Computer Networks- pre study Flashcards

Design and analysis, communications architecture/ protocols, LAN vs WAN

1
Q

That process starts with identifying business and technical requirements and continues until just before the network implementation stage (when you actually do the work to deploy and configure what was designed). Network analysis, IP addressing, hardware selection, and implementation planning are all part of network design.

A

In simple networks, like those found in most homes and small offices, network design is a straightforward process. In large enterprise networks, the network design process is often very complex and involves multiple stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Designing a network step by step

A
  1. Identify the requirements
  2. Assess the current state of the network
  3. Design your network topology
  4. Choose the hardware and software
  5. Plan for implementation and beyond
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When it comes to physical network design you’ll need to address things like:

A

Running copper and fiber cabling
Number of switch ports required
WiFi access point positioning
Rack layout
Cooling and power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Logical network design deals with things like:

A

IP addressing/subnetting
VLANs
Data flows
Network topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A traditional hierarchical network design is based on the idea of three basic network layers. Each layer handles a separate portion of the dataflows on a network. Those layers are:

A

Core layer
Distribution layer
Access layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Core layer

A

This is the layer that routes traffic between different geographical sites. In other words, it’s the network backbone. The core layer is where high-throughput, expensive core routers shine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Distribution layer

A

The distribution layer sits between the core and access layers. It acts as a boundary and implements network policies to restrict or allow data flows between different subnets within the network. Less expensive routers and L3 switches are the common workhorses of the distribution layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access layer

A

The access layer is the layer for endpoint devices like user PCs, printers, and VoIP phones. Smaller “access switches” are responsible for switching packets and routing traffic at this layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

networks bypass the ____ _____ altogether.

A

distribution layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Top-down and bottom-up are two approaches to network design based on the OSI model. With a top-down approach, you start designing your network at the application layer and work your way down the model finishing with the physical layer. The bottom-up design is exactly the opposite.

Top-down is generally considered a better approach when you start with business requirements and work your way down. However, top-down is also often more time-consuming. Bottom-up network design starts with the physical aspect of the network and works upwards.

A

As a result, bottom-up can be quicker but can often lead to missed requirements or compromises on desired outcomes, as designing a network from the bottom up locks you into certain outcomes before you get to the application layer where users get work done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Choose the hardware and software

This step entails identifying the hardware and software you’ll use. In some cases, this will happen in parallel with step 3. In others, some of the hardware or software may be specified early in the project. As a rule, selecting the specific hardware and software you’ll use after you know what the network needs to do gives you the most flexibility.

A

During this stage, you’ll choose specific cables, racks, network devices, servers, applications, cloud services, etc. to make your design a reality. For custom parts or large orders, keep in mind potential supply-chain issues. If you can’t get your structured cabling or access switches in time, you can slow down project completion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Plan for implementation and beyond

With your network design and hardware/software selections ready, you can now plan for the implementation and beyond. This step entails creating a plan to deploy, configure, and test the network. In some cases (usually larger networks) this step may include small-scale test deployments to validate the design works before scaling out.

A

Tight project management and keeping stakeholders informed are key parts of getting your plan right. A network deployment has a lot of moving parts and your plan should account for project milestones, change management, and key deliverables. Additionally, if the network will be managed by a different team than those doing the implementation, you’ll need a transition plan. If you’re responsible for network management going forward, developing a plan for how you’ll monitor and maintain the network is important as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Top 5 network design best practices

A
  1. Integrate security early on
  2. Know when to use top-down vs bottom-up
  3. Standardize everything
  4. Plan for growth
  5. Create and maintain network documentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If it can be standardized, standardize it. It will make troubleshooting, patching, maintenance, and asset management drastically easier in the long run.

Here are some examples of things you can and should standardize:

A

Hostnames (e.g. printer5.office2.lan3)
Hardware models
IP address schemes
Cable colors (e.g. one color for VoIP, one for data, etc)
Security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Copper vs fiber, logical topologies, IP addressing, VLANs, bandwidth, and WiFi coverage are some of the most obvious considerations when you’re designing a network. However, that’s far from an exhaustive list.

A

There is a lot that goes into designing a network, and it can be easy to overlook things. Here are some key considerations to keep in mind for your next project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

regulatory requirements

A

When you’re designing a network, you need to account for legal regulations that impact both the physical and logical design of your network. For example, local building codes may impact how you run structured cabling. Similarly, the National Electrical Code in the US has requirements relevant to the electrical power your network devices will require. From a logical perspective, regulations like HIPAA, PCI DSS, and GDPR can impact both data in transit and data at rest.

During the network design process, you’ll need to keep these requirements in mind to build a compliant network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Because of the importance of network availability to business operations, enterprise networks need some level of fault tolerance. To make that happen, N+1, 2N, or 2N+1 redundancy (or even higher) is often part of modern network design.

Of course, resilience and redundancy come with a budgetary cost. Your network design will need to balance resilience and redundancy against the expense. In other words, reliably achieving five-nines (99.999% uptime) is great if you can do it, but it ain’t cheap!

A

A good way to frame this tradeoff is: considering your cost of downtime (i.e. how many dollars per minute/hour will you lose if the network goes down) and balancing that against your exposure to downtime with your current redundancy plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cloud vs. on-prem

A

It’s no longer a given that on-premises are the best place to run a given workload. Once you have your business and technical requirements, you should carefully consider whether or not a cloud network makes sense as a solution. We won’t rehash the entire cloud vs on-prem debate here, but make sure you don’t lock yourself into an on-premises solution when the cloud may be a better fit (or vice versa!).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It can be easy to overlook the cooling and power requirements of a network. Don’t make this mistake! If you can’t meet your power requirements, you’ll never get your deployment off the ground. If you don’t account for all the heat dissipation of your new network equipment, devices can overheat and prematurely fail. Here are a few points to consider about power and cooling:

A

Make sure your electrical panels and electrical outlets can accommodate your new equipment.

Make sure to account for power-over-Ethernet (PoE) loads when sizing UPS (battery backups) and other power equipment.

Make sure your server room cooling can handle the additional heat generated by your new network gear or plan to invest in supplemental cooling.

There’s no one size fits all network design. With the right approach, however, you can create a design that matches your business requirements. Of course, as network lifecycle models like PPDIOO demonstrate, it doesn’t stop after the design stage!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Address resolution protocol (ARP)-
ARP translates IP addresses to MAC addresses and vice versa so LAN endpoints can communicate with one another. ARP is necessary because IP and MAC addresses are different lengths. Below is a breakdown of the various address lengths:

A

IP version 4 (IPv4) addresses are 32 bits.

IPv6 addresses are 128 bits.

MAC addresses – a device’s physical hardware number – are 12 hexadecimal digits split into six pairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Border Gateway Protocol (BGP)

A

makes the internet work. This routing protocol controls how packets pass through routers in an autonomous system (AS) – one or multiple networks run by a single organization or provider – and connect to different networks. BGP can connect endpoints on a LAN to one another, and it can connect endpoints in different LANs to one another over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

External BGP directs network traffic from _____________________.

A

various ASes to the internet and vice versa.

23
Q

_________ BGP directs network traffic between endpoints within a single AS.

A

Internal

24
Q

Domain name system

A

a database that includes a website’s domain name and its corresponding IP addresses. People use a domain name to access a website, while devices use an IP address to locate a website.

25
Q

DNS translates the domain name into IP addresses, and these translations are included within the DNS.

A

Servers can cache DNS data, which is required to access the websites. DNS also includes the DNS protocol, which is within the IP suite and details the specifications DNS uses to translate and communicate.

26
Q

____ is important because it can provide users with information quickly and enable access to remote hosts and resources across the internet.

A

DNS

27
Q

DHCP assigns IP addresses to network endpoints so they can communicate with other network endpoints over IP.

A

Whenever a device joins a network with a DHCP server for the first time, DHCP automatically assigns it a new IP address and continues to do so each time a device moves locations on the network.

28
Q

When a device connects to a network, a DHCP handshake takes place. In this handshake process, the device and DHCP server communicate using the following steps:

A

The device establishes a connection.

The server receives the connection and provides available IP addresses.

The device requests an IP address.

The server confirms the address to complete the process.

29
Q

File Transfer Protocol (FTP)

FTP has grown less popular as most systems began to use HTTP for file sharing. However, FTP is a common network protocol for more private file sharing, such as in banking.

A

a client-server protocol, with which a client requests a file and the server supplies it. FTP runs over TCP/IP – a suite of communications protocols – and requires a command channel and a data channel to communicate and exchange files, respectively. Clients request files through the command channel and receive access to download, edit and copy the file, among other actions, through the data channel.

30
Q

Like FTP, HTTP is a file sharing protocol that runs over TCP/IP. But HTTP primarily works over web browsers and is commonly recognizable for most users.

A

When a user enters a website domain and aims to access it, HTTP provides the access. HTTP connects to the domain’s server and requests the site’s HTML, which is the code that structures and displays the page’s design.

31
Q

Another form of HTTP is HTTPS, which stands for HTTP over Secure Sockets Layer or HTTP Secure.

A

HTTPS can encrypt a user’s HTTP requests and webpages. This provides more security to users and can prevent common cybersecurity threats, such as man-in-the-middle attacks.

32
Q

functions similarly to a postal service. When users send and receive data from their device, the data gets spliced into packets. Packets are like letters with two IP addresses: one for the sender and one for the recipient.

A

Internet Protocol (IP)

33
Q

IP packets:
After the packet leaves the sender, it goes to a gateway, like a post office, that directs it in the proper direction. Packets continue to travel through ______ until they reach their destinations.

A

gateways

34
Q

IP is commonly paired with TCP to form TCP/IP, the overall internet protocol suite. Together, IP sends packets to their destinations, and ____ arranges the packets in the correct order, as IP sometimes sends packets out of order to ensure the packets travel the fastest ways.

A

TCP

35
Q

works with IP to send packets to their destinations. IP aims to send packets on the quickest route possible, which OSPF is designed to accomplish. OSPF opens the shortest, or quickest, path first for packets. It also updates routing tables – a set of rules that control where packets travel – and alerts routers of changes to the routing table or network when a change occurs.

A

Open Shortest Path First (OSPF)

36
Q

OSPF is similar to and supports _____ ____ _____, which directs traffic based on the number of hops it must take along a route, and it has also replaced RIP in many networks. OSPF was developed as a more streamlined and scalable alternative to RIP. For example, RIP sends updated routing tables out every 30 seconds, while OSPF sends ______ only when necessary and makes updates to the particular part of the table where the change occurred.

A

Routing Information Protocol
updates

37
Q

the most popular email protocol, is part of the TCP/IP suite and controls how email clients send users’ email messages. Email servers use SMTP to send email messages from the client to the email server to the receiving email server. However, SMTP doesn’t control how email clients receive messages – just how clients send messages.

A

Simple Mail Transfer Protocol (SMTP)

38
Q

requires other protocols to ensure email messages are sent and received properly. SMTP can work with Post Office Protocol 3 or Internet Message Access Protocol, which control how an email server receives email messages.

A

SMTP

39
Q

Isn’t commonly used anymore.

designed for remote connectivity, and it establishes connections between a remote endpoint and a host machine to enable a remote session. Telnet prompts the user at the remote endpoint to log on. Once the user is authenticated, Telnet gives the endpoint access to network resources and data at the host computer.

A

Telnet

40
Q

the other half of TCP/IP and arranges packets in order so IP can deliver them. Specifically, TCP numbers individual packets because IP can send packets to their destinations through different routes and get them out of order, so TCP amends this before IP delivers the packets.

A

Transmission Control Protocol (TCP)

41
Q

____ detects errors in the sending process – including if any packets are missing based on TCP’s numbered system – and requires IP to retransmit those packets before IP delivers the data to its destination. Through this process, the _______ suite controls communication across the internet.

A

TCP
TCP/IP

42
Q

alternative to TCP and also works with IP to transmit time-sensitive data. UDP enables low-latency data transmissions between internet applications, making it ideal for VoIP or other audio and video requirements.

A

User Datagram Protocol (UDP)

43
Q

Unlike TCP, UDP doesn’t wait for all packets to arrive or organize the packets. Instead, UDP transmits all packets even if some haven’t arrived.

A

UDP solely transmits packets, while TCP transmits, organizes and ensures the packets arrive. While UDP works more quickly than TCP, it’s also less reliable.

44
Q

A ____ ____ _____ (____) is defined as a telecommunications network that helps to connect devices (end-user devices and servers) that are situated several kilometers or even hundreds of kilometers away from each other.

A

wide area network (WAN)

45
Q

A WAN may be ______ – for example, the internet is a type of WAN as it enables connectivity and data exchange between devices situated on opposite ends of the world. You may also have a _____ _____ in an enterprise, useful for securely sharing data and resources between geographically distributed headquarters, branch offices, retail stores, logistical hubs, and other similar locations. The key factor characterizing WAN is that it spans a geographically wide area.

A

public
private WAN

46
Q

A _____ ______ _____ (_____) is defined as a telecommunications network that helps connect devices (end-user devices and servers) that are situated close to each other, typically inside a radius of one kilometer.

A

local area network (LAN)

47
Q

LAN is widely used in both consumer and enterprise use cases. For example, you may have a collection of connected devices like a smart refrigerator, a laptop, a voice recognition-enabled TV, and a smart home console inside a person’s house.

A

This setup uses LAN technology to enable data exchange between these devices so that the homeowner can access and control their functionalities seamlessly.

48
Q

medium-sized office campus may have hundreds of laptops and workstations, several meeting room systems, connected printers, and attendance kiosks, servers, and other devices, also set up using LAN.

A

as long as the devices are within a compatible geographic range, you can connect them via LAN technology. This need for proximity is the key factor characterizing LAN.

49
Q

Networking technology is a foundational pillar for your enterprise as it connects the various internal cogs of your business and enables data exchange with external systems.

A

Processes like collaboration, data analysis, payments and transactions, supply and procurement, etc., all rely on networking technology – primarily on local area networks (LAN) and wide area networks (WAN).

50
Q

WAN
origins

coverage

speed

security

maintenenance

performance

A

newer - popular since 80s/90s

hundreds of kilometers

up to 150 Mbps

less secure

more effort needed

poor performance - less bandwidth

51
Q

WAN
underlying tech

implementation costs

ownership

fault tolerance

SDN

Architecture role

A

MPLS, ATM, frame relay, and X.25

More expensive

publicly owned

lesser fault tolerance

SD-WAN more prevalent

WAN is not component of LAN

52
Q

LAN
origins

coverage

speed

security

maintenenance

performance

A

Older in use since 70s

One kilometer radius

1000 Mbps or more

More secure

less effort

better performance - more bandwidth

53
Q

LAN
underlying tech

implementation costs

ownership

fault tolerance

SDN

Architecture role

A

Ethernet/ Wi-Fi

Less expensive

cannot be publicly owned

greater fault tolerance

SD-LAN is less prevalent

LAN is component of WAN

54
Q

In comparison, WAN is significantly slower (approximately 150 Mbps) due to several reasons:

A

There is a loss in speed as data packets travel through a long distance.

Internet service providers (ISPs) typically cap the maximum speed in publicly owned WAN.

WAN infrastructure is exposed to the elements, and speeds may suffer from natural disruptions.