Network Configurations 2.1, 2.5, &2.6 Flashcards
Responsible for putting frames in the physical network’s transmission media
Link / Network Interface Layer
Used to address packets and route them across the network
Internet Layer
Shows how to send the packets
Transport Layer
Contains all the protocols that perform higher level functions
Application Layer
A logical identifier for a group of hosts in a computer network
Multicast Address
Allows for borrowing some of the host bits and reassigning them to the network portion
Classless Inter-Domain Routing (CIDR)
Default subnet mask for a given class of IP addresses
Classful Mask
can be accessed over the internet and is assigned to the network by an internet service provider
Public (Routable)
Can be used by anyone any time, but only within their own local area network
Private IP ranges include those that start with either 10,172, or 192
Private (Non-Routable)
Creates a loopback to the host and is often used in troubleshooting and testing network protocols on a system
Loopback Address (127.0.01)
manually type the IP address for the host, its subnet mask, default gateway, and DNS server
Static Assignment
Used when a device doesn’t have a static IP address or cannot reach a DHCP server
Automatic Private IP Addresses (APIPA)
Dynamically assigns IP addresses and allows a workstation to load a copy of boot image to the network
Bootstrap Protocol (BOOTP)
Assigns an IP based on an assignable scope or addresses and provides the ability to configure other options
Dynamic Host Control Protocol (DHCP)
Manages the IPs being assigned and returned over time
IP Address Management
Used when a device does not have a static IP address or cannot reach a DHCP server
Automatic Private IP Addressing (APIPA)
New technology that provides the same features as APIPA
Zero Configuration (ZeroConf)
Provides an IP address to every machine on the network and eliminates configuration errors
Dynamic Host Configuration Protocol (DHCP)
List of valid IP addresses available for assignment or lease to a client computer or endpoint device on a given subnet
Scope
Excludes some IP address from being handed to devices unless they meet a certain condition
DHCP Reservation
Helps network clients find a website using human-readable hostnames instead of numeric IP addresses
Domain Name System (DNS)
Domain name under a top level provider
Fully Qualified Domain Name (FQDN)
Contains the FQDN with the method of accessing inf
Uniform Resource Locator (URL)
DNS record that identifies the host authorized to send mail for domain
Sender Policy Framework (SPF)
Provides the cryptographic authentication mechanism for mail using a public key published as a DNS record
DomainKeys Identified Mail (DKIM)
Framework that is used for proper application of SPF and DKIM, utilizing a policy that’s published as a DNS record
Domain-based Message Authentication, Reporting & Conformance (DMARC)
Allows cloud instances on the same network access each other using internal DNS names
Internal DNS
Records created around the domain names from a central authority and used on the public internet
External DNS
Types of DNS server that stores all the DNS records for a given domain
Nameserver
Tells the DNS resolver how long to cache a query before requesting a new one
Time to Live (TTL)
Makes a local copy of every DNS entry it resolves as connected to websites
DNS Resolver/DNS Cache
DNA server communicates with several other DNS servers to hunt down the IP address and return to the client
Recursive Lookup
Each DNS server responds directly to the client with an address for another DNS server that may have the correct IP address
Iterative Lookup
Allows different logical networks to share the same physical hardware and provides added security and efficiency
Virtual Local Area Network (VLAN)
Extends a private network across a public network and enables sending and receiving data across shared or public networks
Virtual Private Network (VPN)
Routes and encrypts all network requests through the VPN connection back to the headquarters
Full Tunnel VPN
Routes and encrypts only the traffic bound for the headquarters over the VPN, and sends the rest of the traffic to the regular internet
Split Tunnel VPN
Creates a secure remote-access VPN tunnel using a web browser without requiring a software or hardware client
Clientless VPN
Provides cryptography and reliability using the upper layers of the OSI model
Secure Socket Layer
Provides secure web browsing over HTTPS
Transport Layer Security (TLS)
IPv4=2*32
4.2 billion addresses
IPv6=2*128
340 undecillion addresses
Simultaneously runs both the IPv4 and IPv6 protocols on the same network devices
Dual Stack
Allows an existing IPv4 router to carry IPv6 traffic
Tunneling
Used to identify a single interface
Unicast Address
similar to IPv4’s unicast class A, B, and C addresses and begins with 2000-3999
Globally-Routed
Used like a private IP in IPv4 that can only be used on the local area network and begins with FE80
Link-Local/ Local Use
Eliminates the need to obtain address or other configuration information from a central server
Stateless Address Autoconfiguration (SLAAC)
Used to identify a set of interfaces and begins with FF
Multicast address
Allows a host to assign itself a unique 64 bit IPv6 Interface identifier
Extended Unique Identifier (EUI)
Used to identify a set of interfaces so that a packet can be sent to any member of a set
Anycast address
Used to determine the layer 2 addresses that are on a given network
Neighbor Discovery Protocol (NDP)
Logical communication endpoint that exists on a computer or server
Port
Logical communication opening on a server that is listening for a connection from a client
Inbound Port
Allows DHCP to automatically assign addresses from a DHCPv6 server
DHCPv6 Protocol
Logical communication opening created on a client in order to call out to a server that is listening for a connection
Outbound Port
Ports 0 to 1023 are considered well-known and are assigned by the Internet Assigned Numbers Authority (IANA)
Well-Known Ports
Ports 1024 to 49151
Registered Ports
Ports 49152 to 65535 can be used by any application without being registered with IANA
known for gaming, instant messaging, and chat
Dynamic or private Ports
Ports 20, 21
provides insecure file transfers
File Transfer Protocol (FTP)
Port 22
Provides secure remote control of another machine using a text-based environment
Secure Shell (SSH)
Port 23
Provides insecure remote control of another machine using a text based environment
Telnet
Port 22
provides secure file transfers
Secure File Transfer Protocol (SFTP)
Port 25
provides the ability to send emails over the network
Simple Mail Transfer Protocol (SMTP)
Port 53
Converts domain names to IP addresses, and IP address to domain names
Domain Name Service (DNS)
Ports 67, 68
Automatically provides network parameters such as assigned IP address, subnet mask, default gateway, and the DNS server
Dynamic Host Control Protocol (DHCP)
Port 80
Used for insecure web browsing
Hypertext Transfer Protocol (HTTP)
Port 143
A newer method of retrieving incoming emails which improves upon the older POP3
Internet Mail Application Protocol (IMAP)
Port 110
Used for receiving incoming emails
Post Office Protocol Version 3 (POP3)
Ports 137, 139
Used for file or printer sharing in a Windows network
Net Basic Input/ Output System (NetBIOS)
Port 443
Used as a secure and encrypted version of web browsing
Hypertext Transfer Protocol - Secure (HTTPS)
Ports 161, 162
Used to collect data about network devices and monitor their status
Simple Network Management Protocol (SNMP)
Port 3389
Provides graphical remote control of another client or server
Remote Desktop Protocol (RDP)
Port 389
Used to provide directory services to your network
Lightweight Directory Access Protocol (LDAP)
Port 445
Used for Windows file and printer sharing services
Server Message Block (SMB)
Unreliable and it transmits segments called data grams
User Datagram Protocol (UDP)
Audio, video streaming, DHCP, and TFTP
UDP (Connectionless)
Connection-oriented protocol = reliable way to transport segments across the network
Transmission Control Protocol (TCP)
SSH, HTTP, or HTTPS are
TCP (Connection-Oriented)
Ports 67, 68
Automatically provides network parameters such as assigned IP address, subnet mask, default gateway, and the DNS server
Dynamic Host Control Protocol (DHCP)
Ports 69
a connectionless protocol that uses UDP as its transport
Trivial File Transfer Protocol (TFTP)