Network Basics Flashcards
A node that serves as the beginning or ending point of communication
Host
The physical path connecting the nodes
Media
The information carried by the media
Data
The network of interface cards, network hardware, cables, and so on that you can see when you look around the building
Physical Network
The information carried by the physical network, and the paths the information follows
Logical Network
A port-based, or static assignment creating a broadcast domain in a switch
VLAN
Carry traffic from multiple VLANs between 2 or more switches
Trunk Ports
Each VLAN needs it’s own router to communicate with other VLANs or the anything outside the LAN (True/False)
True
Four types of Network Security appliances
Firewalls
Intrusion detection and prevention systems
VPN endpoints
Unified threat management
Controls incoming and outgoing traffic, preventing unauthorized access to or from your network
Firewall
Specialized firewall network device that sits between your internal computer network and the Internet
hardware firewall
Firewall traffic control software that you install on an individual device
Software Firewall
Designed to monitor network traffic to look for signs of intrusion or other unwanted activities, evaluated by rules based on the signatures of known attacks, or by heuristic analysis which can recognize unusual or suspicious activities
Intrusion detection systems (IDS) and intrusion prevention systems (IPS)
Passive monitoring systems designed to alert administrators when something suspicious happens, but take no action on their own
IDS Intrusion detection system
Active protection systems which can block traffic, disconnect users, or take other corrective actions against an attack
IPS Intrusion prevention system
Describes a network scenario where a secure connection is created between multiple computers or LANs across an insecure external network
Virtual Private Network (VPN)
A networking device, such as a router, server, firewall, or similar device with Internetworking and data transmission capabilities that sits at the external edge of a secure internal network and requires an external device to identify and authenticate itself before the gateway creates a connection allowing access to internal network resources.
VPN Gateway
Communications protocols that provide secure data transmission over an unsecured network. Data is commonly secured using an encryption protocol such as IPsec or a tunneling protocol such as SSL/TLS.
Secure transport protocols
A simple network device that connects multiple nodes in a star configuration
Hub
A device that prevents collisions by ensuring not to send the data to a segment that is already busy
Bridge
A device that can read packets on the Internet layer to view their IP addresses and can communicate with others to find the best path through the network to any given host or subnet
Router
A device that enables the traffic to flow in and out of the network
Gateway
Internet connection that uses analog phone lines @ speeds <56 Kbps
Dialup
Internet connection that uses digital phone lines @ speeds 64-128Kbps
ISDN (Integrated Services for Digital Network)
Internet connection that carries data as a secondary signal on analog phone lines @ speeds 128Kbps-100Mbps
DSL
Internet connection that carries data over cable television lines @ speeds 384Kbps-400Mbps
Broadband Cable
Internet connection that uses optical cables @ speeds up to 1GBps
Fiber-Optic
The original analog cellular networks used from the early 1980s to the early 1990s.
1G
Early digital cellular networks, used in the 1990s and early 2000s.
2G
Later 2G services designed for a faster and more efficient data operation, deployed in the early 2000s
2.5G - 2.9G
This generation of cellular networks was designed from the start for mobile data networks & support at least 200 kbps data rates, but many are faster
3G
Cellular networks handle both voice and data using TCP/IP protocols, and data speeds can reach 1 Gbps downstream and 500 Mbps upstream
4G LTE (Long Term Evolution)
Cellular network that relies heavily on large numbers of directional transmitters, allowing a much greater number of high−speed connections in a given area
5G
Created by an industry consortium, requiring interoperability between carriers. Customer information is stored on a SIM card which can be freely exchanged between devices.
GSM (Global System for Mobiles)
Networks use a device whitelist instead of a SIM card: a user’s individual device must be registered with the carrier
CDMA
2 websites to test ping, traceroute, DNS lookups, or port checks
http://network-tools.com http://ping.eu
A public server that provides BGP routing information for a given network
Looking glass site
It allows a network cabling system to extend beyond its maximum allowed length and reduces distortion by amplifying or regenerating network signals.
Repeaters
Frequently serve as the demarc, though sometimes they’re on the ISP side. They’re typically ISP property. Commonly they have loopbacks or diagnostic alarms that the ISP can use to find problems without sending a technician in person
NIUs and Smartjacks
Units used by leased lines (or more broadly, broadband modems like for cable and DSL) might belong to the customer or the ISP, and found on either side of the demarc
CSU/DSU
A virtual representation of a network that appears to the user as an entirely separate and self-contained network even though it might physically be only a portion of a larger network or a local area network
Logical network
A device which joins segments using different link layer protocols, by translating frames from one format into the other, such as from Ethernet to Token Ring or Wi-Fi.
Translating bridge
A simple network device that lets you connect multiple nodes in a star configuration.
Hub
A device that connects different physical networks and actively works to prevent collisions by making sure not to send data to a segment that’s already busy. Distributes traffic based on MAC address
Bridge (wireless access point)
- bridges wired Ethernet to wireless
One of the fastest widely deployed 3G technologies is _________, which supports data rates up to 84Mbps downstream and 22Mbps upstream using MIMO transmission
Evolved High Speed Packet Access (HSPA+)
What is used to monitor and analyze network traffic to protect a system from network-based threats?
NIDS
An all-in-one security appliance that provides a good foundation. It provides intrusion prevention, antivirus, content filtering, etc.
UTM - unified threat management
An authentication service that is based on a time-sensitive ticket granting system
Kerberos
Name the 4 TCP/IP layers
Application
Transport
Networking
Datalink
What protocols are associated w/ the Datalink layer?
Ethernet, ARP, NDP, OSPF, MAC
What protocols are associated w/ the Networking layer?
IP, ICMP, ECN, EGMP, IPsec
What protocols are associated w/ the Transport layer?
TCP, UDP, DCCP, SCTP, RSVP
What protocols are associated w/ the Application layer?
HTTP, FTP, IMAP, LDAP, POP3, SMTP, SNMP, SSH, SNMP, Telnet, TLS/SSL, RIP, DNS
A high-speed data transfer network that provides access to consolidated block-level storage. It moves storage resources off the network and reorganizes them into an independent, high-performance network
SAN (storage area network)
Connects the storage to the TCP/IP network and enables users to access storage resources using both Common Internet File System (CIFS) and Network File System (NFS) protocols over the familiar TCP/IP networks. has its own IP address and hence can be accessed by users directly over the network to store files as well as retrieve them when required.
network attached storage (NAS)