Chapter 2 - Concepts, Characteristics of Networking Flashcards

1
Q

Network Traffic Types?

A

Broadcast Domain

Collision Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Broads Cast Domain?

A

Consists of all devices receiving a broadcast packet which can originate from any device.

Large # of broadcast last can reduce network bandwidth.

Can effect processing power as the broadcast is heated by every system in the broadcast domain.

Any device stops processing to listen to the broadcast to accept or discard the packet.

A router indicates boundary limit as they discard brackets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collision Domain

A

Network segment where a collision can occur.

Typically Ethernet networks.

Consists of devices connected to a shared media.

If hubs are used they operate they operate at the physical layer, are not aware of addressing and broadcast data across all ports.

A switch operating and the data link layer which is swear of addressing and stops collisions occurring. It uses the MAC address to send data to the receiver only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CSMA/CD

A

Carrier Sense Multiple Access/Collision Detection

Better manages and detects collisions.

Determine how network devices respond when simultaneous requests are made on the same data channel.

Attempts to re send transmission after a time interval to help reduce collision chance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CSMA/CA

A

Detects and avoids collisions on a network.

Listens for collisions prior to transmitting data and informs other devices not to broadcast.

Send dummy packet for collision check.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Segmentation

A

Keeps traffics isolated using segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virtual LAN

A

Use a switch to isolate systems on a network from each other.

If needed devices and communicate between VLANS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trunking

A

Used when needing more than one switch.

It builds a logical connection between two VLANS and allows systems on different sides of switches to be in the same VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tagging Ports

A

Defined by IEEE 802.1Q

Used when multiple VLANS exist per port

Directs traffic to the appropriate VLAN

Not needed if only one switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Port Mirroring

A

Configure switch ports to mirror traffic between ports.

Captures traffic between devices while mirroring
only frames containing SIP/PID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MAC Address Table

A

Dynamically built on the switch using MAC address of frames it receives.

Can determine port forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Address Resolution Protocol (ARP) Table

A

Maps IP Addresses to MAC Address.

Maintains a record of MAC and corresponding IP Addresses

Can implement a switching loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Switching loop

A

Sends a request to other switches if the current switch doesn’t have a MAC address in the ARP Table or is missing the address.

Spanning Tree Protocol can detect a switching loop and stop it if the switch can’t find a correct MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DMZ

A

De Militarised Zone

Uses a firewall which only allows ports to be open to communicate with appropriate system types.

Protects internal systems in the network. Only systems needing to be exposed to the internet are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hub

A

Physical layer device

Connects systems within a LAN or different segments.

It broads casts arriving data across all ports

No swear of addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Switch

A

Network device that filters and forwards packets between LAN segments and hosts.

Operated in the Data Link Layer

Is swear of addressing and only sends data to the receiving device

Isolated network segments using device MAC Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Router

A

Network device that forwards packets between networks.

Operates at the networking layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Routing protocols

A

Enable routers to communicate with each other with respect to the routes they Handel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

RIP

A

Routing Information Protocol

A distance vector protocol

Shares routing information among other networks.

  • Routers maintain a routing table which lists all destinations and is shared to other routers*
  • Distance Vector algorithms determine which path is best to destination.*

Is open source

RIP considers how many routers have to be crosses to the destination via best path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

EIGRP

A

Enchanted Interior Gateway Routing Protocol (EIGRP)

Enables routers to exchange information more efficiently and maintain a copy of neighbouring routing tables.

  • RIP 2 only sends changes to updates of the routing table*
  • RIP doesn’t take into account the state of the fastest path*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Links State Routing Protocol

A

Open Shortest Path First (OSPF)

A routing protocol used to determine the best path for packets.

Replaces RIP

As a router learns of a network change it will multi cast the information to all other OSPF hosts on the network.

  • this updated neighbouring routing tables*
  • also takes into account the state of chosen path. If path is busy it might choose a longer route that’s the most open path.*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Boarder Gateway Protocol (BGP)

A

Manages how packets are routed across the internet

Connects autonomous systems

Combines distance and reach ability and queries if routers are functioning along selected path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IPv6

A

Default IP since vista

128bit

Implemented due IPv4 address shortage.

Supports auto config which helps correct and limitations of IPv4

Converts hexadecimal to binary

16bits of 8bites

1 to 9 for digits and A to F for letters

2001:0CD8:BC20:ED02:0000:0000:0000:0000

Condensed to

2001:CD8:BC20:ED02::

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Dual stack

A

Enables IPv4 and IPv6 to be used at the same time.

Both 4 and 6 are enabled by default

IPv6 is fine tuned to address common communication types like VOIP and Video conferencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

IPv6 Router Advertisement

A

Allowing client systems to recognise that a router is present

*IPv4 required anDHCO to inform client of its IP Address, subnet and default gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

IPv6 Neiboure Discovery

A

Performs tasks like

Router discovery
Duplicates address detection
Prefix discovery
Tasteless address auto config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Traffic/Packet Shaping

A

Regulates network data transfers
Ensures a level of performance and QoS

Prioritises traffic and delays packets deemed less important

Priority examples

VOIP
Time sensitive data like email over printing
Buisness related traffic
Internet service provider
Tiered internet like regular and standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

QoS

A

Quality of Service

Measures overall network performance, transmission and error rates.

Can improve traffic shaping like packet prioritisation,
Queuing, Application classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

DiffServ

A

Differential Services Protocol

Specified and controls network traffic by class

Based on class traffic can get precedence like VOIP as it requires an uninterrupted data flow.

DiffServ is dependant on compels policy and rules statements when forwarding network packets.

*Avoids simple priority tagging as it can be time consuming and take up resources tagging each packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

CoS

A

Class of Service

Groups similar traffic types on a network to manage traffic like 
Email
Video
Voice
File transfer like large documents

CoS doesn’t guarantee a level of service, only a best effort in terms of Bandwidth and Delivery Time

31
Q

Main CoS Technilogies

A

1/ 802.1p for data link layer tagging

2/ Type of Service (TOS)

3/ Differentiated Service (DiffServ)

CoS focuses on maintaining best communication possible based on the communication type*

32
Q

NAT

A

Network Address Translation

Used by network devices to assign a public address to a device within a private network.

  • limits the number of public IPs used by a company*
  • A private address is only visible to devices on the inside of the router on the private network*
  • only 1 private address needed to get everyone into the internet*

NAT enables packets to be sent to a private address. As packet arrives at the router from inside the network it inserts a public address which is visible to a web server and knows which machine in the private network the data is for.

33
Q

NAT Advantages

A

Prevents depletion of IPv4 addresses

Provide additional layer of security as private addresses can’t be seen from the public network.

Increase flexibility connecting to public internet

Use private IPv4 addressing system

34
Q

NAT disadvantages

A

Consumers processor and memory resources

Can cause IPv4 communication delays

Loss of end device IP trace ability

Not comparable with some technologies or network applications

Needs to support NAT!

35
Q

PAT

A

Port Address Forwarding

Is a NAT extension

Enables multiple network devices to be mapped to a single IP address.

Can configure a router or switch to forward data via port #

IP address example from public to a device on a private network

(public) . (private)
129. 1.2.3:1001

  • you state a particular port number to get to a particular system*
  • more robust routers support more port forwarding rules and are better at maintaining track of connections*
  • NAT/PAT allow easier access from and to private and public networks*
36
Q

PAT Advantages

A

Conserve IP addresses

Private IP addresses aren’t exposed to public networks

Limits attack origination from public network. As they don’t know the IP so can’t launch targeted attacks

37
Q

PAT Disadvantages

A

More complicated in larger networks. Particularly with remote logins

Limited internal table in devices which may run out of unused ports or loose track of connections

38
Q

Port Forwarding

A

Makes a network device accessible to other devices on the internet even when behind a router.

External connections go to the gateway and then to the port # of a requested service. The gateway will then forward the request to the relevant service via its port #.

Eg HTTP will use port 80 and data for port 80 is automatically forwarded to the private IP address inside the network.

you don’t have to manually state the uses port. Apps normally use default ports to get data to the correct service

39
Q

Common use of port forwarding

A

Online gaming services
Peer to peer downloading
VOIP apps like Skype, Viber, ooVoo, Zoom

40
Q

Do SOHO router support port forwarding?

A

Yes

You can run internet services from within a SOHO network such as

FTP
Email Server
Web Server

Limited number of about 10

41
Q

ACL Koko

A

Access Control List

Determine who and what can use a particular network resource

  • Router ms and some switches use ACL to restrict data flow to and from and network interface*
  • Network interfaces are configured to use ACLs to analyse data as it arrives at the Router/Switch*
  • once data arrives it is compared to the ACL criteria where it’s either denied or permitted*
  • An external router can provide access to outside network connections*
42
Q

When to use an ACL

A

1/ To enable basic security for a network. Not a firewall replacement but they can enable protection for network interfaces.

2/ Restrict Updates for Routing from network peers where you can set routers to accept updates from specific routers.

3/ helps to define flow control of network traffic.

4/ Can place ACL rules on external routers to filter traffic from less desirable networks and vulnerable protocols.

5/ To create a DMZ which is a buffer zone between the internal company network and external WAN (internet)

43
Q

DMZ

A

De Militarised Zone

A buffer zone to protect internal network.

Only devices that require the internet reside in the DMZ. Like a Web server on DNS server.

Can set up a proxy server which devices go through and use to get internet connection

An external router is set up with a fire wall. The external router normally has less restrictive ACL to allow access.

And internal router and fire wall are set with more restrictive ACL to protect the internal network. Commonly configured as explicit allow or deny statements.

ACL along with Firewalls can increase network security

44
Q

Public IP Addresses

A

Assigned by an internet service provider to be used by a home or buisness.

It differentiates devices connected to the public internet.

  • must be globally unique*
  • To access the internet you only need one public address.*
45
Q

Private IP Addresses

A

Provides internal communication within a private network.

  • Alleviates IPv4 IP Address exhaustion*
  • All systems inside your router on the private network can use any IP address configuration*
  • Configuration can be based on size for example*
46
Q

IANA

A

Internet Assigned Numbers Authority

Reserves certain IP Addresses for private use.

Everyone can use these addresses in a private network!

47
Q

Network classes.

A

A for large networks

B for medium networks

C for small networks

48
Q

Class A network range

A

10.0.0.0 to 10.255.255.255

49
Q

Class B Network range

A

172.16.0.0 to 172.31.255.255

50
Q

Class C network range

A

192.169.0.0 to 192.168.255.255

51
Q

APIPA

A

Automatic Private IP Addressing

A range of private IP addresses allowing devices to communicate if a DHCP server fails.

  • implemented if use of a DHCP server. If a device can’t communicate with the DHCP an APIPA is assigned to allow internal communications to continue.*
  • If you see an IP address starting with 169.254 you know there might be an issue with the DHCP server*
52
Q

APIPA Address Range

A

169.254.0.0 to 169.254.254.255

53
Q

Loop back Address mi

A

TCP/IPv4

Is a special address designed for the loop back interface of a machine

Packets for the loop back address is used for testing IP software has correctly configured TCP/IP.

  • not concerned with corrupt drivers or hardware*
  • ping command can be used to allow a user to perform a test on the loop back address. If you ping 127.0.0.1 and you get a reply it indicates TCP/IP is configured correctly on the machine*
  • Ping 127.0.0.1 when facing issues with communication*
54
Q

Loop back address range

A

Always set as 127.0.0.1

Range cane be

127.0.0.0 to 127.255.255.255

55
Q

Reserved addresses

A

Private Addresses

Loop back Addresses

APIPA are reserved for Self assignment of a DHCP server goes off line

56
Q

Addresses that can be used for diagnostics

A

APIPA - indicates issue with DHCP if IP address starts with 169.254

Loop Back Address 127.0.0.1 used to check a machines TCP/IP is correctly configured if you get a response

57
Q

Default Gateway

A

Allows computers on a network to access the internet

  • without a gateway devices are isolated from the internet*
  • Not required to communicate within your private network*
  • Computer with 2 network adapters can act as a gateway. 1 adapter connects to the subnet and the other connects to the public network (internet)
58
Q

Common Default Gateway IP Addresses

A
  1. 168.0.1
  2. 168.1.1
  3. 168.0.254
  4. 0.0.1

Commonly use the 1st address (# 1) or last address (# 255) of a given subnet.

59
Q

Subnet Mask

A

Used to determine what subnet an IP Address belongs to.

60
Q

What does an IP Address consist of?

A

1/ Network Address that identifies the network

2/ Host Address which is a specific network host.

61
Q

IP Address breakdown Class A

A

255.0.0.0

255 = Network and 0.0.0 = Host

62
Q

IP Address breakdown Class B

A
  1. 255.0.0

255. 255 = Network and 0.0 = Host

63
Q

IP Address Breakdown Class C

A
  1. 255.255.0

255. 255.255 = Network and .0 = Host

64
Q

VIP

A

Virtual IP Address

Is an address that doesn’t correspond to a specific or physical network interface.

Same VIP is used and routed to a server

65
Q

VIP Common Uses

A

Servers in a cluster. Which is a group of servers performing the same task.

Load balanced servers. Which share performance loads.

  • Client only needs a single IP Address to access the server cluster, to direct requests to a health server*
  • each server has its own IP Address*
66
Q

VIP Benefits

A

Consolidate resources (Load Balancing)

Improve Redundancy (Cluster)

Virtually unlimited mobility without changing address. (can move the application to another server using Th we same VIP)

Shields device led actual IP Address.

67
Q

Address Assignments

A

DHCP is a client/server protocol that automatically assigns a client with an IP, Subnet and gateway addresses.

Allocates from a pool of available IP Addresses.

  • can be manually or dynamically assigned*
  • lease for a time period*
68
Q

DHCP Benefits

A

Reliable IP Address configuration

Minimises configuration errors like Typos and duplication conflicts.

Centrally managed and automated

No need too keep assigned IP address records.

69
Q

How does DHCP assign a IP Address?

A

Uses DORA

Discover - packet send by client to ask for an address.

Offer - Sent by Server with addresses

Request - Sent by client to request one of the addresses

Acknowledge - sent by server acknowledging the requested IP address.

70
Q

Static IP Addressing

A

Manually assigned to a device as opposed to DHCP

this IP Address doesn’t change and remains static

71
Q

Static IP Common use

A

DNS Server

Network printer

Website

you don’t want these addresses to change

72
Q

Static Addressing Advantages

A

Stability

Preferred addresses for servers

Remote Access forwarding

Reduced down time if DHCP server goes down.

73
Q

Static addressing disadvantages

A

Security as addresses don’t change

Manual configuration open to duplication

Additional DHCP server configuration to ensure DHCP pool doesn’t include the static IP Addresses.

74
Q

DHCP Reservations

A

Permanent address assignment within a scope

Is the alternative to static addressing to unequally identify device on a network.

A typical reservation includes

Reservation time

IP Address

MAC Address

Description