Chapter 1 Network Fundamentals Flashcards
What is a router?
It’s a device that directs internet traffic with multiple devices to a network and directs data packets to their correct destination.
What is a Switch?
It’s a device that connects multiple devices on a network and allows them to communicate with each other.
IDS (Intrusion Detection System)
It monitors network traffic and devices for suspicious activity.
What are Proxies?
It is an application or server that acts as an intermediary between the user and the internet.
List the layers of an OSI Model
Layer 1: Physical Data Link
Layer 2: Data Link
Layer 3: Network
Layer 4: Transport
Layer 5: Session Layer
Layer 6: Presentation Layer
Payer 7: Application Layer
Encapsulation vs Decapsulation
Encapsulation adds information to the packet as it travels to its destination. Decapsulation reverses the process by removing the info, so the destination can read the original data
Access Point (AP)
It’s not a wireless router. An access point a bridge to access the router itself.
Content Delivery Network
It takes time to get data from one place to another. Geographically distributed caching servers.
(VPN) Virtual Private Network
Secure private data traversing the public network. This is often a built-in network that can encrypt and decrypt access to the device.
Quality of Service (QoS)
Traffic Shaping, Packet Shaping. Control Bandwidth usage or data rates. It is important to have higher priorities than other apps.
TTL (Time to Live)
A networking mechanism that limits the amount of time for a data packet that exists on the network.
What is Network Function Virtualization (NFV)
Replace physical network devices with virtual versions. It has the same functionality as a physical device, like routing, switching, load balancing, and maintaining a cloud.
What is a Virtual Private Cloud (VPC)
A pool of resources created in a public cloud.
What is a TCP (Transmission Control Protocol)
A communication standard that allows a device to exchange data over a network. TCP is a fundamental protocol that defines how to establish and maintain network conversations.
ICMP (Internet Control Message Protocol)
One of the primary ways in which ICMP is used to determine if data is getting to its destination and at the right time.
Unicast
One stations sends information to another station.
Multicast
Delivery of information to interested systems. Multimedia delivery, stock exchanges, and dynamic routing updates.
Broadcast
Send information to everyone at once.
Fiber Communication
It’s a type of cabling that is immune to radio interference. Signals slow to degrade and transmit over long distances.
Copper Cabling
Two wires twisted to resist interference. They have equal, but opposite signals.
Coaxial Cable
Two or more forms share an axis and these cable are used for television and digital.
Twin axial Cable
It has two inter conductors and travel in is 10 gigabytes of info through an ethernet cable.
Transceiver
Transmitter and receiver. Usually in a single component. It’s a device that can both send and receive signals and is a combination of a transmitter and transceiver in a single package. Different types can range from fiber and copper.
What are network topologies?
It is a physical and logical arrangement of devices and connections in a network. It describes how data flows and how nodes such as routers and switches are interconnected.
What are some of the network topologies you can list?
Star Network- Used in most large and small networks. The middle has a central hub where all the other devices communicate in one center.
Mesh- Multiple Links to the sample place. Redundancy, fault tolerance, and load balancing.
Hybrid (Star and Mesh)- A
combination of physical topologies.
Top-of-rack Switching- A network topology that uses layers of switcher to improve network efficiency and reduce latency. The advantage is that this can send data quickly, but it is costly since buying switches is expensive.
Point-to-point- Older WAN links that can send data by themselves.
Three-Tier Architecture
Three-tier architecture is commonly found in small geographical areas like cities and towns. Our homes are usually connected to these architectures, but only because it’s possible by distribution channels.
Two-Tier Architecture
Its simplicity has an advantage over its three tier model. It has been seen to combine the core and distribution layers. However, it is not as resilient if you happen to lose components.
Loopback Address
A special IP address that points back to the same device to send and receive network traffic to itself. It is primarily used for testing purposes, debugging, or establishing network connections without involving external devices.
Reserved Address
It refers to an IP address that are set aside for specific purposes and are not assigned for general use on public networks like the Internet. These addresses are typically reserved by organizations.
Virtual IP Addresses (VIP)
They are not real IP addresses, since these addresses are based on virtual machines or reserved addresses that are given to a router
DHCP (Dynamic Host Configuration Protocol)
A network management protocol is used to automatically assign IP addresses and other network configuration settings to devices on a network. IP configuration settings are done through this sever.
Subnetting
It’s a process in which a larger network is divided into smaller and sub-manageable networks.
CIDR (Classless Inter-Domain Routing)
It allows for more efficient use of IP address space, which is especially important as the number of devices on the internet grows.
VLSM (Variable Length Subnet Masks)
It’s a technique in IP networking that allows you to create subnets of different sizes from a single IP network, as opposed to fixed-size subnets.
SDN (Software Defined Networking)
Networking devices have different functional planes of operation. It is a network architecture approach that separates the control plane from the data plane in networking devices.
Adaptive Identity
Multiple Risk Indicators that have a relationship to the organization, physical location, type of connection, and IP address.
IPV6 (Internet Protocol Version 6)
The number of IPV6 addresses can be the sum of 45 quintillion unique addresses. This was specifically used to address the limitation of IPV4.
Tunneling IPV6
It sends IPV6s over existing IPV4s.