CCNA 1 - Module 1 & 2 Flashcards
– end device / clients
Host
– number that identifies the host within a particular network. It identifies the host and the network to which the host is attached.
Internet protocol (ip) address
– computers with software that allow them to provide information, like email or web pages, to other end devices on the network
Servers
TYPES OF SERVER SOFTWARE
- email server
- web server
- file server
– runs email server software (ms outlook, gmail, etc)
email server
– runs web server software (internet explorer, chrome)
Web server
– stores corporate and user files in a central location (file explorer)
File server
– many computers function as the servers and clients on the network
Peer-to-peer network
– is either the source or destination of a message transmitted over the network.
End device
– connect the individual end devices to the network.
Intermediary devices
– also known as a multiport repeater.
Ethernet hub
– provides the channel over which the message travels from source to destination.
Network media
THREE TYPES OF MEDIA
- metal wires (copper) within cables
- glass/plasiting fibers within cables (fiber-optic-cable)
- wireless transmission
- – data is encoded into electrical impulses.
Metal wires (copper) within cables
- – data is encoded into Pulses of light.
Glass or plastic fibers within cables (fiber-optic-cable)
- – data is encoded via modulation of specific frequencies of electromagnetic waves.
Wireless transmission
– use symbols, like those shown in the figure, to represent the different devices and connections that make up a network.
Network representation / diagram
- – physically connects the end device to the network.
Network interface card (nic)
- – a connector or outlet on a networking device where the media connects to an end device or another networking device.
Physical port
- – specialized ports on a networking device that connect to individual
Interface
– visual map of how the network is connected.
Topology diagram
TWO TYPES OF TOPOLOGY DIAGRAM
- physical td
- logical td
- – illustrate the physical location of intermediary devices and cable installation
Physical topology diagram
- – illustrate devices, ports, and the addressing scheme of the network.
Logical topology diagram
- – connect a few computers to each other and to the internet.
Small home networks
- – allows computers in a home office or a remote office
Small office and home office networks (soho)
- – school / corp. Can have many locations with hundreds or thousands of interconnected hosts.
Medium to large networks
- – provides access to users and end devices in a small geographical area.
Local area networks (LANS)
- – the internet is a network of networks that connects hundreds of millions of computers world-wide.
Worldwide networks
- – provides access to other networks over a wide geographical area
Wide area networks (WANS)
– worldwide collection of interconnected networks (internetworks, or internet for short)
Internet
– a private connection of LANS and WANS that belongs to an organization.
Intranet
– provide secure and safe access to individuals who work for a different organization but require access to the organization’s data.
Extranet
- data signal transmits on the same cable that delivers cable television it provides a high bandwidth, high availability, and an always-on connection to the internet.
Cable
– also provide high bandwidth, high availability, and an always-on connection to the internet. DSL runs over a telephone line
Digital subscriber lines (DSL)
– uses a cell phone network to connect.
Cellular
– benefit in those areas that would otherwise have no internet connectivity at all
Satellite
– an inexpensive option that uses any phone line and a modem. The low bandwidth provided
Dial-up telephone
– reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking.
Dedicated leased line
– ethernet wan. It extends LAN access technology into the wan. Ethernet is a LAN technology you will learn about in a later module.
Metro ethernet
– popular choice is symmetric digital subscriber line (SDSL) which is like the consumer version of DSL but provides uploads and downloads at the same high speeds.
Business DSL
– it can provide a connection when a wired solution is not available.
Satellite
– could not communicate with each other since they use different technologies to carry the communication signal and had their own set of rules and standards.
Traditional Separate Networks
– capable to communicate with each other since they use the same network infrastructure and uses the same set of rules and standards.
Converged Networks
- – it limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs.
Fault tolerance
o - having multiple paths to a destination
Redundancy
o – is one way that reliable networks provide redundancy. Packet switching splits traffic into packets that are routed over a shared network
Packet switching
o – a single message, such as an email or a video stream, is broken into multiple message blocks.
Packets
- – it expands quickly to support new users and applications.
Scalability
- – is an increasing requirement of networks today. New applications available to users over networks, such as voice and live video transmissions, create higher expectations for the quality of the delivered services.
Quality of service (QoS)
o – occurs when the demand for bandwidth exceeds the amount available, measured in bits per seconds.
Congestion
- – network infrastructure security and information security
Security
- – only the intended and authorized recipients can access and read data.
Confidentiality
- – it assures users that the information has not been altered in transmission, from origin to destination.
Integrity
- – it assures users of timely and reliable access to data services for authorized users.
Availability
- – it is a concept that requires significant changes to the way we use devices and safely connect them to networks.
Bring your own device (BYOD)
- – the act of working with another or others on a joint project
Collaboration
– is a multifunctional collaboration tool that lets you send instant messages to one or more people, post images, and post videos and links.
Cisco WebEx teams
- – is a powerful tool for communicating with others, both locally and globally.
Video conferencing
- – is one of the ways that we access and store data.
Cloud computing
- – cloud made available for general population
Public cloud
- – intended for specific organizations or entity such as government
Private cloud
- – made up of two or more clouds
Hybrid cloud
- – created exclusively for specific entities or organizations.
Community clouds
– integrates into every-day appliances, which can then connect with other devices to make the appliances more ‘smart’ or automated.
Smart home technology
– uses existing electrical wiring to connect devices, especially useful when wireless access points cannot reach all the devices in the home.
Powerline networking
– is an isp that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area Networks (WLANS).
Wireless internet service provider
– it uses the same cellular technology as a smart phone.
Wireless broadband service
– is an integral part of computer networking, regardless of whether the network is in a home with a single connection to the internet or is a corporation with thousands of users.
Network security
- – these contain malicious software or code running on a user device.
Viruses, worms, and trojan horses
- – these are types of software which are installed on a user’s device. The software then secretly collects information about the user.
Spyware and adware
- – it is also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.
Zero-day attacks
- – is a malicious person attacks user devices or network resources.
Threat actor attacks
- – slow or crash application and processess on a network device
Denial of service attacks
- – captures private information from an organization’s network.
Data interception and theft
- – steals the login credentials of a user in order to access private data
Identity theft
- – application that help to protect end devices from becoming infected with malicious software.
Antivirus and antispyware
- – blocks unauthorized access into and out of the network.
Firewall filtering
- – this provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.
Dedicated firewall systems
- – further filter access and traffic forwarding based on ip addresses and applications.
Access control lists (ACL)
- – identify fast-spreading threats, such as zero- day or zero-hour attacks.
Intrusion prevention system (IPS)
- – provide secure access into an organization for remote workers.
Virtual private network (VPN)
- The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces.
Shell
- Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.
Kernel
- The physical part of a computer including underlying electronics.
Hardware
- Windows, macOS, Linux KDE, Apple iOS, or Android
Graphical User Interface (GUI)
- less resource intensive and very stable when compared to a GUI.
Command Line interface (CLI)
- The family of network operating systems used on many Cisco devices
Cisco Internetwork Operating System (IOS)
(e.g., the Cisco IOS on a switch or router) enables a network technician to do the following:
A CLI-based network operating system
- physical management port that provides out-of-band access (access via a dedicated management channel that is used for device maintenance purposes only) to a Cisco device
Console
- in-band and recommended method for remotely establishing a secure CLI connection, through a virtual interface, over a network.
Secure Shell (SSH)
- insecure, in-band method of remotely establishing a CLI session, through a virtual interface, over a network.
Telnet
- Mode allows access to only a limited number of basic monitoring commands.
- often referred to as “view-only” mode.
User EXEC Mode
- To execute configuration commands (global configuration mode), a network administrator must access privileged EXEC mode
Privileged EXEC Mode (enable mode.)
- identified by a prompt that ends with (config)# after the device name, such as Switch(config)#.
Global Configuration Mode (Global Config Mode)
- Used to configure console, SSH, Telnet, or AUX access.
Line Configuration Mode
- Used to configure a switch port or router network interface.
Interface Configuration Mode
- To move from user EXEC mode to privileged EXEC mode
enable command
- to return to user EXEC mode.
disable privileged EXEC mode command
- To move in and out of global configuration mode
configure terminal privileged EXEC mode command
- To return to the privileged EXEC mode
exit global config mode command
followed by the management line type and number you wish to access- to enter line subconfiguration mode
line command
- to exit a subconfiguration mode and return to global configuration mode
exit command
- To move from any subconfiguration mode to the privileged EXEC mode
end command (Ctrl+Z)
- – This is a specific parameter defined in the operating system (in the figure, ip protocols).
Keyword
- This is not predefined; it is a value or variable defined by the user (in the figure, 192.168.10.5).
Argument
_____________ help enables you to quickly find answers to these questions:
* Which commands are available in each command mode?
* Which commands start with specific characters or group of characters?
* Which arguments and keywords are available toparticular commands?
Context-sensitive
check verifies that a valid command was entered by the user.
Command syntax
- is important to warn unauthorized personnel from attempting to access the device.
A banner message
- This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose itscontents when the device is powered off.
startup-config
- This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.
running-config