Network+ Concepts Flashcards
TCP/IP Model
aka TCP/IP stack or the DoD model. It is an alternative to the OSI Model. 4 layers vs 7 layers to OSI model -Application -Transport -Internet -Network Interface
OSI Model
aka OSI stack. Open Systems Interconnection Model is a framework used to describe the functions of a networking system. There are 7 layers.
Please Do Not Throw Sausage Pizza Away
Physical Layer
OSI model Layer 1 - Electrically or optically transmitting raw unstructured data bits across the network. “physical” resources
Examples of Layer 1:
-Cable (Ethernet, fiber optic)
-Radio frequencies (Wi-Fi, Bluetooth)
-Infrastructure devices (network hubs, Wireless Access Points, Media converters) [devices that work at the bit layer; whatever comes in, goes out; simple dumb devices].
Data Link Layer
OSI model Layer 2
Layer 2 devices view networks logically.
data is packaged into frames. The data link layer also corrects errors that may have occurred at the physical layer.
Data link layer has two sub-layers:
- media access control (MAC), provides flow control and multiplexing for device transmissions over a network.
- logical link control (LLC), provides flow and error control over the physical medium
Examples at Layer 2:
- Network Interface Cards (NIC)
- Bridges
- Switches
- MAC addresses
- –They are smarter devices that can use logic to send specific information to specific devices
Network Layer
OSI model Layer 3 Forwards traffic (routing) using logical addresses (e.g. IPv4 or IPv6) -Logical addressing -Switching (i.e. routing; not switches as in Layer 2) -Route discovery and selection -Connection services -Bandwidth usage -Multiplexing strategy
Alt Summary
Receiving frames from the data link layer, and delivering them to their intended destination based on the addresses contained inside the frame.
Transport Layer
Layer 4 - This layer is the same in the OSI model and TCP/IP stack.
The transport layer manages the delivery and error checking of data packets. It regulates the size, sequencing, and ultimately the transfer of data between systems and hosts.
Examples of the transport layer is TCP or the Transmission Control Protocol.
Session Layer
OSI model Layer 5
The session layer controls the conversations between different computers. A session or connection between machines is set up, managed, and termined at layer 5. Session layer services also include authentication and reconnections.
Presentation Layer
OSI model, Layer 6
Responsible for formatting the data exchanged and securing that data with proper encryption so it can be presented.
Think data formatting and encryption at Layer 6.
Examples of Layer 6 are:
-scripting languages [because they’re formatting data] (ex. HTML, XML, PHP, JavaScript, etc
-Standard text (ASCII, EBCDIC, UNICODE) [ways of displaying the 1s and 0s]
-Pictures (GIF, JPG, TIF, SVG, PNG, etc)
-Video files (MP4, MPG, MOV, etc)
-Encryption (TLS and SSL)
The presentation layer formats or translates data for the application layer based on the syntax or semantics that the application accepts. Because of this, it at times also called the syntax layer. This layer can also handle the encryption and decryption required by the application layer.
Application Layer (OSI)
OSI model Layer 7 Provides application-level services and is where the users communicate with the computer. Application here=file transfer or network transfer, not IE or Word Examples at Layer 7: -Email (POP3, IMAP, SMTP) -Web browsing (HTTP, HTTPS) -Domain Name Service -File Transfer Protocol (FTP, FTPS) -Remote Access (Telnet, SSH) -Simple Network Management Protocol
At this layer, both the end user and the application layer interact directly with the software application. This layer sees network services provided to end-user applications such as a web browser or Office 365. The application layer identifies communication partners, resource availability, and synchronizes communication.
Application Layer (TCP/IP)
DoD model Application layer includes layers 5,6,7 of the OSI model (Session, Presentation, Application). Defines TCP/IP applications protocols and how programs interface with the transport layer service. This is the layer the end-user interacts with
Transport layer
Transport layer is the same in OSI and TCP/IP. Provides communications session management between hosts and defines level of service and status of connection used for transport. TCP, UDP, RTP.
Internet layer
Same as the Network layer of the OSI model. Packages data into IP datagrams and routes these IP datagrams between hosts across the network. Contains source and destination IPs.
Network Interface layer
Combines the Physical and Data Link layers from the OSI model. Concerned with physical and electrical characteristics. It describes how to transmit bits across the network.
Data on the Application, Presentation, Session layers (Layers 5,6,7) is called….
data (OSI model).
Data on the Transport layer (Layer 4) is called….
segments (OSI models).
Data on the Network layer (Layer 3) is called….
packets (OSI model).
Data on the Data Link layer (Layer 2) is called….
Frames (OSI model).
Data on the Physical layer (Layer 1) is called….
Bits (OSI model).
Do Some People Fear Birthdays? (mnemonic)
Data, Segments, Packets, Frames, Bits
What is a session (Layer 5)?
A session is like a convo that must be kept separate from others to prevent intermingling of the data.
What happens when setting up a session?
Check user credentials and assign a number to the session and determine who begins sending data. [Classroom example]
What happens when maintaining a session?
Transfer of data across the network, reestablish a session if it gets disconnected, and acknowledging data received. [Classroom example]
What happens when tearing down a session?
Ending a session due to mutual agreement (after the data transfer is done) or one party disconnects. [Classroom example]
What devices or protocols are used at Layer 5?
H.323 or H.264 (used to set-up, maintain and tear down voice and video connections) which operate over RTP [real time protocol] AND
NetBIOS is used to share files over a network.
RTP
Real Time Protocol is used for streaming audio and video usually in a two-way format (like an audio or video call)
Data Formatting
Data is formatted by the computer to have compatibility between different devices.
ASCII (ex. A = 65) text based language to ensure data is readable
GIF
JPG
PNG
Encryption
Scrambles the data in transit to keep it secure and confidential
Application Services
Unite communicating components from more than one network application.
Service Advertisement
When applications send out announcements to other devices on the network to state the services they offer:
such as a printer
Media Access Control (MAC)
Physical addressing system that uses a 48-bit address assigned to a network interface card (NIC) by manufactures.
Each character is 4 bits. The first 6 digits of the code indicates the manufacturer, the second half identifies the device.
Logical Link Control (LLC)
Provides connection services and allows acknowledgement of receipt of messages.
LLC is a basic form of flow control and basic error control funcions using a check sum. If the last bit is odd, the sum of the digits should be odd; if the last bit is even, the sum should be even.
Isochronous mode (Layer 2)
Network devices use a common reference clock source and create time slots for transmission with less overhead than synchronous or asynchronous methods, because both devices know when they can communicate and for how long.
Synchronous (Layer 2)
Network devices agree on clocking method to indicate beginning and end of frames and can used control characters or separate timing channels.
There isn’t much gap time so that’s a draw back of synchronous mode.
Asynchronous (Layer 2)
Network devices reference their own internal clocks and use start/stop bits.
The drawback is there’s no control of when the the devices are allowed to communicate.
Logical addressing
In the Network Layer (Layer 3), routing traffic to devices using IPv4, IPv6 and other logical addresses
Old examples are Apple Talk or IPX
IPv4 Address
4 sets of numbers, separated by dots
Dotted octet notation
1 byte = 8 bits
32 bits or 4 bytes
Packet Switching
aka routing, where data is divided into packets and forwarded based on its IP address.
Packets can take a different route, as long as they make it to the correct destination.
-Network Layer (Layer 3)
Circuit Switching
Dedicated communication link is established between two devices.
-Network Layer (Layer 3)
Message Switching
Data is divided into messages, similar to packet switching, except these messages may be stored THEN forwarded
-Network Layer (Layer 3)
ICMP
Internet Control Message Protocol is used to send error messages and operation information about an IP destination.
-Common example are ping and trace route
Trace route
Example of ICMP which traces the route a packet takes through the network and tells you each router along the way, so you can see which routes were up and down
What devices and protocols do you find on Layer 3?
The Network Layer
- Routers
- Multilayer switches (a router and a switch combined)
- -Switches are Layer 2 UNLESS it’s multilayer switch
- IPv4 protocol
- IPv6 protocol
- Internet Control Message Protocol (ICMP; port 1)
Coax
Coaxial Cable, oldest form of copper wire. The centre core transmits the data. Braided metallic shield protects against data loss and EMI.
Two flavors: RG-6 (thicker) & RG-59 (thinner)
Two connectors: BNC (push and twist) & F-type (screws on to the jack)
Twisted Pair Cable
Copper; most popular physical LAN media type.
4 pairs of two wires each.
Each pair is twisted.
More twists = more EMI connection
UTP
Unshielded Twisted Pair copper cable. Cheaper because there is no shield.
Bends easily, easy to work with.
STP
Shielded Twisted Pair copper cable. Same as UTP but with shielding.
Shielding helps minimize EMI.
More expensive.
RJ45
1 of 3 connectors for twisted pair copper cable.
Most common. 8 pins on the connector.
Ethernet only uses 4 pins.
Other 4 pins can be used for other stuff (ex. power over ethernet)
RJ11
6 pin connector, standard phone line.
Usually 2 or 4 pins are used. One for the ring, one for the signal.
DB9 or DB25
Used for RS232 cables (aka Serial cables)
Ex DB9 = 9pin D-subminiature connector
Remember:
Serial connector, RS232, used for external modems
Maximum throughput for Cat 3
10 Mbps
Maximum throughput for Cat 5
100 Mbps
Maximum throughput for Cat 5e
1000 Mbps (aka 1 Gbps)
Maximum throughput for Cat 6
1000 Mbps (aka 1 Gbps)
Maximum throughput for Cat 6a
10000 Mbps (aka 10 Gbps)
Maximum throughput for Cat 7
10000 Mbps (aka 10 Gbps)
What is the maximum distance of Cat 3 - Cat 7 cable?
100 meters
Straight-Through Patch Cable
Both ends of the cable have matching pin outs (T568B cable)
These connect DTE (Data Terminating Equipment) [eg laptops and desktops] to DCE (Data Communications Equipment) [e.g. switches, modems]
T568B pin / wire order
Used on Patch cables 1 - white / orange (Tx+) 2 - orange (Tx-) 3 - white / green (Rx+) 4 - blue 5 - white / blue 6 - green (Rx-) 7 - white / brown 8 - brown
DTE
Data Terminating Equipment, such as laptops & routers
DCE
DCE (Data Communications Equipment) [e.g. switches, modems]
Crossover Cable
‘Send’ and ‘receive’ pins of the cable are swapped in the end pin outs.
Used for connecting two of the same kind of device (e.g. DTE to DTE, or DCE to DCE)
T568A pin / wire order
Used on Crossover cables 1 - white / green (Rx+) 2 - green (Rx-) 3 - white / orange (Tx+) 4 - blue 5 - white / blue 6 - orange (Tx-) 7 - white / brown 8 - brown
MDIX
An automated way modern switches can electronically simulate the right kind of cable
Plenum Cable
Special UTP/STP cable that has a fire retardant outer insulator.
Plenum is for things you cannot see (in the wall, in the ceiling)
Non-plenum Cable
PVC - Normal UTP/STP rated cable;
You can ONLY use this where you can SEE the cable.
Fiber Optic Cable
Uses light from an LED or laser to transmit information through a glass fiber
Pros:
-No EMI
-It can go really far (no 100 meter limit like Cat 3-7)
-Greater data-carrying capacity (measured in Tbps)
Cons:
- very expensive
- hard to work with
MMF
Multimode Fiber is used for shorter distances than single-mode fiber.
MMF has a larger core size which allows for multiple modes of travel for the light signal.
Normally used for patch cable uses: router to switch, switch to server, usually less than 1 kilometer
SMF
Single mode fibers are sending light in one direction for miles and miles; long distance only.
Small core size.
Fiber Optic Connectors
4 types:
- Subscriber Connecter (SC)
- Straight Tip Connector (ST)
- Lucent Connector (LC)
- Mechanical Transfer Registered Jack (MTRJ)
Subscriber Connecter (SC)
Fiber optic connector
Remember: Stick and click
Usually uses an APC (Angled Physical Contact; 45 degree angle) connector
Straight Tip Connector (ST)
Fiber optic connector
Remember: Stick and twist
Lucent Connector (LC)
Fiber optic connector
Remember: Love connector (because there’s two side by side)
Mechanical Transfer Registered Jack (MTRJ)
Fiber optic connector
Remember: very small. usually used for routers. takes up less space; half the size of the others
Usually uses a UPC (Ultra Physical Contact; mostly flat) connector
What are the advantages of fiber optic cable?
- Higher bandwidth
- Covers longer distances
- immune to EMI
- better security (harder to tap into)
What are the advantages of copper cable?
- Less expensive
- Easier to install
- tools are cheap
What is a Media Converter?
It convert media from one format to another (light to electricity / electricity to light) (fiber to coax, copper to wireless, fiber to copper, etc); any Layer 1 to Layer 1
-Layer 1 device
What is a transceiver?
Devices that can send and receive data. They can be bidirectional or duplex.
Example: GBIC
What does bidirectional communication mean?
aka: half duplex
devices take turns communicating (like a walkie-talkie; a person can send or receive, but not both)
You can only use half the bandwidth all the time.
What is duplex communication?
aka: full duplex
Device are able to communicate at the same time.
ex. a phone call (not like a walkie talkie)
GBIC
Standard, hot-pluggable gigabit Ethernet transceiver.
It can take in copper or fiber as its connector, then transmit that information into the network
It is in routers and switches
SFP
Small Form-factor Pluggable (aka mini-GBIC; because it’s about half the size) is a compact, hot-pluggable optical module (so it can be used for fiber)
This transceiver that can support 4.25 Gbps
It does the same thing as a GBIC.
It can be pulled in or out of the device without turning off the router or switch
SFP+
Enhanced SFP
Compact, hot-pluggable optical module (so it can be used for fiber) transceiver
It supports up to 16 Gbps
QSFP
Quad Small Form-Factor Pluggable
Compact, hot-pluggable optical module (so it can be used for fiber) transceiver
It supports up to 100 Gbps
Cable Distribution System
Uses an organized system that is hierarchical
Punch Down Blocks
located in either the main distribution frame or the intermediate distribution frame (IDF)
- 66 block was used for phones and older Cat 3 networks. The proximity of the cables caused crosstalk and is a bad choice for higher speed (Cat 5) LAN networks
- 110 Block is used for higher-speed networks. Requires Cat 5 or above cabling (less crosstalk because there is more space)
Patch Panels (Copper)
Devices with easy-to-use jacks on the front to connect wiring from the jack to a network switch in a flexible manner.
Patch panels are very inexpensive. It’s disposable so if you’re going to un/re-plugging lots of times, it better to use a patch panel than the switch because the switch is very expensive (you could damage it)
-Back of the panel has punch downs like a 110-block
-Front has RJ-45 jacks
-You plug from port 1 on the switch to port 1 on the patch panel.
–To move a connection, you unplug from the patch panel and move it to a different port on the patch panel; don’t unplug from the switch (to lower risk of damaging the ports on the switch.
Patch Panels (Fiber)
Connect fiber jacks throughout building to a single patch panel in network closet
- There are no punch down blocks
- They use LC, ST, and SC connectors
Toner probe
aka Fox and hound
used to find which port is tied to the patch panel
BNC
Connector for coax (Bayonet Nut Coupling) A commonly used plug and socket for video and networking applications that provides a tight connection.
Origins of Ethernet
Originally run over
- coaxial cables (10Base5, 10Base2)
- vampire taps
- Ethernet changed to copper twisted pair (UTP, STP)
- -10Base-T (10 mbps max speed, T=twisted pair); these were CAT-3 networks.
Deterministic
Very organized and orderly.
Requires and electronic token to transmit (e.g. Token Ring networks) – Classroom example
Contention-based
Very chaotic and you can transmit whenever you want (e.g. ethernet networks) – Pub example
CSMA/CD
Carrier Sense Multiple Access / Collision Detection:
Ethernet devices transmit based on a principle called CSMA/CD to deal with the problems in Contention-based method.
Carrier sense=listen for a spot; listen to the wire, start talking if it’s not busy
Multiple Access=(start talking)Everyone has access to the wire and can start talking whenever they want
Collision detect=detect an error, wait a short, then transmit again. Each sending source chooses a random time to wait before retransmitting (ex. 120 ms backoff) or 30ms backoff.
Collision Domains
Comprised of all the devices on a shared Ethernet segment (everything on the same cable or hub)
- -Devices operate at half-duplex when connected to a hub.
- -Devices must listen before they transmit to avoid collisions when operating as CSMA/CD
- -Making collision domains smaller reduces collisions and more efficient (pub example; 20 group at one table vs 5 tables of four people)
Collision Domains with Switches
Ethernet switches increase scalability of the network by creating multiple collision domains (each plug on a switch is a collision domain)
BGP
Border Gateway Protocol (BGP) refers to a gateway protocol that enables the internet to exchange routing information between autonomous systems (AS). … BGP makes peering possible. Without it, networks would not be able to send and receive information with each other.
10BASE-T
Cat3, 10 mbps
10=10mbps
T=twisted pair
100BASE-TX
Cat 5 or higher, 100 mbps
TX=fast internet
1000BASE-TX
Cat 6 or higher, 1 Gbps
1000BASE-SX
MMF (multi-mode) fiber, 1 Gbps, 220 meters max
“S” is not single (aka single-mode fiber)
1000BASE-LX
MMF, 1 Gbps, 500 meters max
1000BASE-LX
SMF, 1 Gbps, 5km
1000BASE-ZX
SMF, 1 Gbps, 70km
Hub
Layer 1 devices used to connect multiple network devices/workstations. aka multiport repeaters
Not used often in modern networks; switches are mostly used instead.
On a chart=square icon with an arrow pointing in both directions.
Passive hub
Repeats signal with no amplification (like a spliter).
A passive hub is part of the 100m distance limitation.
Layer 1 devices used to connect multiple network devices/workstations.
Active hub
Repeats signal with amplification; it boosts the signal and restarts the 100m distance limit.
Layer 1 devices used to connect multiple network devices/workstations.
Smart hub
Active hub with enhance features like SNMP, so you can configure and manage that hub from a distance.
Layer 1 devices used to connect multiple network devices/workstations.
Collision Domains
Hubs (Layer 1) are used to connect multiple network segments together and each LAN segment becomes a separate collision domain.
Bridge
Bridges analyze source MAC addresses and populate an internal MAC address table.
They make intelligent forwarding decisions based on destination MAC address in the frames.
Creates a broadcast domain
Switch
Layer 2 device used to connect multiple network segments together. They use MAC addresses
Each port on a switch is its own collision domain.
Switches are a hub+bridge aka multiport bridge.
ARP packet
ARP broadcasts a request packet to all the machines on the LAN and asks if any of the machines are using that particular IP address. When a machine recognizes the IP address as its own, it sends a reply so ARP can update the cache for future reference and proceed with the communication.
Router
Layer 3 device used to connect multiple networks together. They use IPV4 and IPV6.
Routers make forwarding decisions based on logical network address information.
Routers are usually more feature rick and support a broader range of interface types than multilayer switches.
Layer 3 Switch
Layer 3 device used to connect multiple network segments together. It can make Layer 3 routing decisions and interconnect entire networks (like a router), not just network segments (like a switch).
Basically a switch+router
Each port is it’s own broadcast domain and collision domain.
What is the effective range of HDMI cable?
Only about 20 ft. You need to use a media converter for longer distances so you can convert to ethernet.
What is Link Aggregation?
802.3ad
Allows for combination of multiple physical connections into a single logical connection.
With this, bandwidth available is increased and the congestion is minimized or prevented.
If the switch only has a 100 mbps connection, it could combine 4 ports for a virtual 400mbps connection.
If you have a 24 port switch, you should be safe to use 4 ports for Link Aggregation.
This is an ethernet switch feature
PoE
Power over Ethernet
-PoE 802.3af (provides up to 15.4 watts)
-PoE+ 802.3at (provides up to 25.5 watts)
Supplies electrical power over Ethernet and requires Cat5 or higher copper cable
PSE
Power Sourcing Equipment provides power to other devices.
Pins 1, 2, 3, and 6 provide power.
PD
Powered Devices such as VoIP phone or WAP
Port Monitoring or Mirroring
Helpful to analyze packet flow over a network as it makes a copy of all traffic destined for a port and sends it to another port.
You mirror a port to another port then your network analyzing machine (ex. Wireshark) can listen.
User Authentication
802.1x
For security purposes, switches can require users to authenticate themselves before gaining access to the network.
Once authenticated, a key is generated and shared between the supplicant (device wanting access) and the switch (authenticator)
What are the three methods for switch management and authentication?
1) SSH (port 22) can be used for remote management of the switch over the network
2) Console port is for local (in-person) administration of the switch. Use a rollover cable (DB-9 to RJ-45).
3) OOB (out-of-band) management. All network configuration devices on a separate network. This management network is only for admins.
First-Hop Redundancy
Hot Standby Router Protocol (HSRP) uses virtual IP and virtual MAC addresses to provide an “active router” and a “standby router”.
The PC only sees the virtual router, and the virtual router sends the traffic to the available router.
HSRP
Hot Standby Router Protocol (HSRP) is a Cisco-proprietary protocol.
It uses virtual IP and virtual MAC addresses to provide an “active router” and a “standby router”.
What are First-Hop Redundancy protocols?
- HSRP (Hot Standby Router Protocol) is a Cisco-proprietary protocol – this is the most popular.
- GLBP (Gateway Load Balancing Protocol), Cisco-proprietary.
- VRRP (Virtual Router Redundancy Protocol) which is an open-source protocol.
- CARP (Common Address Redundancy Protocol) which is an open-source protocol.
MAC Filtering
Permits or denies traffic based on a device’s MAC address to improve security.
-Layer 2 blocking (because it’s uses MAC addresses)
Traffic Filtering
Multilayer switch may permit or deny traffic based on IP addresses or applications ports.
- Layer 3 blocking is IP addresses
- Layer 4 blocking is Ports
QoS
Quality of Service Forwards traffic based on priority markings Example: -Phone/voice traffic has a high priority -PCs using TCP are lower priority
STP
Spanning Tree Protocol (802.1D)
- Permits redundant links between switches
- prevents looping of network traffic
- Uses Root Bridges and non-root bridges
How much down time a year do you get with the five 9s?
99.999% uptime = 5 min of downtime a year
Redundancy means you maintain uptime even if one device goes down.
SPB
Shortest Path Bridging
Used instead of STP (802.1D) for larger network environments
What happens if STP is not used?
MAC address table corruption can occur.
Broadcast Storms
If broadcast frame is received by both switches, they can forward frame to each other. Multiple copies of the frame are forwarded, replicated, and forwarded again until the network is consumed with the forwarding many copies of the same initial frame.
Root Bridge
A switch is elected to act as a reference point for a spanning tree.
The Switch with the lowest bridge ID (BID) is elected as the root bridge.
BID
Bridge ID is made up of a priority value and a MAC address (with the lowest value considered root).
Root Port
Every non-root bridge has a single root port.
This is the port closest to the root bridge in terms of cost.
If costs are equal, the lowest port number is chosen.
Link Costs
Associated with the speed of the link.
-the lower the link’s speed, the higher the cost
Faster cables have a lower cost.
Slower cables have a higher cost.
Designated Port
Every network segment has at least one designated port.
This is the port closest to the root bridge in terms of cost.
All ports on the root bridge are designated ports.
Non-Designated Port
Ports that block traffic to create a loop-free topology.
Ports involved in STP can go through different states:
- Non-designated ports do not forward traffic during normal operation BUT they doe receive bridge protocol data units (BPDUs)
- -If a link in the topology goes down, the non-designated port detects the failure and determines whether it needs to transition to a forwarding state
- -Blocking - BPDUs are received but not forwarded; used in the beginning and on redundant links
- -Listening - Populates MAC address table; does not forward frames
- -Learning - Processes BPDUs; the switch determines its role in the spanning tree
- -Forwarding - if the port decides it needs to become a designated port or a root port, it will start forwarding the frames