Network Concepts Flashcards

1
Q

Compare manually assigning host configurations versus the network dynamically assigning them (DHCP)

A

With manual, you have to make sure that every host has the correct default gateway, subnet mask, and DNS server. Network devices, servers, and printers should have static IP addresses.

DHCP minimizes configuration mistakes, can easily add new devices, and tracks which device has which IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain the greatest number (decimal format) that can be in a IP address octet

A

255 because an octet of 11111111 = 255

Binary math: each bit doubles the previous, from right to left

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain how the Subnet Mask (in decimal) determines the number of available IP addresses on a network

A

With 4-octet decimal IP addresses (e.g., 192.168.1.1), the first three octets are used to identify the the network, leaving the last octet to be any number between 0 and 255.

This enables 256 devices, however, certain IP addresses are reserved for certain devices:
- the first option is always reserved for the address itself (192.168.1.0)
- the last is always reserved for the network’s broadcast address (192.168.1.255)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain how network hosts use the subnet mask to determine if another host is on the same network

A

The subnet mask, in binary, can compare the IP addresses of different hosts to see if the network binary is identical.

When the network’s binary values do not match, the router comes into play to enable communication between hosts.

In subnet binary, the network bits are 1s and the host bits are 0s. These 1s and 0s must be clearly delineated to be valid, e.g., not 11111111.11111111.111110011.000000000, but rather, 11111111.11111111.11111110.00000000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of the Ping command?

A

To test the reachability of a host/between two hosts.

It is the primary TCP/IP command used to troubleshoot connectivity, reachability, and name resolution (compare pings for a device using IP Address and DNS, if DNS fails, is a naming issue)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain how DNS converts domain names to IP addresses

A

When a domain name is entered into the browser, the device sends a lookup request to its designated DNS server.

Then the server searches its database for the name you entered. If it finds a match, it sends the IP Address back to your computer; if it doesn’t find a match, it forwards the request to a higher-level DNS (the “system” in DNS).

The DNS servers are linked together so that any of them can find the IP address for any valid, registered domain name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Compare MAC Addresses v. IP Addresses

A

A MAC Address is a physical address embedded into each network capable device. Uses hexadecimal notation (base-16)

An IP address is a unique identifying number assigned to every device connected to the internet. Is expressed in 8-bit binary (base-2).

When on the same network, two hosts can communicate directly through the switch via MAC Addresses.
- Host A will broadcast across the entire local network using Address Resolution Protocol (ARP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe how Address Resolution Protocol (ARP) works

A

When a router isn’t needed to allow two hosts on a network to communicate…

  • Host A broadcasts “who has X IP Address?”
  • This gets sent through the switch as a broadcast transmission
  • The host with the matching IP Address sends back its MAC Address
  • The switch will store the MAC Addresses of devices on that network, not the IP Addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OSI Model Encapsulation

A

Occurs on the sending host side

As data flows down the stack (layers 5 –> 1), at each layer, protocols add header and trailer data blocks.
- These blocks contain addressing and error control information.

As the data moves down the stack, each layer examines the data received from the layer above, and adds its own header and if needed, a trailer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OSI Model De-encapsulation

A

Occurs on the receiving host side

As data flows up the stack (layers 1 –> 5), information is examined, processed, and removed until the receiving host has just the payload of data that the sender meant to send.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Compare and contrast UDP and TCP

A

UDP = User Datagram Protocol
- is used to send data as quickly as possible when speed is more important than reliability.

TCP = Transport Control Protocol
- when error-free data is more important than speed.
- provides rules for a receiving host to confirm every single segment it receives, as well as having error-checking and recovery procedures.
- if any segments are lost or corrupted during transit, the sending host must re-transmit the data
- it is the protocol of choice for webpages and email, when all of the information must get to the destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When needing to uplink/downlink two switches together - but there is no uplink-specific port - what is common practice?

A

Many technicians will reserve either the first or last port on the switch for uplink/downlink

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does it mean to daisy-chain switches together?

A

Linking switches in series.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the limitations with daisy-chaining switches together?

A

The more switches in series, the more latency as each switch has to process the frame.

Each switch (“hop”) between hosts creates more latency.

Links between switches act as bottlenecks for network traffic
- Is due to multiple devices sending data between the two+ switches simultaneously

It is best to limit the number of switches between two devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is switching capacity?

A

A rating of the switch’s maximum internal throughput between connected devices.

Sometimes referred to as “backplane”
- the data movement that happens in the background of the switches operation
- Usually measured in gigabits/second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Regarding switches, what is “non-blocking”?

A

When the switch has enough backplane so that all connected devices can use its full send-receive capacity to any other hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the advantage to using fewer high-capacity switches instead of linking several smaller switches together?

A

Decreased latency and bottlenecks due to fewer switching hops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What can you expect to occur with a switching loop?

A

A broadcast has no logical place to end.

With something like Wireshark, you’ll find that there is a tsunami of packets when looking over the information.

19
Q

When would fiber optic be preferred over Ethernet?

A
  • Between buildings (is standard practice)
  • Where EMI is of great concern
    _________________________________________
    Fiber optic is:
    • non-conductive (isn’t metal)
    • more expensive than Ethernet
    • more easily damaged than Ethernet
    • EMI doesn’t impact light-signals with fiber optic like it does with Ethernet

Primary negative: the cost of cables and connectors

20
Q

Explain the difference between managed and unmanaged switches

A

Managed Switches:
- You can select the power priority for each device/port, so that is there is excessive draw, the higher-priority devies maintain performance.
- You can optimize network traffic
- Two reasons to have a managed switch:
1) Management
2) Monitoring and optimization

Unmanaged switches:
- You can’t monitor/manage an unmanaged switch

21
Q

How can IGMP optimize network traffic?

A

IGMP = Internet Group Management Protocol

Is a way for a host to tell the network that they want to “join” or listen to a multicast group address, so that a switch can direct that group’s multicast traffic to only those devices that have joined.

Is a Layer 3 protocol. With IGMP enabled, a switch listens for multicast traffic which has its own group of MAC addresses (akin to Multicast Group IP addresses) - this listening is called “IGMP snooping”

*must have a managed switch, otherwise, will pass through an unmanaged switch like a broadcast transmission

22
Q

When should IGMP Snooping be enabled on a managed switch?

A

When you want to catch IGMP-join messages that were originally designed to go between hosts and their router.

To have a direct switch multicast in this way, you need to have a managed switch. Otherwise, it will pass through an unmanaged switch like a broadcast transmission.

Managed switches, however, direct multicast traffic only to those ports that requested it.

23
Q

Explain the impact that Routing Hops have on a network.

A

Routing hops create more latency than switching hops.

Routers have to read the data within a packet and determine the appropriate hosts

Switches only have to read the headers in a frame and ignore the rest of the data.

24
Q

How do you know if there is a Routing Hop on your network?

A

Using Traceroute in the Command Prompt:
- if the next routing hops after your router’s 192.168.1.1 begins with 10.x.x.x., 172.16.x.x, or 192.168.x.x, then you probably have an extra, unnecessary router on your network.

25
Q

Why should you put an ISP’s combo unit into bridge mode?

A

It removes an unnecessary routing hop and allows the setup of external access to the internal network, like VPN.

26
Q

How are unicast and multicast traffic routed between VLANs?

A

Broadcast traffic never leaves its broadcast domain.

Unicast is most of the traffic on a network (email, Control4 commands, etc.)

VLAN, at its core, is its own broadcast domain.

27
Q

What devices need to be configured for VLANs to work?

A

Router, managed switch, and sometimes the APs.

Only managed switches have the capability to configure VLANs

28
Q

How are APs and network switches similar?

A

Both operate at OSI Layers 1 and 2…

…Therefore, both use MAC Addresses to communicate with devices on the same network (OSI Layer 2 = MAC Addresses)

29
Q

How are APs and network switches different?

A

Switches use ports and wires to connect host devices.

APs use radio waves. These radio waves are the “physical layer” that replaces Ethernet cables.

30
Q

What risks are associated with leaving a wireless network “open” (without a password or encryption method)?

A

Anyone can join the network and could theoretically have access to all of the devices currently connected to the whole LAN.

31
Q

What is best practice for SSIDs while the wireless network is being setup and configured, versus when it’s ready to be handed off to the customer?

A

During setup:
- separate 2.4 and 5 GHz (e.g., “HomeWiFi2.4” and “HomeWiFi5”
- Assess RSSI for each SSID at multiple locations in the facility

After the network has been configured and optimized, combine them into a single recognizable and user-friendly SSID: “HomeWifi”

32
Q

Why should you not hide the customer’s SSID?

A

It just makes things more difficult for the customer to use while providing zero security benefit.

33
Q

What is currently the strongest method for wireless encryption?

A

WPA3 = Wireless Protected Access 3

Is the strongest and most current encryption method in wide-use.

34
Q

What factors should be considered when selecting a switch?

A
  • Number of ports (known devices plus extra)
  • POE: number and power budget (plus extra for expansion)
  • SFP uplink
  • Management features (e.g., VLANs, link aggregation, STP, remote monitoring and management)
35
Q

Within the OSI Model, frames move ______ ___ network

A

Frames move WITHIN a network

OSI Layer 2, the switch

36
Q

Within the OSI Model, packets move ______ network

A

Packets move between networks

OSI Layer 3, the router

37
Q

Why reserve DHCP IP Addresses?

A

It tells the router to assign only that IP Address to a host with that particular MAC Address

It allows for the predictability of a static IP Address, but without the error-prone nature of manually configuring each device

When you need a host to have a consistent IP Address on a network, use a DHCP reservation.

38
Q

When would you use static assignments for network configuration?

A

The router’s LAN port must be assigned statically - it’s the default gateway for all other hosts, so it has to be a predictable address

Sometimes (rarely) a device is not DHCP capable

39
Q

What is the benefit of IP Address ranges?

A

Address ranges help you set aside blocks of IP Addresses for specific uses.

Static: for devices that can only be configured manually

Reserved: want to assign a specific address using DHCP reservations

Dynamic: provides addresses for the rest of the network using DHCP

40
Q

How is the passphrase for an SSID used?

A

It enables encryption and decryption of data for the SSID

41
Q

Compare the 5 GHz and 2.4 GHz bands

A

5 GHz:
- 5 GHz bands designed to not overlap
- fewer sources of interference
- higher data rate potential

2.4 GHz:
- attenuates less over distance
- less susceptible to obstructions

42
Q

When troubleshooting a wireless network and the wired infrastructure is sound, what should you do?

A

For each AP on the network, look into the channel selection, AP placement, and transmit power.

This includes creating separate SSIDs for each band on each AP (Office-5, Office-2.4, RecRoom-5, RecRoom-2.4, etc.)

43
Q

When troubleshooting a wireless network, what types of devices should you first check?

Provide examples.

A

The wired infrastructure:
- router
- each switch
- Ethernet cables
- and power supply (POE and plugs)