Greg Flashcards
Learn information
How many bytes make up a MAC address?
6
How many bits make up a MAC address?
48
The OUI (organizationally unique identifier) are assigned by the IEEE to the m___________.
manufacturer
THE OUI is represented by the f________ t_______ bytes in the MAC address
3
The l________ t_________ bytes in the MAC address are usually assigned s_____________ which allows for u____________; duplications are rare.
last three
sequentially
uniqueness
Command to determine MAC address
ipconfig /all
ipconfig then space forward slash all
The physical unique address of the network interface card burned on the network adapter card; allows internetwork communication
MAC address
OSI level of MAC address
Layer 2 (Data Link)
TCP/IP level of MAC address
Network Interface Layer
OSI level of IP address
Layer 3 Network
How many bytes make up an IP address
4
How many bits make up an IP address
32
Command to determine IP address
ipconfig /all
ipconfig then space forward slash all
Logical Address that allows network to network communication via routers (Distant WAN communication); represented in dotted decimal notation)
IP address
A Local Area Network (LAN) is a collection of computers and other network devices that fit within the scope of a ___________ p_________ network
single physical
A Wide Area Network (WAN) is an internetwork that connects m_________ s_______ and spans l________ g_________ r____________.
multiple sites; large geographic regions
Unlike a WAN, a LAN may reside in only a __________ location
single
Examples of a WAN
Internet; different buildings of a campus
With peer-to-peer architecture all computers on the networks are peers. There are no dedicated s_________.
servers
Peer-to-peer architecture
There is no c__________ c_________ over shared resources. Any individual machine can share its resources as it pleases.
centralized control
Peer-to-peer architecture
All computers on the network can act as either a client ( r__________ resources) or a server ( p________ resources)
receive; provide
Client/Server Architecture
Network is composed of clients and servers. Servers provide c__________ c__________ over network resources, i.e. files, printers, authentication,etc
centralized control
Client/Server Architecture
____________ receive resources
_________________ provide resources
clients; servers
Connects LANs to other LANs, routes traffic across the Internet
Router
Protects network from malicious packets of data; keeps the bad stuff out
Firewall
Connects devices together within a LAN; switches traffic within a LAN
Switch
Servers
Type of server that manages access control on the network. Ex. Microsoft Active Directory
Authentication Server
Servers
Type of server that stores and dispenses files
File Server
Servers
Type of server that is the network’s post office, which handles email functions. Ex. Microsoft Exchange
Mail Server
Servers
Type of server that manages all printers on the network
Print Server
Servers
Type of server that manages web-based activities on the network. Ex. Microsoft IIS and Apache
Web Server
Servers
Type of server that manges network applications
Application Server
Server
Type of server that stores data in the form of a relational database Ex. Microsoft SQL Server, Oracle, MySQL
Database Server
Useful in planning a new network; shows the network on a “map”; assists in understanding signal flow
Network topologies
Network topologies
All devices are connected to a central device; usually a switch or a hub; popular topology in today’s networks; used in most large and small networks.
Star topology
Star toplogy has a built in fault tolerance (as long as the central devices doesn’t go down the network will continue to work; central device is a s_____ point of f_________
single; failure
Network topologies
Each device is connected to every other device by separate cabling
Highly redundant and fault tolerance
Mesh Topology
Mesh topology
Used in W______
Expensive to install
WANs
Network Topology
One to One Connection
Seen in Connections between buildings
Point to Point Topology
Point to Point Topology
Often used as d________ secure ______ link
Doesn’t provide r___________
dedicated
WAN
redundancy
Network Topology
A combination of multiple physical topologies
Almost all networks are this type of network topology
Ex. Star, Mesh and Point to Point Topologies combined
Hybrid
The network adapter installed on your computer that provides the physical and electrical connections to the network media. Can either be an expansion card or built directly into the motherboard.
Network Interface Card (NIC)
Older device used to connect devices together within a network. Replaced by switches
Hub
Hub Multi-port repeater -Traffic goes in one port and is repeated out e\_\_\_\_\_\_ o\_\_\_\_\_\_ p\_\_\_\_\_\_\_\_ -OSI Layer 1 device -Dumb network device -Less secure
every other port
Connects Devices together just like a hub; intelligent network device
Switch
Switches use ________ address to communicate
MAC
Switch memorizes the M_______ A_________ of each device connect to it via a M________ A_______ T_______
MAC address
MAC address table
Switch
- Traffic goes in one port and is repeated out to o_______ d_________ port
- Designed for high bandwidth
- Standard in Today’s Network Infrastructure
- More secure
only destination
What OSI Layer are Hubs
1
What OSI Layer are Switches
2
MAC address devices usually are what OSI level
2
Switches learn MAC addresses by ____ MAC address
source
Whenever you send a packet of information it includes the ________ MAC address (where it is coming from) as well as _________ MAC Address (where you want to send the data.
source;destination
Extends the Wired Network onto the WIreless Network
Wireless Access Point (WAP)
WAP is not a wireless r________
router
WAP allows moible users to connect to a w________ n________ wirelessly
wired network
__________ are used to connect different networks together;
Router;
Routers route traffics between networks using ________ ___________
IP addresses
What OSI layer are routers?
Layer 3
Packet Routing Process
If computer A wants to communicate with computer C, it knows based upon its IP address configuration that Computer C is not on its network. So, it sends a packet of data to Router 1, its configured ___________ _________.
Default Gateway
Packet Routing Process
The default gateway router, using a selected ________ _________ routes the packet of information through the Internet or a WAN via router h_____ until the packet either reaches its destiantion network or the packet is timed out.
routing protocol
hops