MTA 98-366 Udemy Cert Study Cards Flashcards
Client-Server Network?
- Network is Composed of Clients and Servers
- Servers Provide Resources
- Clients Receive Resources
- Servers Provided Centralized Control Over Network Resources (files, printers, authentication, etc.)
Peer-to-Peer Network?
- All Computers on the Network Are Peers
- No Dedicated Servers
- There Is No Centralized Control over Shared Resources
- Any Individual Machine Can Share Its Resources as It Pleases
- All Computers on the Network Can Act as Either a Client (Receive Resources) or a Server (Provide Resources)
LAN?
Local Area Network
A Computer Network with a Small Geographical Area, such as a Single Room, Building or Group of Buildings.
CAN?
Campus Area Network
A Computer Network of Multiple Interconnected LANs in a Limited Geographical Area, such as a Corporation, Government Agency, or University Campus.
MAN?
Metropolitan Area Network
A Computer Network that Interconnects Users with Computer Resources in a City.
Larger than a Campus Area Network, but Smaller than a Wide Area Network.
WAN?
Wide Area Network
A Computer Network that extends over a large geographical distance, typically multiple Cities and Countries.
MAC Address?
- Physical Address of the Network Adapter Card
- OSI Layer 2 (Data Link) Layer Address
- TCP/IP Layer 1 (Network Interface) Layer Address
- 6 Bytes (48 bits), Usually Represented Hexadecimal
Duplex Communication?
Network Communication will occur in either full or half duplex mode.
Half Duplex - Can send and Receive Data, but not at the same time.
Full Duplex - Can send and Receive Data simultaneously.
Physical & Logical Network Topologies?
Physical - Define the Physical Design of a Network, including the Network Devices, Locations, and Cables. Similar to a Building Blueprint.
Logical - Define how data moves throughout a Network (CSMA/CA, CSMA/CD, Ethernet.
Bus Topology?
All devices are connected to a single network Cable.
Terminators are required for both ends of the cable.
A single break in the cable will take down the entire network.
Ring Topology?
All devices are connected in a circular fashion.
Each computer is connected to two other computers.
Data travels from node to node with each computer handling data, either unidirectional or bidirectional.
Star Topology?
All devices are connected to a Central Device. (Usually a Switch or a Hub)
Popular topology in today’s networks.
Used in most large and small networks.
Central device is a single Point of Failure.
Mesh Topology?
Each device is connected to every other device by separate cabling.
Highly redundant and fault-tolerance.
Used in WANs.
Expensive to Install.
Types of Network Cabling?
Coaxial
Twisted Pair
Fiber Optic
Ethernet?
- Is a Network Protocol that controls how data is transmitted over a LAN.
- Referred to as the Institute of Electrical and Electronics Engineers (IEEE) 802.3 Standard.
- It supports networks built with thin and thick coaxial, twisted-pair, and fiber optic cabling.
- The original Ethernet Standard supported 10Mbps Speeds, but the latest supports much faster speeds.
- Ethernet uses CSMA/CD access methodology.
Ethernet xxBaseT Naming details?
Ethernet uses a “xx Base T” naming convention.
• xx: Speed of the Cable.
• Base: Baseband communication (Single Frequency)
• T: Type of Cable.
Ethernet xxBaseT Naming? (From Twisted Pair to Fiber)
10BaseT - 10Mbps Twisted-Pair Standard Ethernet
10BaseF - 10Mbps Fiber Optic Standard Ethernet
100BaseT - 100Mbps Twisted-Pair Fast Ethernet
100BaseF - 100Mbps Fiber Optic Fast Ethernet
1000BaseT - 1Gbps Twisted-Pair Gigabit Ethernet
1000BaseF - 1Gbps Fiber Optic Gigabit Ethernet
Twisted-Pair Copper Cabling?
Why are they Twisted?
Security Concerns?
4 Twisted Pairs of Wires with a RJ-45 Connector.
Balanced Pair operation
• + & - Signals
• Equal & Opposite Signal
To help reduce Interference, Crosstalk, Noise.
Security Concerns consist of Signal Emanations
100 Meters Max Distance, Signal Attenuation.
Shielded VS Unshielded Twisted Pair?
UTP - Unshielded Twisted-Pair = More susceptible to electromagnetic interference EMI.
STP - Shielded Twisted-Pair = Less susceptible to EMI and Crosstalk (if each pair is shielded).
EMI - Electromagnetic Interference = The disruption of the operation of an electronic device when it’s in the vicinity of an electromagnetic field caused by another electronic device. (Manufacturing Equipment, Microwave Ovens, etc.)
Twisted-Pair Copper Cabling Categories?
Category 3 - CAT3 = 10Mbps Category 5 - CAT5 = 100Mbps Category 5e - CAT5e = 1Gbps Category 6 - CAT6 = 1Gbps & 10Gbps for Shorter Runs Category 6a - CAT6a = 10Gbps
Plenum-Rated Cable?
Plenum-Rated cables have a special insulation (Teflon Coated) that has low smoke, low flame, and non-toxic characteristics.
If they catch fire, they won’t release toxic fumes.
Twisted-Pair Wiring Standards - 2 Standards?
568A & 568B
568B is Newer and the Recommended Standard.
Either can be used.
Standards are Important to Lower Costs, Increase Interoperability, and Easier Maintenance.
Straight-Through Cable?
Connecting “UNLIKE” Devices
• Computer to Switch
• Switch to Router
Crossover Cable?
Connecting “LIKE” Devices.
• Router to Router
• Computer to Computer
Fiber Optic Cabling?
Glass or Plastic Fiber that Carries Light.
• High Bandwidth
• Long Distances
• Immune to Electromagnetic Interference (EMI)
• Doesn’t Emanate SIgnals
Two Types:
• Multi-Mode Fiber (MMF) - Shorter Distances (LAN)/Building to Building up to 1 Miles.
• Single-Mode Fiber (SMF) - More expensive, Longer Distances WAN/Across Town, up to 25 Miles.
Fiber Optic Cable Characteristics?
Single-Mode – 10Gbps – 25 Miles – Glass Core
Multi-Mode – 10Gbps – 300 Meters – Plastic Core
Multi-Mode – 1Gbps – 500 Meters – Plastic Core
Multi-Mode – 100Mbps – 1 Mile – Plastic Core
The OSI Model?
Breaks down the Complex Task of Computer-To-Computer Network Communication into 7 Layers.
Upper Layers = Host Layers
• Handled by the Host Computer and Performs Application-Specific Functions, such as Data Formatting, Encryption, and Connection Management.
Lower Layers = Media Layers
• Provide Network-Specific functions, such as routing, addressing, and flow control.
The OSI Model?
7 - Application Layer – DATA - Host Layer ———— ALL
6 - Presentation Layer – DATA - Host Layer ———- PEOPLE
5 - Session Layer – DATA - Host Layer —————– SEEM
4 - Transport Layer – Segment - Media Layer ——- TO
3 - Network Layer – Packet - Media Layer ———— NEED
2 - Data Link Layer – Frame - Media Layer ———– DATA
1 - Physical Layer – Bit - Media Layer ——————- PROTECTION
OSI Layer 1?
Physical Layer - Defines the Physical and Electrical Medium for Network Communication.
• Send Bits and Receives Bits (1’s and 0’s)
• Network Cabling, Jacks, Patch Panels, etc…
• Encoding Signal Types
• Ethernet IEEE 802.3 Standard
OSI Layer 2?
Data Link Layer - Provides Physical Transmission of the Data.
• Ensures that Messages are Delivered to the Proper device on a LAN using Hardware Addresses (MAC Address)
• Translates Messages from the Network Layer into Bits for the Physical Layer.
• The “Switching” Layer.
OSI Layer 3?
Network Layer - AKA, the Routing Layer - Provides logical addressing and routing services.
• Places Two Addresses in the Packet
- Source Address & Destination Address
• Internet Protocol (IP)
- The Primary Network Protocol used on the Internet, IPV4 and IPv6 Logical Addresses.
OSI Layer 4?
Transport Layer - Ensures data is delivered error-free and in sequence.
• Segments data and reassembles correctly.
• Can be connection-oriented (TCP) or connection-less (UDP).
• Considered the “Post Office” Layer
- TCP (Transmission Control Protocol)
- UDP (User Datagram Protocol)
OSI Layer 5?
Session Layer - Responsible for setting up, managing, and then tearing down sessions between network devices.
• Ensures data from different application sessions are kept separate.
• Coordinates communication between systems - Start, Stop, Restart.
OSI Layer 6?
Presentation Layer - Ensures that data transferred from one system’s Application Layer can be read by the Application Layer on another one.
• Provides Character code conversion, data compression, and data encryption.
• Example - HTML Converted to ASCII Format.
OSI Layer 7?
Application Layer - Where users communicate to the Computer
• Acts as an Interface between an application and end-user protocols.
• Provides an interface to communicate with the network (Outlook, Chrome, etc…)
• Applications doesn’t reside in the Application Layer protocol, but instead interfaces with Application-Layer Protocol.
The TCP/IP Model?
- The CTP/IP Suite is the Most Common used Protocol Suite in the Networking World.
- It is essentially the protocol suite in which the Internet was built.
- It is the Standard for Computer Networking
- It is based on a 4 Layer Model, that is similar to the OSI Model.
TCP/IP Model?
• Transmission Control Protocol/Internet Protocol
• Common called the Internet Protocol Suite because it was designed for the Internet, but LANs use it too.
• First Two Protocols Defined in the Suite Were — TCP and IP, hence TCP/IP.
• Similar to the OSI Model, but Simpler:
- OSI is Conceptual
- TCP/IP was Actually Implemented
TCP/IP 4 Layers?
Application – FTP, TFTP, DNS, HTTP(S), TLS/SSL, SSH, POP3, IMAP4, NTP, Telnet, SMTP, SNMP
Transport – TCP, UDP, and Ports
Internet – IP Addressing (Routing), ICMP, ARP
Network Interface – Ethernet, Token Ring
Internet Control Messaging Protocol?
ICMP = Provides Error Checking and Reporting Functionality
• Sends management messages between systems
- Echo Request, Echo Reply
- Destination Unreachable
• Great tool for troubleshooting network - PING Command
• Command: ping google.com
Address Resolution Protocol?
ARP = Resolves IP Addresses to MAC Addresses
• Finds the Hardware Address of a Host from a Known IP Address and visa versa (RARP).
• Command: arp -a
Transmission Control Protocol?
TCP = Connection-Oriented, 3 Way Handshake
• SYN > SYN/ACK > ACK
• Reliable Delivery of Data in Correct Order
• Virtual Connection Between 2 Devices.
• Assures delivery of packets through error-checking (Data Sequencing).
User Datagram Protocol?
UDP = Scaled-Down, Economic version of TCP
• Connectionless and Unreliable
• No Data Retransmissions
• “Best Effort”
• Used a lot for Streaming Real-Time data, VOIP, Video Streams, Audio Streams, etc..
TCP/UDP Ports?
- Computers require Ports because of Network Application Multitasking.
- Ports allow you to associate packets with TCP/IP Protocols.
- Network Services are assigned a Port Number - DNS, HTTP, FTP, POP3, Telnet, Etc. etc.
Types of Ports and Basic Port Info?
Approximately 65,536 Ports Available.
Well Known Ports – 0 to 1023 – Assigned to Well Known Protocols
Registered Ports – 1024 to 49,151 – Registered to Specific Protocols
Dynamic Ports – 49,152 to 56,535 – Not Registered and Used for any Purposes.
FTP Port?
File Transfer Protocol – 20, 21 – TCP
SSH Port?
Secure Shell Protocol – 22 – TCP
Telnet Port?
23 – TCP
SMTP Port?
Simple Mail Transfer Protocol – 25 – TCP
DNS Port?
Domain Name System – 53 – UDP
DHCP Port?
Dynamic Host Configuration Protocol – 67, 68 – UDP
TFTP Port?
Trivial File Transfer Protocol – 69 – UDP
HTTP Port?
Hypertext Transfer Protocol – 80 – TCP
Kerberos Port?
88 – UDP
POP3 Port?
Post Office Protocol v3 – 110 – TCP
NTP Port?
Network Time Protocol – 123 – UDP
IMAP4 Port?
Internet Message Access Protocol v4 – 143 – TCP
SNMP Port?
Simple Network Management Protocol – 161 – UDP
LDAP Port?
Lightweight Directory Access Protocol – 389 – TCP
SSL Port?
Secure Socket Layer – 443 – TCP
HTTPS Port?
Hypertext Transfer Protocol Secure – 443 – TCP
IPSec Port?
Internet Protocol Security – 500 – UDP
L2TP Port?
Layer 2 Tunneling Protocol – 1701 – UDP
PPTP Port?
Point to Point Tunneling Protocol – 1723 – TCP
RDP Port?
Remote Desktop Protocol (RDS - Remote Desktop Service) – 3389 – TCP
Ports in Action?
Communication originates from your computer utilizing a high random port to communicate across a LAN/WAN/Internet to communicate with a Remote Server.
The Web Server will be listening in on a Specific Port for it’s associated TCP/IP Protocols.
Browser Application Protocols?
HTTP - Hypertext Transfer Protocol
• TCP
• Provides for browsing services for the WWW (World Wide Web)
HTTPS - Hypertext Transfer Protocol SECURE
• TCP
• Provides access to resources on the Internet in a secure fashion.
• Encryption via TLS/SSL
TLS/SSL - Transport Layer Security & Secure Socket Layer
• TCP
• Cryptographic protocols for enabling secure online data-transfer activities
• TLS has replaced SSL
File Transfer Application Protocols?
FTP - File Transfer Protocol
• TCP
• Transfers files between systems
• Authentications with a username and password
• Full-Featured functionality (List, Add, Delete, Etc.)
TFTP - Trivial File Transfer Protocol
• UDP
• Very simple file transfer application
• Can send and receive files; no directory browsing
• No Authentication
Mail Application Protocols?
SMTP - Simple Mail Transfer Protocol • TCP • Used most often for SENDING Mail. • Transferring between mail servers. POP3 - Post Office Protocol v3 • TCP • Receive Email • Designed for intermittent connectivity IMAP4 - Internet Message Access Protocol v4 • TCP • Another mail Client Protocol • Allows users to access email on servers and either read the email on the server or download the email to the client machine.
Management Protocols?
DNS - Domain Name Services
• Converts domain names to IP Addresses
• Google.com = 74.125.224.52
• NSLookup Command
NTP - Network Time Protocol
• Automatically synchronized clocks on network devices.
SNMP - Simple Network Management Protocol
• SNMPv1, SNMPv2, SNMPv3
• Collects and manipulates network information
• Used for Network management and maintenance.
• v1 - The Original, Clear Text Data
• v3 - Encrypted Data