Greg Flashcards
Learn information
How many bytes make up a MAC address?
6
How many bits make up a MAC address?
48
The OUI (organizationally unique identifier) are assigned by the IEEE to the m___________.
manufacturer
THE OUI is represented by the f________ t_______ bytes in the MAC address
3
The l________ t_________ bytes in the MAC address are usually assigned s_____________ which allows for u____________; duplications are rare.
last three
sequentially
uniqueness
Command to determine MAC address
ipconfig /all
ipconfig then space forward slash all
The physical unique address of the network interface card burned on the network adapter card; allows internetwork communication
MAC address
OSI level of MAC address
Layer 2 (Data Link)
TCP/IP level of MAC address
Network Interface Layer
OSI level of IP address
Layer 3 Network
How many bytes make up an IP address
4
How many bits make up an IP address
32
Command to determine IP address
ipconfig /all
ipconfig then space forward slash all
Logical Address that allows network to network communication via routers (Distant WAN communication); represented in dotted decimal notation)
IP address
A Local Area Network (LAN) is a collection of computers and other network devices that fit within the scope of a ___________ p_________ network
single physical
A Wide Area Network (WAN) is an internetwork that connects m_________ s_______ and spans l________ g_________ r____________.
multiple sites; large geographic regions
Unlike a WAN, a LAN may reside in only a __________ location
single
Examples of a WAN
Internet; different buildings of a campus
With peer-to-peer architecture all computers on the networks are peers. There are no dedicated s_________.
servers
Peer-to-peer architecture
There is no c__________ c_________ over shared resources. Any individual machine can share its resources as it pleases.
centralized control
Peer-to-peer architecture
All computers on the network can act as either a client ( r__________ resources) or a server ( p________ resources)
receive; provide
Client/Server Architecture
Network is composed of clients and servers. Servers provide c__________ c__________ over network resources, i.e. files, printers, authentication,etc
centralized control
Client/Server Architecture
____________ receive resources
_________________ provide resources
clients; servers
Connects LANs to other LANs, routes traffic across the Internet
Router
Protects network from malicious packets of data; keeps the bad stuff out
Firewall
Connects devices together within a LAN; switches traffic within a LAN
Switch
Servers
Type of server that manages access control on the network. Ex. Microsoft Active Directory
Authentication Server
Servers
Type of server that stores and dispenses files
File Server
Servers
Type of server that is the network’s post office, which handles email functions. Ex. Microsoft Exchange
Mail Server
Servers
Type of server that manages all printers on the network
Print Server
Servers
Type of server that manages web-based activities on the network. Ex. Microsoft IIS and Apache
Web Server
Servers
Type of server that manges network applications
Application Server
Server
Type of server that stores data in the form of a relational database Ex. Microsoft SQL Server, Oracle, MySQL
Database Server
Useful in planning a new network; shows the network on a “map”; assists in understanding signal flow
Network topologies
Network topologies
All devices are connected to a central device; usually a switch or a hub; popular topology in today’s networks; used in most large and small networks.
Star topology
Star toplogy has a built in fault tolerance (as long as the central devices doesn’t go down the network will continue to work; central device is a s_____ point of f_________
single; failure
Network topologies
Each device is connected to every other device by separate cabling
Highly redundant and fault tolerance
Mesh Topology
Mesh topology
Used in W______
Expensive to install
WANs
Network Topology
One to One Connection
Seen in Connections between buildings
Point to Point Topology
Point to Point Topology
Often used as d________ secure ______ link
Doesn’t provide r___________
dedicated
WAN
redundancy
Network Topology
A combination of multiple physical topologies
Almost all networks are this type of network topology
Ex. Star, Mesh and Point to Point Topologies combined
Hybrid
The network adapter installed on your computer that provides the physical and electrical connections to the network media. Can either be an expansion card or built directly into the motherboard.
Network Interface Card (NIC)
Older device used to connect devices together within a network. Replaced by switches
Hub
Hub Multi-port repeater -Traffic goes in one port and is repeated out e\_\_\_\_\_\_ o\_\_\_\_\_\_ p\_\_\_\_\_\_\_\_ -OSI Layer 1 device -Dumb network device -Less secure
every other port
Connects Devices together just like a hub; intelligent network device
Switch
Switches use ________ address to communicate
MAC
Switch memorizes the M_______ A_________ of each device connect to it via a M________ A_______ T_______
MAC address
MAC address table
Switch
- Traffic goes in one port and is repeated out to o_______ d_________ port
- Designed for high bandwidth
- Standard in Today’s Network Infrastructure
- More secure
only destination
What OSI Layer are Hubs
1
What OSI Layer are Switches
2
MAC address devices usually are what OSI level
2
Switches learn MAC addresses by ____ MAC address
source
Whenever you send a packet of information it includes the ________ MAC address (where it is coming from) as well as _________ MAC Address (where you want to send the data.
source;destination
Extends the Wired Network onto the WIreless Network
Wireless Access Point (WAP)
WAP is not a wireless r________
router
WAP allows moible users to connect to a w________ n________ wirelessly
wired network
__________ are used to connect different networks together;
Router;
Routers route traffics between networks using ________ ___________
IP addresses
What OSI layer are routers?
Layer 3
Packet Routing Process
If computer A wants to communicate with computer C, it knows based upon its IP address configuration that Computer C is not on its network. So, it sends a packet of data to Router 1, its configured ___________ _________.
Default Gateway
Packet Routing Process
The default gateway router, using a selected ________ _________ routes the packet of information through the Internet or a WAN via router h_____ until the packet either reaches its destiantion network or the packet is timed out.
routing protocol
hops
Protects your LAN from malciious activity on the internet
Firewall
Firewall
Prevents u__________ network traffic on different networks from accessing your network and vice versa
unwanted
A firewall can be a standalone network ______________ or __________ on a computer system, meaning network based or host based
device;software
Automatically assigns IP addresses to hosts
Dynamic Host Configuration Protocol (DHCP)
Twisted-Pair Cooper Cabling (the most commonly used in networks) is twisted because it helps to reduce i_________such as cross talk and noise (electromagnetic interference)
interference
Twisted-Pair Cooper Cabling can only go _______- meters maximum before the signal gets too weak
100
Type of Twisted Pair Network Cabling that is used to connect non-similar devices such as
- switch to router
- computer to switch
- switch to wireless access point
Straight-Through Cable
Type of Twisted Pair Cabling that is used to connect similar devices such as
- computer to computer
- switch to switch
- router directly connected to computer
Crossover cable
Used to learn order of OSI layers
Please Do Not Throw Sausage Pizza Away
OSI layers
Application Presentation Layer Session Layer Transport Layer Network Layer Data Link (MAC) Layer Physical Layer
OSI Layers: Application Layer-Layer 7
Where u________ communicate to the computer
users
OSI Layers: Application Layer-Layer 7
Acts as an i_________ between the application program and the network
Provies an i___________ for Internet Explorer or Outlook to communicate with the network
interface
interface
OSI Layers: Application Layer-Layer 7
Applications don’t r__________ in the application layer protocol, but instead interfaces with application-layer protocols
Ex. Internet Explorer interfacing with HTTP protocol
don’t reside
OSI Layers: Presentation Layer-Layer 6
Ensures that data transferred from one system’s application layer can be r______ by the application layer on another one.
read
OSI Layers: Presentation Layer-Layer 6
Character encoding; Acts as the t___________ and f_______
translator; formatter
OSI Layers: Presentation Layer-Layer 6
Application e_________
Example: Internet Explorer HTML converted to ASCII format
encryption
OSI Layers: Session Layer-Layer 5
Responsible for s________ u____; m________ and then t_______ d_______ sessions between presentation-layer entities
setting up; managing; tearing down
OSI Layers: Session Layer- Layer 5
C__________ c__________ between systems.
-start, stop, restart sessions
Coordinates communication
OSI Layers: Transport Layer-Layer 4
Ensures that d_______ a_____ safely at its destiantion
data arrives
OSI Layers: Transport Layer-Layer 4
S________ and r_________ data into a data stream
Segments; reassembles
OSI Layer considered to be the Post Office Layer
Layer 4-Transport Layer
OSI Layer known as the Routing Layer
Layer 3: Network Layer
OSI Layers: Network Layer-Layer 3
Provides a________________ and r___________ services
addressing; routing
OSI Layers: Network Layer-Layer 3
Places two addresses in the packet
-_______________ address and _____________ address
source; destination
OSI Layers: Network Layer-Layer 3
I_________ P________
-The primary network protocol used on the internet, IPv4, IPv6 logical address
Internet Protocol (IP)
OSI layer that provides physical transmission of the data
Layer 2-Data Link Layer
OSI Layers: Data Link Layer-Layer 2
Ensures that messages are delivered to the proper devices on a _______ using __________ address
-________ address
-the basic fundamental addressing on the network to be able to send traffic from one devices to antoher
LAN; hardware
MAC
OSI Layers: Data Link Layer-Layer 2
Translates messages from the n_______ layer into bits for the p________ layer
network; physical
OSI layer known as the switching Layer
Layer 2-Data Link Layer
OSI Layers: Physical layer-Layer 1
The physics of the network
- sends b______ and receives b______ ( 1 or 0)
- Singaling, cabling, connectors
- This layer isn’t about p________
bits;bits
protocols
Data e_____________ and d_________ occurs when data moves down and up the OSI model
encapsulation; decapsulation
Encapsulation is when we ________ chunks of information to network data (IP, MAC, etc)
add
Encapsulation occurs when we _________ data from a computer
send
Decapsulation is when we ________ chunks of information from network data
remove
Decapsulation occurs when we _________ data at a computer
receive
Protocol that resolves the IP address to the MAC address
ARP (Address Resolution Protocol)
Finds the hardware address of a host from a known IP address
-And vice versa (RARP)
Address Resolution Protocol
Without ARP, nothing can c____________ across the nwtowrk
communicate
ARP command
arp -a
arp space dash a
If a computer knows an IP address but not the MAC address, it will send a _________ message to all of the devices on the LAN asking what device is assigned that IP address
broadcast
Primary internet protocol
IPv4
IP version 4
A__________ and t________ data from one network node to another
Addresses; transports
IP version 4
It’s job is to get d_____ from one side of the internet tot the other
data
IP version 4
Moves data b_______ and f______ throughout the internet via routing
back;forth
IP version 4
Looks at each packet’s destination _____ a______, the uses a r_______ t_________ to dtermine where to send it.
-A connectionless protocol-fires and forgets”
IP address; routing table
The next generation Internet Protocol; developed because we are running out of IPv4 addresses
IP version 6 (IPv6)
IP version 6 is a _______ bit address
128
IP version 6 improves r__________, s________, efficiency, and more.
routing; security
Sends management messages between systems
- echo request, echo reply
- destination unreachable
- Ping command
ICMP (Internet Control Message Protocol)
ICMP provides e_______ c________ and reporting functionality. Great tool for t____________ a network.
error checking; troubleshooting
ICMP command
ping space dash the address to be pinged
Ex. ping -google.com
ping -?
Transmission Control Protocol
-Assures delivery of packets through e____-c______ (data sequencing)
error-checking
Transmission Control Protocol Connection Oriented: 3 way handshake -SYN --->SYN/ACK--->ACK -r\_\_\_\_\_\_\_\_\_ delivery -virtual connection between 2 devices
reliable
A scaled-down, economic version of TCP
User Datagram Protocol
UDP-User Datagram Protocol
- c__________ and u_________
- No Data r_________
- “Best effort”
- used a lot for streaming real-time data: voIP, video streams, audio streams
connectionless;unreliable
retransmission
With reliability and assurance, comes a cost. _____ packets are much larger than _______ packets, so they take more bandwidth.
TCP; UDP
If you need to reliabily deliver IP packets which transport layer protocl should be used?
TCP
If you need fast, economical IP packet delivery which transport protocl should be used?
UDP
Management protocol that converts domain name to IP address
Ex. google.com—>74.125.224.52
Domain Name Services (DNS)
DNS command
NSLOOKUP
Management program that automatically synchronizes clocks on network devices
Network Time Protocol (NTP)
Mangement protocol that is used for network mangement and maintenance
SNMP-SImple Network Management Protocol
Communication Protocol that:
- Provides a virtual terminal protocol logging into and managing devices remotely
- Not used often anymore because unencrypted communication
Telnet (TCP)
Communication Protocol that
- Looks and acts like telnet, but communicationis encrypted
- PuTTY SSH Client Popular
SSH-Secure Shell (TCP)
File transfer application that:
- Transfers files between systems
- authentications with a username and password
- full-featured functionality (list, add, delete,etc.)
FTP-FIle Transfer Protocol
File transfer applicaiton that
- very simple file transfer appliation
- can send adn receive files; no directory browsing
- no authentication
TFTP-Trivial File Transfer Protocol
Mail application protocol that’s:
- used most often for sending mail
- transferring between mail servers
Simple Mail Transsfer Protocol (TCP)
Mail application protocol that’s used to:
- receive email
- designed for intermittent connectivity
Post Office Protocl version 3 (TCP)
Mail application protoocl that’s used to:
-allows users to access email on servers and either read the email on the server or download the email to the client machine
Internet Message Access Protocl v4 (TCP)
Browser application protocol that porovides for browsing services for the WWW
HTTP-Hypertext Transfer Protocol (TCP)
Browser application that provides for access to resources on the internet in a secure fashion; encryption via TLS/SSL
HTTPS- Hypertext transfer protocol secure (TCP)
Browser application that utilizes cryptographic protocols for enabling secure online data-transfer activities
TLS/SSL-Transport Layer Security and Secure socket layer
Voice over IP (VoIP) protocols
Sets up and tears downvoice and video calls over the itnernet
SIP (Session Initiation Protocol) TCP
Voice over IP (VoIP) protocols
The standard for delivering audio and video over the internet. Commonly employed for streaming media, video conferencing, and VoIP.
RTP (Real-Time Transport Protocol (UDP)
Voice over IP (VoIP) protocols
Will commonly use reliable ____to set-up and manage the session, but _____to send the real-time data.
TCP; UDP
Computers require ports because of network applicaiton m____________
multitasking
Ports allow you to associate packets with ____/_____ protocols
TCP/IP
Because a computer has 1 IP and MAC address, it needs ports to differentiate network p__________ and s_______
protocols; services
Communication originates from your computer utilizing a h____________ r_______ p______ to communicate across a LAN/WAN/Internet to communicate with a remote server, in this case a web server. The Web will be listening in on specific ports for its associated TCP/IP protocols.
high random port
- Logical addresses
- Allows network to network communication via routers
- WAN communication
- Dotted Decimal Notation
Network
What OSI Layer are Network addresses (IP addresses on)
Network Layer (OSI Layer 3)
- Physical Addresses
- Allows internetwork communication via hubs, switches, and routers
- LAN communication (switching)
- Physically burned on NIC
MAC address (OSIL Layer 2)
Two parts of an IP address
Network address+Host Address=IP address
Part of an IP address that uniquely identifies each network
Network Address
Part of an IP address that uniquely identifies each machine on a network
Host Address
A private IP address is a n_________ IP address
non-routable
If a router receives a private IP address, it will ________ it.
drop
Private IP addresses are unable to communicate across the ______.
Uses Network Address Translation (NAT) to route traffic from network to network.
-c________ one address to another to allow a private IP address to communicate with the WAN through the public address.
WAN
converts
The process of breaking up Class A, B, and C networks into smaller, more manageable networks
Subnetting
We b_________ host bits to create more s_________ for a Class A, B, or C network
borrow; sub-networks
When you borrow host bits, you ________ the amount of sub-networks, aka Subnets available to you and __________ the amount of host IP addresses available to you.
increase; decrease
Subnetting allows you to create m______ l_______ n_______ that exist within a single Class A, B, or C network
-i.e., break a major network down into multiple smaller sub-networks, i.e. subnets
multiple logical networks
If you don’t subnet, you are only able to use _____ network from Class A, B, or C network, which isn’t realistic
one