Introduction to networking Flashcards

1
Q

What is the difference between a physical topology and a logical topology?

A

The physical topology refers to hardware and how it fits together to form the physical network.
A logical topology refers to the software and how network access is controlled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List some examples of a network operating system (NOS)

A

Windows Server, Ubuntu Server, Red Hat Enterprise Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the Peer-to-Peer (P2P) Networking Model and its advantages + disadvantages.

A

P2P: The OS on each computer is responsible for controlling access to resources w/o centralized control.
Advantages: simple to configure, less expensive.
Disadvangtages: Not scalable, less secure, becomes too time consuming to manages network resources as you add additional nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the Client-Server network model and the advantages it has over peer-to-peer networks.

A

Client-Server: Resources are managed by a Network Operating System (NOS) via a centralized directory database (i.e. Active Directory).
Advantages: User accounts + passwords are stored in one place, you can fix network problems from one location, more scalable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a protocol?

A

A protocol is a set of rules for communication between two networked devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List some popular client-server applications.

A

Web Service, E-mail service, FTP (File Transfer Protocol) Service, Telnet service, remote applications, remote desktop on Windows (uses RDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What protocols are used by a web service?

A

Primary protocol is HTTP (Hypertext transport protocol). It can also be layered on top of an encryption protocol (i.e. SSL, TLS) to form HTTPS (secure HTTP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What protocols are used by e-mail services?

A

E-mail clients use SMTP (Simple mail transfer protocol) to send e-mail messages. A recipient’s mail server delivers a message via POP (Post office Protocol) or IMAPv4 (Internet message access protocol, version 4).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a “backbone?”

A

A backbone is a centran conduit that connects segments of a network, sometimes called a “network of networks.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List the different topologies that exist on LANs.

A

Star topology - All nodes connect to one centralized device (i.e. a switch).
Mesh topology - each device connects to other multiple devices
Bus topology - multiple switches/routers are daisy-chained together in a single line.
Star-bus topology - combines a bus topology with a star topology. Each switch has nodes connected to it.
Ring Topology - nodes are connected in a ring with one node only connecting to its 2 neighboring ones. Rarely used today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between a host and a node?

A

A host is any computer on a network that hosts a resource, and a node refers to any computer/device on a network that can be addressed on the local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the OSI Model?

A

The OSI model is a seven-layer model that is used to categorize the layers of communication between different networked devices. It is listed in descending order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the Application layer, and list some of the protocols that use it,

A

It describes the interface between two applications, each on separate computers. Examples: HTTP, SNMP (Simple Network Management Protocol).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the Presentation layer.

A

It is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the Session Layer.

A

It describes how data between applications are synced and recovered if messages do not arrive intact at the receiving application. Example: Skype works with your OS to establish+maintain a session between 2 end points for however long a conference/call is in progress.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the Transport Layer and the 2 main protocols that use it.

A

It is responsible for transporting Application Layer payloads from one application to another. The 2 main protocols that use it are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). TCP is connection-oriented and guarantees transmission of data. UDP does not guarantee delivery, but is much faster (a connectionless or best-effort protocol)

17
Q

Describe the Network layer.

A

Also called the Internet Layer, it’s responsible for moving messages from one node to another until they reach the destination host. The Internet Protocol (IP) is the main protocol used in this layer.

18
Q

Describe the Data Link layer.

A

The Data Link layer works with the physical layer in interfacing with the physical hardware on the local network. Ethernet and wi-fi are both data link protocols. Data link message are called frames and include the source and destination MAC addresses.

19
Q

Describe the Physical layer.

A

The Physical layer is the simplest of the 7 layers and is only responsible for transmitting bits via a wired or wireless connection.

20
Q

What is a protocol data unit (PDU), and what are the names for a PDU at each layer of the OSI model?

A

A PDU is a group of bits as it moves from one LAN to the next.
Layer 7, 6, and 5 = Payload
Layer 4 = Segment (TCP) or Datagram (UDP)
Layer 3 = Packet
Layer 2 = Frame
Layer 1 = Bit or transmission

21
Q

Identify the 7 steps (in order) to use when troubleshooting a network problem.

A
  1. Identify the problem (interview the user, reproduce the problem)
  2. Establish a theory of probable cause. Make your best guess.
  3. Test your theory to determine the cause.
  4. Establish a plan of action to resolve the problem. Understand how it will affect users, their applications, and data.
  5. Implement the solution, or if necessary, escalate the problem. Make sure you backup data and software as needed first.
  6. Verify functionality and implement preventative measures.
  7. Document your findings, actions, and outcomes