Module 1: Basics of Networking Flashcards

Review: - LAN, MAN, WAN,CAN, PAN - Internet, Subnet, intranets, extranets. - Wired topologies: logical vs physical, star, ring, mesh and bus. - The OSI model - Protocols and ports - Numbering systems

1
Q

What is a Network

A

A group of interconnected computers and other devices that able to share information with each other..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Node/Host

A

The individual devices connected to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Connected Media

A

The medium in which a host is connected to a network (example: cables or wifi).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Network Interface

A

Converts the digital data from a host to some form of signal (light, electric signals, radio, etc..) to travel from the host, to the network, then back to digital data that other hosts can interpret .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Network Protocol

A

Standards (like a key to a scrambled message) to define how data will be formatted. All computers must use the same protocol on the network or they will not be able to understand the data being communicated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some of the benefits of networks?

A

○ Reduce the need to buy multiple tools for every computer such as a printer or fax.
○ Consolidate storage into one place so each host can access the same information.
○ Data security since all the sensitive data is in one place.
○ Easier to back up one shared storage than each individual computer.
○ Reduce Telephone expenses.
○ Workflow management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a peer to peer network?

A

Individual hosts don’t have a specific role. They provide and consume network services; function as a client and a server at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some advantages of a peer to peer network?

A
  • Easy to Implement
  • No special software needed
  • Inexpensive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some disadvantages of a peer to peer network?

A
  • Not scalable (The bigger it gets, the harder it is to manage).
  • Difficult to support as there are no central controls.
  • If a device(like a printer) is connected to computer, it is unreachable from other hosts if that computer is turned off.
  • No centralized storage of data.
  • increased security risk.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a client-server network

A

A network where hosts have specific roles. Some hosts could act as servers while the others just act as clients. The server provides the resources, the clients use those resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are two types of networks?

A
  1. Peer-to-peer.

2. Client-server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are advantages of client-server network

A
  • Easily scalable
  • Easier to support as it’s more centralized.
  • Better security.
  • Centralized storage.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some disadvantages of a client-server network?

A
  • Very expensive

- Requires lots of planning to figure which clients will be servers and where they will be placed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a subnet?

A

A part of a larger network where all of the computers share the same subnet address (much like houses share the same street address). Also referred to as a network address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a router?

A

A device that connects multiple subnets together to make a bigger network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does LAN stand for?

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a LAN?

A

A collection of connected subnets within the same organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does MAN stand for?

A

Metropolitan Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a MAN?

A

Many LAN’s connected in one area; A collection of interconnected networks within the same metropolitan area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does WAN stand for?

A

Wide Area Network links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a WAN?

A

A collection of MAN’s connected together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is an Internetwork?

A

When two different networks, such as two LAN’s, use something like a WAN to connect to each other, but aren’t controlled by the same entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the Internet?

A

A collection of many different networks owned by many different entities, that share information and communicate with one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does ISP stand for?

A

Internet Service Providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What does an ISP do?

A

Manage an access point to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is an Intranet?

A

A private network available to those only within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is an Extranet.

A

A private network that allows authorized external users, but not available to the public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What does CAN stand for?

A

Campus Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a CAN?

A

A computer network made up of an interconnection of local area networks (LANs) within a limited geographical area, such as a university’s campus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What does PAN stand for?

A

Personal Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a PAN?

A

A very small network used for communicating between personal devices, such as Bluetooth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is Topology?

A

The term used to describe how devices are connected and how messages flow from device to device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What does a Terminator do?

A

They absorb signals and prevent them from reflecting repeatedly back and forth on the cable. Terminators are used with bus topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a physical topology?

A

Describes the way the network is wired.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a logical topology?

A

Describes the way messages are sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Describe a Bus topology.

A

A bus topology consists of a trunk cable with nodes either inserted directly into the trunk or tapped into the trunk using offshoot cables called drop cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Describe a Ring topology.

A

A ring topology connects neighboring nodes until they form a ring. Signals travel in one direction around the ring; each device on the network acts as a repeater to send the signal to the next device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Describe a Star topology.

A

A star topology uses a hub or switch to connect all network connections to a single physical location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which is the most popular type of topology used for a LAN?

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Describe a Mesh topology.

A

A mesh topology exists when there are multiple paths between any two nodes on a network. Mesh topologies are created using point-to-point connections. This increases the network’s fault tolerance because alternate paths can be used when one path fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are the two types of Mesh topologies?

A

Partial mesh: Some redundant paths exist.

Full mesh: Every node has a point-to-point connection with every other node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

True or False: The logical topology is always the same as the physical.

A

False. A network can use one type of physical topology, while also use an entirely different logical topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

How does a logical bus topology work?

A

The data is sent to ALL the computers. The computers then determine if the data is meant for them or not. If not, it discards it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

How does a logical ring topology work?

A

One computer sends data to the next computer until it reaches its destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

How does a logical star topology work?

A

Data is sent to the central connecting device which then routes the data directly to the intended computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

How does a logical mesh topology work?

A

Uses redundancy to create links between the computers. This is far more practical when using wireless communication as each computer will have direct access to the other computers (unless using a partial which means some may only have direct access to some others instead of the whole).

47
Q

What does OSI stand for?

A

Operation Systems interconnection

48
Q

What is the OSI Model?

A

A theoretical way of classifying and talking about the complex process of sending data on a network.

49
Q

What are the layers of the OSI Model?

A
  1. Application
  2. Presentation
  3. Session
  4. Transport
  5. Network
  6. Data Link
  7. Physical
50
Q

What does the Application layer of the OSI model do?

A

Integrates network functionality into the host operating system and enables communication between network clients and services.

51
Q

True or False: Protocols for a layer can span multiple layers in in the OSI model.

A

True. Protocols are classified as the layer from which they start, regardless of how many layers they operate in.

52
Q

What are the typical servers associated with the Application layer in the OSI model?

A
  • HTTP
  • Telnet
  • FTP
  • TFTP
  • SNMP
53
Q

What does the Presentation layer of the OSI model do?

A

Formats, or presents, data in a compatible form for receipt by the Application layer or the destination system:

  • Formatting and translation of data between systems.
  • Negotiation of data transfer syntax between systems by converting character sets to the correct format.
  • Encapsulation of data into message envelopes by encryption and compression.
  • Restoration of data by decryption and decompression.
54
Q

What does the Session layer of the OSI model do?

A

Manages the sessions in which data are transferred:

  • Management of multiple sessions (each client connection is called a session). A server can concurrently maintain thousands of sessions.
  • Assignment of a session ID number to each session to keep data streams separate.
  • The setup, maintenance, and teardown of communication sessions. (Connection Establishment)
55
Q

What does the Transport layer of the OSI model do?

A

provides a transition between the upper and lower layers of the OSI model, making the upper and lower layers transparent from each other:

  • End-to-end flow control.
  • Port and socket numbers.
  • Segmentation, sequencing, and combination.
  • Connection services, either reliable (connection-oriented) or unreliable (connectionless) delivery of data.
56
Q

What is another term for Data Segments in the Transport layer of the OSI model?

A

Segments

57
Q

What does the Network layer of the OSI model do?

A

describes how data is routed across networks and on to the destination:

  • Identifying hosts and networks by using logical addresses.
  • Maintaining a list of known networks and neighboring routers.
  • Determining the next network point where data should be sent. Routers use a routing protocol that takes various factors into account, such as the number of hops in the path, link speed, and link reliability, to select the optimal path for data.
58
Q

What is another term for Data Segments in the Network layer of the OSI model?

A

Packets

59
Q

What does the Data Link layer of the OSI model do?

A

Defines the rules and procedures for hosts as they access the Physical layer:
- How physical network devices are identified on the network by defining a unique hardware address (physical or MAC address).
- How and when devices have access to the LAN and can transmit on the network medium (media access control and logical topology).
- How to verify that the data received from the Physical layer is error free (parity and CRC).
- How devices control the rate of data transmission between hosts (flow control).
(*Identifying physical network devices, controlling how messages are propagated through the network.)

60
Q

What is another term for Data Segments in the Data Link layer of the OSI model?

A

Frames

61
Q

In what layer of the OSI model do Switches bridges, NICs, and WAPs function?

A

Data Link (Layer 2)

62
Q

What does the Physical layer of the OSI model do?

A

Sets standards for sending and receiving electrical signals between devices:

  • How digital data (bits) are converted to electric pulses, radio waves, or pulses of light and moved across network cables.
  • Specifications for cables and connectors.
  • The physical topology.
63
Q

What is another term for Data Segments in the Physical layer of the OSI model?

A

Bits.

64
Q

In what layer of the OSI model do NICs, repeaters, hubs, WAPs, and Modems function?

A

Physical (Layer 1)

65
Q

What are the layers of the TCP/IP model?

A
  • Application
  • Host-to-Host
  • Internet
  • Network Access
66
Q

Which layer(s) in the OSI model correspond to the Application layer in the TCP/IP model?

A
  • Application (Layer 7)
  • Presentation (Layer 6)
  • Session (Layer 5)
67
Q

Which layer(s) in the OSI model correspond to the Host-to-Host layer in the TCP/IP model?

A

Transport (layer 4)

68
Q

Which layer(s) in the OSI model correspond to the Internet layer in the TCP/IP model?

A

Network (Layer 3)

69
Q

Which layer(s) in the OSI model correspond to the Network Access layer in the TCP/IP model?

A
  • Data Link (Layer 2)

- Physical (Layer 1)

70
Q

What are the two sublayers of the Data Link Layer of the OSI model?

A
  • MAC (Media Access Control)

- LLC (Logical Link Control)

71
Q

What does the sublayer MAC do in the Data link layer of the OSI model?

A

Defines a unique MAC or data-link address for each device on the network. This address is usually assigned by the manufacturer. The MAC sublayer also provides devices with access to the network media.
(Lets devices on the network have access to the LAN, Defines a unique hardware address for each device on the network).

72
Q

What does HTTP stand for?

A

Hypertext Transfer Protocol

73
Q

What is HTTP used for?

A

Web browsers and web servers use HTTP to exchange files (such as web pages) through the world wide web and intranets.

74
Q

What does SSL stand for?

A

Secure Sockets Layer

75
Q

What does TLS stand for?

A

Transport Layer Security

76
Q

What does TLS do?

A

Ensures that messages being transmitted on the internet are private and tamper proof. TLS is implemented through two protocols:
TLS Record can provide connection security with encryption (for example, with DES).
TLS Handshake provides mutual authentication and choice of encryption method.

77
Q

What does SSL do?

A

Secures messages being transmitted on the internet. It uses RSA for authentication and encryption. Web browsers use SSL to ensure safe web transactions. URLs that begin with https:// trigger your web browser to use SSL.

78
Q

What does FTP stand for?

A

File Transfer protocol

79
Q

What does FTP do?

A

FTP provides a generic method for transferring files. It can protect access to files by requiring user names and passwords, and it allows file transfer between dissimilar computer systems. FTP can transfer both binary and text files, including HTML, to another host. FTP URLs are preceded by ftp:// followed by the DNS name of the FTP server. To log in to an FTP server, use ftp://username@servername.
* Does not use encryption

80
Q

What does TFTP stand for?

A

Trivial File Transfer Protocol

81
Q

What does TFTP do?

A

TFTP tranfers files between the host and am FTP server quickly, but without error detection or user authentication. More prone to transmission errors.

82
Q

What does SFTP stand for?

A

Secure File Transfer Protocol

83
Q

What does SFTP do?

A

Uses Secure Shell (SSH) to secure data transfers. SSH ensures that SFTP transmissions use encrypted commands and data, which prevents clear text data transmissions.

84
Q

Does SCP stand for?

A

Secure Copy

85
Q

What does SCP do?

A

Used to securely transfer files between systems. Like SFTP, SCP relies on SSH to ensure that data and passwords are not transmitted over the network in clear text.

86
Q

What does SMTP stand for?

A

Simple Mail Transfer Protocol

87
Q

What does SMTP do?

A

Used to route electronic mail through the internetwork. SMTP is used:

  • Between mail servers for sending and relaying mail.
  • By all email clients to send mail.
  • By some email client programs, such as Microsoft Outlook, to receive mail from an Exchange server.
88
Q

What does POP3 stand for?

A

Post Office Protocol 3

89
Q

What does POP3 do?

A

Is used to retrieve email from a remote server and download it to a local client over a TCP/IP connection.
*Uses SMTP to send the mail.

90
Q

What dose IMAP4 stand for?

A

Internet Message Access Protocol Version 4

91
Q

What does IMAP4 do?

A

Is an email retrieval protocol designed to enable users to access their email from various locations without the need to transfer messages or files back and forth between computers. Messages remain on the remote mail server and are not automatically downloaded to a client system.
* uses SMTP to send mail

92
Q

What does DHCP stand for?

A

Dynamic Host Configuration

93
Q

What does DHCP do?

A

Used to automatically assign addresses and other configuration parameters to network hosts. Using a DHCP server, hosts receive configuration information at startup, reducing the amount of manual configuration required on each host.

94
Q

What does DNS stand for?

A

Domain Name System

95
Q

What dose a DNS do?

A

Is a distributed system throughout the internetwork that provides address and name resolution. For example, the name www.mydomain.com would be mapped to a specific IP address. (Takes an IP address and assigns a name to it for easier understanding on the users part)

96
Q

What does NTP stand for?

A

Network Time Protocol

97
Q

What does NTP do?

A

Is used to communicate time synchronization information between systems on a network.

98
Q

What does LDAP stand for?

A

Lightweight Directory Access Protocol

99
Q

What does LDAP do?

A

Used to search, retrieve data from, and update a directory service. The LDAP protocol follows a client/server model. One or more LDAP servers contain the directory data. The LDAP client connects to an LDAP Server to make a directory service request. By default, LDAP traffic is transmitted unsecured.

100
Q

What is LDAPS?

A

LDAPS is the lightweight directory access protocol over TLS/SSL. Using LDAPS makes LDAP traffic confidential and secure.

101
Q

What port does LDAPS use?

A

LDAPS uses TCP port 636.

102
Q

What does SNMP stand for?

A

Simple Network Management Protocol

103
Q

What does SNMP do?

A

Designed for managing complex networks. SNMP lets network hosts exchange configuration and status information. This information can be gathered by management software and is used to monitor and manage the network.

104
Q

What is the function of Telnet?

A

Terminal Emulation (Telnet) Telnet allows a computer to remotely access the console of a computer system somewhere else in the network. At one time, Telnet was widely used for remote management tasks, but it is rarely used today. Because Telnet does not use encryption, it is recommended that you use a secure alternative to Telnet for remote management tasks, such as SSH.

105
Q

What does SSH stand for?

A

Secure Shell

106
Q

What does SSH do?

A

Allows for secure interactive control of remote systems. SSH uses RSA public key cryptography for both connection and authentication. SSH uses the IDEA algorithm for encryption by default, but it can use Blowfish and DES. SSH is a secure and preferred alternative to Telnet.

107
Q

What does TCP stand for?

A

Transmission Control Protocol

108
Q

Does does TCP do?

A

TCP provides services that ensure accurate and timely delivery of network communications between two hosts. TCP provides the following services to ensure message delivery:

  • Sequencing of data packets
  • Flow control
  • Error checking
  • Acknowledgement of packets sent
  • Retransmission of lost packets
109
Q

What does UDP stand for?

A

User Datagram Protocol

110
Q

What does UDP do?

A

UDP is a host-to-host protocol like TCP, but it does not acknowledge each packet transmitted, nor does it allow for retransmission of lost packets. This reduces its overhead, allowing for faster communications and making UDP ideal for applications like streaming audio and video. However, this speed comes at the expense of possible errors or data loss.

  • *(Faster than TCP, but comes with a cost of higher chance of errors.)
  • *(Can use Connectionless datagram services)
111
Q

What does ICMP stand for?

A

Internet Control Message Protocol

112
Q

What does ICMP do?

A

ICMP works closely with IP to prevent errors and control information by allowing hosts to exchange packet status information. Two common management utilities, ping and traceroute, use ICMP messages to check network connectivity. ICMP also works with IP to send notices for the following:

  • When destinations are unreachable
  • Which route and hops a packet takes through the network
  • Whether devices can communicate across the network
113
Q

What does IGMP stand for?

A

Internet Group Management

114
Q

What does IGMP do?

A

IGMP defines host groups. All group members can receive broadcast messages (multicasts) intended for the group. Multicast groups can be composed of devices within the same network or across networks (connected with a router).