Network Fundamentals Flashcards

Understand network appliances, applications, functions, topologies, architecture types, and configuration of devices.

1
Q

Why are there clients in a network?

A

Because they are devices that users use to access the network (e.g., workstations, laptops, tablets)

Clients are essential for user interaction with network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do servers play a role in a network?

A

They provide resources to the network (e.g., email servers, file servers)

Servers are crucial for centralized resource management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does the function of hubs work in networking?

A

They were older technology that connected devices but not commonly used due to limitations

Hubs are generally replaced by switches for better efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do switches differ from hubs?

A

They are considered smarter hubs that ensure security and efficient bandwidth utilization

Switches can manage data traffic more intelligently than hubs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of Wireless Access Points (WAPs)?

A

To enable wireless devices to connect to a wired network using radio frequency waves

WAPs extend the reach of a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do routers work in a network?

A

They connect different networks, make intelligent forwarding decisions based on IP addresses

Routers are vital for directing data traffic between networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does intelligent forwarding work for IP addresses in a router within a network connection?

A

Intelligent forwarding is when routers analyze IP addresses and other factors to make smart decisions about the best path for sending data packets to their destination, improving efficiency and reducing delays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is information being sent as data packets to their destination?

A

A packet is a small segment of a larger message. Data sent over computer networks, such as the Internet, is divided into packets for multiple information to be sent in any specified order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a firewalls function?

A

It acts as a security barrier between internal network and the internet, monitor and control traffic

Firewalls are essential for protecting network integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do load balancers work?

A

Load balancing is the practice of distributing computational workloads between two or more computers; divide network traffic among several servers.

Divide traffic equally across a pool of resources that support an application

Load balancers enhance performance and reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is a proxy server used within a network?

A

A proxy server is a system or router that provides a gateway between users and the internet as a “filter” for privacy and security reasons.

Because a proxy server has its own IP address (internet server), it acts as a go-between for a computer and the internet. Your computer knows this address, and when you send a request on the internet, it is routed to the proxy, which then gets the response from the web server and forwards the data from the page to you.

Proxy servers can also cache content for faster access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is a proxy server being utilized within a server?

A

When the proxy server forwards your web requests, it can make changes to the data you send and still get you the information that you expect to see. A proxy server can change your IP address, so the web server doesn’t know exactly where you are in the world. It can encrypt your data, so your data is unreadable in transit. And lastly, a proxy server can block access to certain web pages, based on IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is the role of Intrusion Detection Systems (IDS) useful within networks?

A

An application that monitors network traffic and searches for known threats and suspicious or malicious activityTo detect unauthorized access or anomalies into the network

IDS are critical for identifying potential security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is the role of Intrusion Prevention Systems (IPS) useful within networks?

A

To detect and take action to prevent intrusion

IPS actively mitigate threats as they are detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does Network-attached Storage (NAS) work in a network?

A

To dedicated file storage systems providing data access to authorized clients

NAS devices simplify data management for multiple users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How are Storage Area Networks (SANs) described within a network?

A

As high-speed networks for consolidated block-level data storage, enhancing accessibility

SANs are used for large-scale data storage solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How is a Personal Area Network (PAN) described in a network?

A

The smallest network type, covers about 10 feet or less

Examples include Bluetooth and USB connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How is a Local Area Network (LAN) described in a network?

A

A common network type in office buildings, limited distance up to 100 meters

LANs can utilize both wired and wireless technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How is a Campus Area Network (CAN) defined within a network?

A

A building-centric LAN that spans numerous buildings in an area

CANs are commonly found in college campuses or business parks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How do you describe a Metropolitan Area Network (MAN)?

A

Connects locations across the entire city, larger than CAN, up to 25 miles

MANs are used to connect multiple local networks within a city.

21
Q

How do you describe a Wide Area Network (WAN)?

A

Connects geographically disparate internal networks, large geographic coverage

WANs are essential for global connectivity.

22
Q

How does the client/server model work?

A

Utilizes a dedicated server for centralized access to files and resources

This model simplifies administration and backup processes.

23
Q

Why are there benefits of the client/server model?

A

It provides:
* Centralized administration
* Easier management
* Better scalability

These benefits make it suitable for business environments.

24
Q

Why are there drawbacks of the client/server model?

A

They consist of:

  • Higher cost
  • Requires dedicated hardware and specialized skillset

These factors can limit its use in smaller setups.

25
How do you define a Peer-to-Peer Model?
The direct sharing of resources among peers without a centralized server ## Footnote This model is often used for low-cost setups.
26
Why are the benefits of the Peer-to-Peer Model?
It provides: * Low cost * No specialized infrastructure or hardware ## Footnote Useful for informal or personal networks.
27
How are the drawbacks of the Peer-to-Peer Model?
It can cause: * Redundancy * Complex management * Poor scalability for large networks ## Footnote Not recommended for business networks.
28
How long is the maximum coverage of a Personal Area Network (PAN)?
About 10 feet or less ## Footnote Typical examples include Bluetooth connections.
29
How long is the maximum distance for a Local Area Network (LAN)?
Up to 100 meters ## Footnote LANs can use Ethernet or WiFi technologies.
30
How does the function of the physical topology work in a network?
Describes physical cabling and device connections ## Footnote It represents the real-world layout of the network.
31
How is the logical topology in networking?
Describes how data flows in the network, focusing on logical connections ## Footnote It differs from physical topology, which is about actual layout.
32
How do you describe the function within a Point-to-Point Topology?
Direct connection between two devices, simple and reliable ## Footnote Commonly used in WAN connections.
33
How does a Ring Topology work?
Circular data path with each device connected to two others, unidirectional flow ## Footnote It can create a single point of failure unless redundant connections are present.
34
How does a Bus Topology work within a network?
All devices connected to a central cable (bus), easy to install ## Footnote However, failure of the main cable results in network failure.
35
How do you define a Star Topology?
Each node connected to a central point (network switch), robust but reliant on the central point ## Footnote Common in home networks.
36
How do you describe the Hub-and-Spoke Topology?
Variation of star topology with a central hub connected to multiple spokes ## Footnote Often used in telecommunications networks.
37
How do you describe the Mesh Topology?
Point-to-point connections between every device for redundancy ## Footnote Can be full or partial mesh, providing robustness.
38
How do you determine the amount of full mesh connections based on what given formula?
n (n-1)/2 ## Footnote n represents the number of nodes.
39
How does Infrastructure Mode work in wireless networking?
Centralized wireless network with a wireless access point, similar to star topology ## Footnote Common in homes and supports wireless security controls.
40
How is Ad Hoc Mode utilized in wireless networking?
Decentralized wireless network, operates like a peer-to-peer network ## Footnote Devices connect directly without routers or access points.
41
Why datacenter serve a purpose?
Facility composed of networked computers and storage for processing and disseminating data ## Footnote Datacenters are essential for large-scale data management.
42
How does the Core Layer work in a datacenter?
Houses high-performance routers, merging geographically separated networks ## Footnote It acts as the backbone of the network.
43
How does the Distribution/Aggregation Layer work?
Provides boundary definition through access lists and filters, defines network policies ## Footnote Uses layer 3 switches for routing between subnets.
44
How does the Access/Edge Layer work in a datacenter?
Connects endpoint devices using regular switches, ensuring proper packet delivery ## Footnote This layer enhances performance and management.
45
How does a Collapsed Core architecture work?
Network architecture where core and distribution layers are merged into a single layer ## Footnote Suitable for medium to small datacenters.
46
How is Spine and Leaf Architecture described within a network connection?
Focuses on communication within datacenters, consists of two switching layers ## Footnote Enhances speed and reduces latency.
47
How does the North-South Traffic work in a datacenter?
Traffic that enters (Southbound) or leaves (Northbound) the data center from an external system ## Footnote This traffic often involves external communications.
48
How does the East-West Traffic work in a datacenter?
Data flow within a datacenter, prevalent with SDN and virtualization ## Footnote This traffic is crucial for server communication.