Netowrk Configuration Flashcards

1
Q

TCP/IP Protocol Suite

A
  • A set of rules (protocol) for communication between network devices.
  • Based on a four-layer model: Link (Network Interface), Internet, Transport, and Application.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Link/Network Interface Layer

A
  • Operates at the physical level.
  • Responsible for transmitting data over local area networks (LANs) using cables (copper, fiber optic) or wireless (Wi-Fi, Bluetooth).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internet Layer

A
  • Handles addressing and routing of packets across wide area networks (WANs).
  • Uses Internet Protocol (IP) for communication.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Transport Layer

A

Manages how data is sent using TCP (guaranteed delivery) or UDP (faster but not guaranteed).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Application Layer

A

Manages high-level protocols for tasks like email, file transfers, and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TCP

A

(Transmission Control Protocol)
Speed: Reliable but slower than UDP.
Uses: File transfers, email, web browsing.
Type: Connection-oriented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

UDP

A

(User Datagram Protocol)
Speed: Faster but less reliable.
Uses: Streaming, gaming, VoIP.
Type: Connectionless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IPv4

A

Internet Protocol Version 4 for device communication.

Address assignment: static (manual) or dynamic (via DHCP).

A 32-bit addressing protocol for devices on a network.

IPv4 Addressing:

IPv4 is the most common IP addressing method.
Address format: Four decimal numbers separated by dots (dotted decimal notation), e.g., 192.168.1.1.
Each part (octet) represents an 8-bit binary number (0–255).
Binary Representation:

An IPv4 address consists of 32 bits (4 octets × 8 bits each).
Subnet masks determine the network and host portions of an address.
- Types: Public, Private, Loopback, APIPA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Subnet Mask

A
  • Define which part of the IP address represents the network and which represents the host.
  • Example: Subnet mask 255.255.255.0 (binary: 11111111.11111111.11111111.00000000) means:
  • Network portion: 192.168.1
  • Host portion: .4
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPv4 Address Classes:

A

Class A: 1-127 (Default subnet mask: 255.0.0.0)
~16.7 million hosts per network.

Class B: 128-191 (Default subnet mask: 255.255.0.0)
~65,536 hosts per network.

Class C: 192-223 (Default subnet mask: 255.255.255.0)
~256 hosts per network.
Class D: 224-239 (Multicast addresses).

Class E: 240-255 (Experimental, not used publicly).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Subnetting:

A
  • Splits large networks into smaller ones for better efficiency and management.
  • Uses Classless Inter-Domain Routing (CIDR) notation, e.g., 192.168.1.1/24.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Private vs. Public IP Addresses:

A

Private IPs:
- Not routable over the Internet.
- Ranges:
Class A: 10.0.0.0–10.255.255.255
Class B: 172.16.0.0–172.31.255.255
Class C: 192.168.0.0–192.168.255.255

Public IPs:
- Routable over the Internet, assigned by ISPs.
- Addresses assigned for Internet use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Specialized IPv4 Addresses

A
  • Loopback
  • APIPA
  • DORA Process (Discover, Offer, Request, Acknowledge)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Loopback

A
  • (127.0.0.1)
  • Used for testing and troubleshooting network configurations.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

APIPA

A
  • Automatic private IP addresses
  • (169.254.0.0–169.254.255.255)
  • Self-assigns IP addresses from the 169.254.x.x range when DHCP is unavailable.
  • Allows local communication but cannot access external networks due to the lack of a default gateway.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DORA Process

A
  • (Discover, Offer, Request, Acknowledge)
  • The four-step process used by DHCP to assign dynamic IP addresses.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IP Address Assignment

A
  1. Static Assignment
  2. Dynamic Assignment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Static Assignment

A
  • Manual configuration of IP address settings for a device.
  • IP address, subnet mask, default gateway, and DNS server are manually configured.
  • Time-consuming and prone to errors, especially in large networks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Dynamic Assignment

A
  • Automatic allocation of IP address settings via protocols like DHCP, APIPA, or Zero-Config.
  • Reduces errors and simplifies management.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Components of a Fully Configured Client

A

:

IP Address
Subnet Mask
Default Gateway
DNS Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IP Address

A

Identifies the device on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Subnet Mask

A

Separates the network and host portions of an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Default Gateway

A

The router’s IP address used to access external networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DNS Server

A

Resolves domain names into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Zero-Config

A

Enhanced version of APIPA with additional features:
- mDNS (Multicast Domain Name Service) for resolving names to IPs without DNS.
- Service Discovery: Detects available devices (printers, scanners, etc.) on the network.

Implementations:
Apple: Bonjour.
Windows: LLMNR (Link Local Multicast Name Resolution).
Linux: Systemd-resolved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

BootP

A
  • Bootstrap Protocol
  • Predecessor to DHCP, introduced in 1985.
  • Uses a static database of MAC-to-IP mappings, making it less dynamic than DHCP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

WINS:

A

Windows Internet Name Service, used for resolving NetBIOS names to IPs in Windows environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

DHCP

A
  • Dynamic Host Configuration Protocol
  • Automates IP address assignment, reducing human errors and conflicts.
  • Assigns IPs from a defined scope (range of valid IP addresses) to devices.
  • Ensures no duplication of IPs through dynamic leasing.
    DHCP Lease Process (D.O.R.A): Discover, Offer, Request, Acknowledge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

DNS (Domain Name System)

A
  • Translates human-readable domain names (e.g., example.com) into IP addresses (e.g., 192.168.1.1) and vice versa.
  • Makes accessing web resources easier by using names instead of numeric IPs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

How DNS Works

A
  • A user enters a domain name (e.g., example.com) into their browser.
  • The computer contacts a DNS server to resolve the name to its corresponding IP address.
  • The DNS server responds with the IP address, enabling the computer to connect to the web server.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

DNS Hierarchy

A

Root Level
Top-Level Domains (TLDs)
Second-Level Domains
Subdomains
Host Level

32
Q

Root Level

A

Contains all top-level domains (TLDs) such as .com, .org, .edu.

33
Q

Top-Level Domains (TLDs)

A

Categorized as organizational (e.g., .com, .org) or geographic (e.g., .uk, .fr).

34
Q

Second-Level Domains

A

Specific names under TLDs (e.g., example in example.com).

35
Q

Subdomains

A

Optional levels beneath second-level domains (e.g., mail.example.com).

36
Q

Host Level

A

Identifies specific servers or machines on a network.

37
Q

FQDN

A
  • Fully Qualified Domain Name
  • A complete domain name specifying its exact location in the DNS hierarchy (e.g., www.example.com).
38
Q

Types of DNS Records

A

A Record
AAAA Record
CNAME Record
MX Record (Mail Exchange)
TXT Record
NS Record (Name Server):

39
Q

A Record

A
  • Maps a hostname to an IPv4 address.
  • Example: www.example.com → 192.168.1.1.
40
Q

AAAA Record

A
  • Maps a hostname to an IPv6 address.
    Example: - www.example.com → 2400:cb00:2049:1::a29f:1804.
41
Q

CNAME Record

A
  • Maps a domain or subdomain to another domain name.
  • Example: support.example.com → supportdesk.vendor.com.
42
Q

MX Record (Mail Exchange)

A
  • Directs email traffic to the correct mail server.
  • Includes priority for failover or load balancing.
43
Q

TXT Record

A

Stores human-readable or machine-readable text data.

Common uses:
- SPF (Sender Policy Framework): Identifies authorized email servers.
- DKIM (DomainKeys Identified Mail): Cryptographic authentication for emails.
- DMARC (Domain-based Message Authentication, Reporting, and Conformance): Enforces proper application of SPF/DKIM.

44
Q

NS Record (Name Server)

A

Specifies the authoritative name server for a domain.

45
Q

Types of DNS Lookups`

A

Recursive Lookup:

  • The DNS server queries other servers on behalf of the client and provides a final answer.
  • Used for most user requests.

Iterative Lookup:

-The DNS server provides the client with the address of another DNS server if it doesn’t have the requested information.
- The client continues the lookup process.

46
Q

TTL (Time to Live)

A
  • Defines how long a DNS record is cached before it expires.
  • Common default: 24 hours (86,400 seconds).
47
Q

Internal vs. External DNS

A
  • External DNS: Used for publicly accessible domains on the Internet.
  • Internal DNS: Resolves internal domain names within a private network or cloud environment.
48
Q

VLAN

A
  • Virtual Local Area Network
  • Used to separate network traffic into different broadcast domains while using the same physical hardware.
  • Traffic between VLANs can be routed through a Layer 3 switch or router.
49
Q

Why Use VLANs?

A

Security: Isolates sensitive network traffic, e.g., keeping HR and IT traffic separate.
Efficiency: Reduces physical hardware requirements by consolidating switches and routers.
Scalability: Easier to manage and modify logical networks without adding physical infrastructure.

50
Q

VLAN Trunking aspects

A
  1. 802.1Q Protocol
  2. Trunk
  3. 4-Byte Tag Structure
  4. Native VLAN
51
Q

802.1Q Protocol

A
  • Standard for VLAN trunking.
  • Allows multiple VLANs to share a single physical cable between switches and routers
52
Q

Trunk

A
  • A single cable that carries traffic for multiple VLANs.
  • VLAN data is identified by a 4-byte tag.
53
Q

4-Byte Tag Structure

A

TPI (Tag Protocol Identifier): Identifies the traffic as VLAN-tagged.
TCI (Tag Control Identifier): Specifies the VLAN ID and other control information.

54
Q

Native VLAN

A
  • The untagged VLAN on a trunk.
  • Referred to as VLAN 0.
55
Q

Layer 3 Switch

A

A switch capable of routing traffic between VLANs.

56
Q

VPN

A
  • (Virtual Private Network)
  • Extends a private network across a public network, enabling secure communication.
  • Encrypts data to ensure privacy over untrusted networks, like the Internet.

Benefits of VPNs:
- Secure remote access for users and offices.
- Provides encryption for data over public networks.
- Allows users to work remotely as if they were on the local corporate network.

57
Q

Types of VPNs

A
  1. Site-to-Site VPN
  2. Client-to-Site VPN
  3. Clientless VPN
58
Q

Site-to-Site VPN

A
  • Connects two separate locations securely over the Internet.
  • Connects two physical sites (e.g., branch office to headquarters).
  • Cost-effective alternative to dedicated lease lines.
  • Uses VPN tunnels to securely transmit traffic between locations over the Internet.
59
Q

Client-to-Site VPN

A
  • Connects individual devices (e.g., laptops, smartphones) to a corporate network.
  • Enables remote users to securely access corporate resources from anywhere.
60
Q

Clientless VPN

A
  • Provides secure access using a web browser.
  • No additional software or hardware required.
  • Commonly used for secure web browsing via HTTPS using TLS (Transport Layer Security).
61
Q

VPN Tunnel Types

A
  1. Full Tunnel
  2. Split Tunnel
62
Q

Full Tunnel

A

All traffic is routed through the VPN tunnel to the corporate network.

Advantages:
- High security: All traffic is encrypted.
Disadvantages:
- May limit access to local resources (e.g., home printers).
- Higher bandwidth usage.

63
Q

Split Tunnel

A

Encrypts and routes only traffic intended for the corporate network through the VPN.

Other traffic (e.g., internet browsing) bypasses the VPN.

Advantages:
- Better performance and lower bandwidth usage.
Disadvantages:
- Lower security: Unencrypted traffic is exposed to potential threats.

64
Q

Protocols for VPNs

A
  1. SSL (Secure Socket Layer)
  2. TLS (Transport Layer Security)
65
Q

What is IPv6

A

IPv6 (Internet Protocol Version 6)
- IPv6 uses a 128-bit address space, offering 340 undecillion possible addresses.

IPv6 Address Format:

  • Written in hexadecimal and separated by colons (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
  • Consists of 8 segments (16 bits per segment).
66
Q

Benefits of IPv6

A

Larger Address Space: Allows for more devices globally.
No Broadcast Traffic: Improves network efficiency.
No Fragmentation: Eliminates security risks associated with packet fragmentation.
Backward Compatibility: Supports dual-stack (IPv4 and IPv6 coexistence).
Simplified Header: Reduces overhead with only 5 fields (compared to 12 in IPv4).

67
Q

IPv6 Features and Terms

A

Dual-Stack: Devices support both IPv4 and IPv6.
Tunneling: Allows IPv6 traffic over IPv4 infrastructure without full upgrades.

68
Q

IPv6 Shorthand Rules

A
  1. Leading Zero Compression:
    - Remove leading zeros in each segment.
    - Example: 2001:0db8:0000:0000:8a2e:0370:7334 → 2001:db8:0:0:8a2e:370:7334.
  2. Zero Compression:
    - Replace consecutive all-zero segments with :: (only once per address).
    - Example: 2001:db8:0:0:0:0:2:1 → 2001:db8::2:1.
  3. Final Example:
    - Original: 2001:0db8:0000:0000:0000:ff00:0042:8329.
    - Compressed: 2001:db8::ff00:42:8329
69
Q

TCP

A

Transmission Control Protocol)
1. Type: Connection-oriented protocol.
2. Purpose: Reliable data delivery across networks.
3. Mechanism: Uses a three-way handshake to establish a connection:
- SYN (synchronize): Client requests a connection.
- SYN-ACK (synchronize acknowledgment): Server acknowledges and accepts the connection.
- ACK (acknowledgment): Client confirms readiness to send data.
4. Features:
- Guarantees data delivery by requiring acknowledgment for each segment.
- Resends dropped or missing packets.
- Examples of Use: Email, file transfers (FTP), web browsing (HTTP/HTTPS).
5. Analogy: Works like certified mail where the sender gets confirmation that the message was received.

70
Q

UDP

A

User Datagram Protocol
1. Type: Connectionless protocol.
2. Purpose: Unreliable but fast data delivery.
3. Mechanism: Sends datagrams without establishing a connection or waiting for acknowledgments.
4. Features:
- No acknowledgment or retransmission of lost packets.
- Lower overhead compared to TCP, leading to faster transmission.
- Examples of Use: Video streaming, online gaming, voice calls.
5. Analogy: Works like a postcard—no guarantee it reaches its destination, but it’s fast and efficient.

71
Q

TCP vs. UDP

A
72
Q

(SOHO) Network

A

Small Office/Home Office
- A network configuration used in small offices or homes, typically for fewer than 20 people.

73
Q

SOHO Router

A
  • All-in-one device combining LAN, WAN, and wireless access point functions.
  • Connects devices to the Internet via a modem (cable, fiber, etc.).
74
Q

Small Office/Home Office (SOHO) Network features

A

Common Features:
- Internet/WAN setup (Dynamic IP, Static IP, PPPoE, L2TP, PPTP).
- DHCP server to assign IP addresses.
- Quality of Service (QoS) settings for bandwidth prioritization.
- Dynamic DNS for hostname to IP mapping.
- Firewall (port forwarding, NAT, DMZ).
- USB ports for file sharing and print server setup.
- VPN server setup for remote access.

75
Q

MAC Cloning

A

Used if ISPs lock connections to specific MAC addresses.

76
Q

Parental Controls

A

Can restrict access for certain devices or users.

77
Q

steps to configuring a SOHO network

A
  1. Access the SOHO Router Interface
  2. Configure the WAN (Internet) Settings
  3. Configure the LAN (Local Area Network) Settings
  4. Enable and Configure the DHCP Server
  5. Configure Wireless Settings
  6. Set Up Advanced Features (Optional)
  7. Configure Security Settings
  8. Configure VPN (Optional)
  9. Test Network Connections
  10. Save and Back Up Settings

Also check chat in Chatgpt