing, processes digital signals and routes information through multiple pathways
In which type of network does each data unit know the entire path address which is provided by the source?
Circuit switched
Resource reservation is a feature of what type of network?
Circuit switched
In which type of network does each data unit know only the final destination address and the path is determined by routers?
Packet switched
Virtual Circuit
The process of providing a connection oriented service between two hosts over a packet-switched network (TCP)
Supernetting
Routing protocols can summarize address of several networks into one
What are some advantages of supernetting?
Shrinks the routing table, improvers routing performance, quicker to send
Discontiguous Network
Two networks of the same classful networks are separated by a different network address
What is a limitation of older routing protocols?
The do not support discontiguous networks
What are the steps in Variable Length Subnet Masks (VLSM)?
- Order host requirements from largest to smallest
- Determine number of host bits needed
- Create smallest subnet needed for that host requirement
- Continue until all host requirements are met
What are some features of IPv4 that don’t exist in IPv6?
Subnet masks, network address, and broadcast address
What are the first 48 bits of an IPv6 address reserved for?
Networking/routing (usually from ISP)
What are bits 49-64 of an IPv6 address used for?
Subnets
What are the last 64 bits of an IPv6 address used for?
Hosts
In IPv6 once you determine the number of subnet bits you need what number do you add that to to get the mask?
48
Who developed the TCP/IP network model?
Defense Advanced Research Project Agency (DARPA)
Who developed the Open Systems Interconnect (OSI) model?
The International Organization for Standardization (ISO)
When was the TCP/IP model adopted?
The 1990s
Who developed the TCP/IP model?
It was a DoD led effort
What does TCP/IP use to define standardization protocols?
Request for Comments (RFC)
What is a Protocol Data Unit (PDU)?
Its a generic term for a unit of information being transmitted at a specific layer
What do application layer protocols do?
Provide services to the application software running on a computer, defines how programs interface with transport layer, functions include identifying communication partners, determining resource availability, and synchronizing communication
What is the DHCP protocol used for?
Assigning IP addresses
What ports does DHCP usually use?
UDP port 67 (client to server, broadcast)
UDP port 68 (server to client, unicast)
What will the server assign in DHCP?
IP address, lease, subnet mask, default gateway and possibly other options
DHCP uses what process?
Discover, Offer, Request, Acknowledge (DORA)
What is the Discover step in the DORA process?
Sent by the DHCP client to find a DHCP server (broadcast)
What is the Offer step in the DORA process?
Sent by the DHCP server to offer IP address and other parameters (unicast)
How do DHCP servers detect conflicts?
By using pings. They ping the address and if someone is using it the server receives a response
What is the Request step in the DORA process?
Reply from a client to the server accepting the offer. Contains server ID option so all DHCP servers know an offer was accepted (broadcast)
What is the Acknowledge step in the DORA process?
Sent by the DHCP server to acknowledge final phase and deliver DHCP lease information (unicast). Client will ARP new IP to verify it doesn’t overlap another
DNS
- TCP/UDP - port 53
- Hierarchical naming system
- Translates domain names into IP addresses
True/False DNS is a world wide service?
True
HTTP
- TCP 80 [8008, 8080]
- Protocol for the internet
- Request/response
- In between client and server may be several intermediaries
What does HTTP use for reliability?
TCP
How are servers identified in http?
URIs and URLs
HTTPS
- TCP 443
- URI/URL scheme used to indicate a secure HTTP connection
- Encrypts with digital certificate
- If NTP is not synchronized cert signing can fail
- Self signed certs provide confidentiality but don’t confirm identity
File Transfer Protocol (FTP)
- Default data TCP 20
- Control TCP 21
- Does not encrypt or protect data in transit
- Does not guarantee identity of sender or receiver
- Does provide authentication options
TFTP
- UDP port 69
- Very basic form of FTP
- Can only read and write files (or mail) from/to server
- No provisions for user authentication
- Typically used for storage and retrieval of Cisco IOS and Catalyst switch configuration files
TELNET
- Used for remote terminal connection
- TCP port 23
- Non secure
SSH
- Used for remote terminal connection
- TCP port 22
- Encrypted remote access
NTP
- UDP port 123
- Synchronize computer clock times in a network
- can use radio and satellite systems
Transport Layer Services
Provides services to higher layer protocols and communication session management between hosts
What are the transport layer services?
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
What is the difference between TCP and UDP?
Stateful vs Stateless or Connection Oriented vs Connectionless
What are the two functions of TCP?
- Flow control provided by sliding windows
- Reliability provided by sequence numbers and acknowledgments
What does TCP guarantee?
- Delivery of data
- Guarantees packets will be delivered in the same order in which they were sent
What are some features of TCP?
- Breaks messages into segments
- Resends anything that is not received
- Reassembles messages from the segments
- TCP supplies a virtual circuit between end-user applications
What are the first 16 bits of a TCP header?
Source port
What are bits 16 to 31 of a TCP header?
Destination port
What are bits 32 to 63 or a TCP header?
Sequence number
What are bits 64 to 95 of a TCP header?
Acknowledgment number
What are bits 112 to 127 of a TCP header?
Window size
What are bits 128 to 143 of a TCP header?
Checksum
How does TCP synchronize?
- Initial Sequence Numbers (ISN)
- SYN (for synchronize) control bit
- ACK (for acknowledge) control bit
- Three was handshake
TCP Window Size
- Flow control mechanism
- # of messages transmitted before ack needed
- More efficient use of bandwidth
User Datagram Protocol (UDP)
Message based connectionless protocol, non-guaranteed datagram delivery
What is the UDP header length?
64
What are the first 16 bits of the UDP header?
Source port
What are bits 16 to 31 of the UDP header?
Destination port
What are bits 32 to 47 of the UDP header?
Length
What are bits 48 to 63 of a UDP header?
Checksum
What must be depended on for reliability when using UDP?
Upper layer protocols
What are some protocols that use UDP?
TFTP, SNMP, DNS client requests
What allows multiple programs to share one connection simultaneously?
Ports
What identifies which specific services/applications are available for clients to connect to and use?
Open TCP/UDP ports
What is port 80 normally used for?
HTTP using TCP
What is port 443 normally used for?
HTTPS using TCP
What is port 22 normally used for?
SSH using TCP
What is sockets purpose?
They’re used to track different concurrent network sessions
What do sockets consist of?
IP address, Transport protocol (TCP or UDP), and port number (source and destination)
What is the range of well known/system ports?
0-1023
What organization are the well known/system ports controlled by?
Internet Assigned Numbers Authority (IANA)
What is the range of user/registered ports?
1024-49151
What is the range for dynamic/ephemeral ports?
49152-65535
OS’s Windows XP and older can only use dynamic ports up to what number?
5000
What is it called when different layers work together on the same system?
Adjacent-layer interaction
What is it called when one system communicates with the same layer on a different system?
Same-layer interaction
What is the main protocol of the network layer?
Internet protocol (IP)
What are common protocols of the network layer?
IPv4, IPv6, ARP, ICMP
Are IP packets related to each other?
No they are treated as independent units without any relation to any other unit of data
What is data encapsulated at the network layer called?
IP payload
What are the maximum and minimum lengths of an IP header?
60 bytes max, 20 bytes min
What are the two main parts of an IPv6 packet?
The header and the payload
How long is an IPv6 header?
The first 40 bytes
What is the first thing in an IPv6 header?
A 4 bit tag indicating the version
What are bits 4-11 of an IPv6 header?
Traffic class
What are bits 12-31 of an IPv6 header?
Flow label, used for Q0S management
What are bits 32 to 47 of an IPv6 header?
Payload length
What are bits 48 to 55 of an IPv6 header?
Next header
What are bits 56 to 63 of an IPv6 header?
Hop limit
What are bits 64 to 191 of an IPv6 header?
Source address
What are bits 192 to 319 of an IPv6 header?
Destination address
What are the two parts of the contents of an IPv6 packet?
Extension header and upper layer protocol data unit (payload)
What are IPv6 extension headers used for?
To move fields that are variable length from IPv4 headers into the packet
Address Resolution Protocol (ARP)
- Maps a known IP address to a MAC sub-layer address
- Allows communication on ethernet LAN
- Determines a destination address for a packet by checking the ARP cache table
- Sends broadcast if the destination is unknown
What is local ARP?
Resolve an address when both host and destination share the same media or wire
ICMP
- Provides feedback about problems in the network
- Usually formed from a normal IP packet that has generated an ICMP response
How does data link encapsulation and addressing (MAC) handle errors?
It detects them but does not recover
Frame Check Sequence (FCS)
Provides a method for receiving NIC to determine whether the frame experienced transmission errors
What happens if the data link layer detects an error?
The receiver discards the frame
What are the primary protocols of the data link layer?
Ethernet and PPP
Physical Address (MAC)
- Hardware address, ethernet address
- Burned into card
- Can’t be changed but can be spoofed
What is the breakdown of MAC addresses?
- 48 bits in length
- First 6 hex digits identify the manufacturer or vendor - Organizational Unique Identifier (OUI)
- Remaining 6 hex digits identify the interface serial number
Ethernet Frame
Encapsulated data defined by the network access layer
What are the parts of an ethernet frame?
Preamble, Start Frame Delimiter (SFD), Destination MAC, Source MAC, Type, Data and Pad, Frame Check Sequence (FCS)
Ethernet (IEEE 802.3)
Defines standards for physically connected Local Area Networks (LAN)
Spanning Tree Protocol (STP)
Prevents frame loops within a switched network
Physical Layer
Encodes a signal onto a medium to transmit the frame
What are some IEEE 802.3 media types?
Coaxial cable, twisted pair cable, UTP & STP, connectors & wiring schemes, fiber optic cable
What are the types of Twisted Pair Cabling?
Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP)
How many pairs of copper wire are in twisted pair cable?
4
Why are twisted pair cables twisted?
To reduce EMI
What is the standard ending for twisted pair cable?
RJ-45 connectors and ports
Straight Through Cables
Connects “unlike” devices
Crossover Cables
Connects “like” devices
What are the two modes of fiber?
Single mode fiber (SMF) and multi mode fiber (MMF)
Which is cheaper, single mode fiber or multi mode fiber?
Multimode fiber
Encapsulation
The process of adding headers (and sometimes trailers) around data
De-encapsulation
The process of inspecting and removing headers to process data inside
Institute of Electrical and Electronics Engineers (IEEE)
Non-profit professional association for the advancement of technology
What are the 802 categories?
Authentication, ethernet, wireless, WPAN, Bluetooth, WMAN
802.1x
Authentication mechanism for devices wishing to connect to LAN/WLAN, provides protection for other types such as remote access and VPN
What 802 category deals with authentication?
802.1x
802.3
Ethernet, defines standard for physically connected networks, most common implementation of linear bus topology
What 802 category deals with ethernet?
802.3
CSMA/CD
- Carrier: the network signal
- Sense: the ability to detect
- Multiple Access: all devices have equal access
- Collision: what happens if devices send at once
- Detection: how to handle collision
How does the CSMA/CD process work?
- Device waits until line is free but collisions still occur
- If a collision occurs randomly select a hold time then retransmits
What are the different ethernet address categories?
Unicast, broadcast, multicast
Switch Address Learning
- an ethernet switch learns the MAC address of devices attached to each of its port
- the source MAC address to a physical port mappings are stored in a MAC database (CAM table, MAC address table)
Forward/Filter Decision
- Switch receives a frame
- Consult the MAC database
- If found the frame is sent only to that port
- If not found the frame is flooded out all other ports
Collision Domain
Domain in which a frame sent by one NIC could result in a collision with a frame sent by another NIC
Broadcast Domain
Domain in which a broadcast frame sent by one NIC is received by all other NICs
What are the consideration when designing a LAN?
- Collison/broadcast domains
- Total devices per collision domain
- Issue of broadcasts
- Segment large LAN w/routers
802.11
Wireless, a set of MAC and physical specification for implementing Wireless Local Area Network (WLAN)
What 802 category deals with wireless?
802.11
IPv4 Addresses
Each source and destination address field contains a 32 bit address
Private IP Addresses
- Non-routable on public networks or internet
- 1 range per class
What is the private IP range for Class A networks?
10.0.0.0/8
What is the private IP range for Class B networks?
172.16-31.0.0/12
What is the private IP range for Class C networks?
192.168.0.0/16
What are the types of special purpose IPv4 addresses?
Loopback and APIPA
What is a loopback address?
- 127.0.0.1/8
- Represents this computer
- Logical not physical
What is the APIPA address?
- 169.254.0.0/16
- An automatically assigned private IP address
- Allows host communication (LAN only) when no DHCP server exists or cannot be reached
What organization assigns classful IP addresses?
The American Registry for Internet Numbers (ARIN)
What are the benefits of IPv6?
- Increase the amount of IP addresses available
- Better security (IPSEC)
- Network Address Translation (NAT) optional
- Simpler header format
- More efficient routing
- Easier administration
What makes up a IPv6 address?
128 bits represented as 8 groups of 4 hex digits
IPv6 Abbreviation
- Consecutive zeros replaced with :: only once
- Leading zeros within a group can be removed
What is the IPv6 loopback address?
::1
::
Unspecified IPv6 address used for addressing purposes within software
Types of IPv6 addresses?
- Classified by scopes (where they can communicate)
- Global unicast (globally routable)
- Unique local address (same as private address in IPv4)
- Link local (routable within a broadcast domain)
- Interfaces can have multiple IPv6 addresses assigned to them (1 global/1 local)
::FFFF/96
IPv4 embedded into IPv6
::/128
Unspecified (0.0.0.0 IPv4 equivalent)
::1/128
Loopback (127.0.0.1 IPv4 equivalent)
FE80::/10
Link local (169.254.0.0/16 IPv4 equivalent)
FC00::/8, FD00::/8
Unique local (10.0.0.0/8 IPv4 equivalent)
2000::/3
Global Unicast (public IP IPv4 equivalent)
FF00::8
Multicast (224.0.0.0/4 IPv4 equivalent)
IPv6 Anycast
Typically used to locate the nearest server offering a specific service (DNS, DHCP, HTTP)