extra Flashcards
What are the key components of networking?
Protocols (e.g., TCP/IP), Hardware (e.g., routers, switches), and Transmission Media (e.g., Ethernet cables, optical fibers).
What is the difference between LAN and WAN?
• LAN: Local Area Network; small scale (e.g., office), uses Ethernet.
• WAN: Wide Area Network; large scale (e.g., Internet), connects multiple LANs.
Name the 7 layers of the OSI model.
- Physical
- Data Link
- Network
- Transport
- Session
- Presentation
- Application
What are the layers of the TCP/IP model?
- Application
- Transport
- Internet
- Network Interface
- Hardware
Define bit rate and latency.
• Bit Rate: The speed at which data is transmitted, measured in bits per second.
• Latency: The time it takes for a bit to reach its destination.
What are FTP and SMB used for?
• FTP: File Transfer Protocol for transferring files.
• SMB: Server Message Block for file and printer sharing.
What is the range of Class A IP addresses?
1.0.0.0 to 126.0.0.0.
What is the purpose of a subnet mask?
It separates the network and host portions of an IP address.
What does DNS do?
Resolves domain names (e.g., www.google.com) to IP addresses.
What are the steps in a TCP three-way handshake?
- SYN (Client to Server)
- SYN-ACK (Server to Client)
- ACK (Client to Server)
What are the key features of UDP?
• Connectionless
• No error recovery
• Low overhead
• Best-effort delivery
What does ARP do?
Resolves IP addresses to MAC addresses within a local network.
What is IPSec used for?
To provide secure communication through authentication and encryption.
What is the key difference between the OSI and TCP/IP models?
• OSI Model: 7 layers, includes Presentation and Session layers.
• TCP/IP Model: 5 layers, combines Presentation and Session layers into the Application layer.
What is multicast communication?
Messages sent to a specific group of recipients who have joined a multicast group.
What does the ping command do?
Sends ICMP Echo Request packets to test connectivity and measures round-trip time.
What features make TCP reliable?
• Connection-oriented
• Error recovery with ACKs
• Sequencing for ordered delivery
• Sliding window for flow control.
Name three types of modulation.
- Amplitude Modulation (AM)
- Frequency Modulation (FM)
- Phase Shift Modulation (PSM).
What is a packet sniffer? Name one example.
A tool to monitor and debug network traffic. Example: Wireshark.
Why was IPv6 developed, and what is its structure?
Developed due to IPv4 exhaustion; it uses 128-bit addresses, written in hexadecimal (e.g., 3A57:0000:9CD5:3412:912D:6738:1928).
What is the main responsibility of the Physical Layer in the OSI model?
Handles raw data transmission over physical media such as cables and wireless signals.
Which OSI layers map to the TCP/IP Application Layer?
The Application, Presentation, and Session layers of the OSI model.
How is a MAC address structured?
A 48-bit address, usually displayed in hexadecimal, divided into six groups separated by colons (e.g., 00:1A:2B:3C:4D:5E).
Why is subnetting useful in networks?
It improves network efficiency by segmenting traffic and reducing congestion.
What is the function of a default gateway?
It routes packets from a local network to external networks, such as the Internet.
What are the five steps in the TCP/IP data transmission process?
- Application layer encodes the user request.
- Transport layer segments data and adds port numbers.
- Internet layer appends IP addresses.
- Network Interface layer resolves MAC addresses.
- Hardware transmits the data as signals.
What is the primary purpose of ICMP?
To report network errors and diagnose issues, such as unreachable destinations or timeouts.
What is the typical speed of Fast Ethernet?
100 Mbps.
What does NAT do?
It maps private IP addresses to a single public IP address for Internet access.
How does the traceroute command work?
It tracks the path packets take to reach a destination by incrementing the TTL value and recording each router’s response.
What is a VLAN?
A Virtual Local Area Network that segments a physical network into multiple logical networks.
What standard is used for high-speed WLANs?
IEEE 802.11ac.
Name two commonly used cryptographic protocols for secure communication.
TLS (Transport Layer Security) and IPSec.
What is the difference between a hub and a switch?
• Hub: Broadcasts data to all devices.
• Switch: Forwards data to specific devices based on MAC addresses.
What is DHCP used for?
Dynamic Host Configuration Protocol automatically assigns IP addresses to devices on a network.
What is packet switching?
A method where data is broken into packets and transmitted over a network independently.
What does CSMA/CD stand for, and what does it do?
Carrier Sense Multiple Access with Collision Detection; it helps manage data transmission in Ethernet networks to avoid collisions.
What is a key difference between IPv4 and IPv6?
IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses for a larger address space.
What is a star topology?
A network design where all devices connect to a central hub or switch.
What is a VPN, and how does it work?
A Virtual Private Network securely connects devices over the Internet using encryption and tunneling protocols.
What does the Transport Layer in the OSI model ensure?
It provides reliable data transfer through mechanisms like segmentation, acknowledgment, and flow control.
What is the difference between bandwidth and throughput?
• Bandwidth: Maximum data transfer capacity of a network.
• Throughput: Actual amount of data successfully transferred.
What is the primary function of a firewall?
To monitor and control incoming and outgoing network traffic based on security rules.
What is encapsulation?
The process of wrapping data with protocol-specific headers and trailers as it moves through layers.
What is the main feature of a link-state routing protocol?
Each router maintains a complete map of the network topology to calculate the shortest path.
How does a Token Ring Network operate?
A token circulates around the network, granting permission to transmit data.
What is the purpose of an ICMP Echo Reply?
To respond to an ICMP Echo Request, indicating connectivity and round-trip time.
Name two common types of DNS records.
- A Record: Maps domain names to IPv4 addresses.
- MX Record: Specifies mail servers for email delivery.
What does QoS achieve in networking?
It prioritizes certain types of network traffic to ensure performance for critical applications.
What is a broadcast domain?
A network segment where all devices receive broadcast frames sent by any device.
What is the difference between static and dynamic IP addressing?
• Static IP: Manually assigned, does not change.
• Dynamic IP: Automatically assigned by DHCP and may change over time.
What is the purpose of the TTL field in an IP packet?
It limits the lifespan of a packet by decrementing at each hop to prevent infinite loops.
What is the role of a proxy server?
It acts as an intermediary between clients and servers, providing caching, filtering, and anonymity.