Network Implementations Flashcards
what type of switch can do routing
layer 3 switch
most common type of device
access point
control multiple access points and control them
wireless lan controller(WLC)
extend the range of the cables and wifi
repeaters
common device
network printers
Network devices perimeter
the course for the router has been set manually
static routing
how long the router tries that path
time to live(ttl)
shortest number of hops or routers between me and the destination.
distance vector
everything thats under your administrative control. Its also used to decide the shortest path for data to travel
interior gateway protocol
one of the Interior Gateway Protocols (IGPs) used to manage routing within an autonomous system (AS), which is a collection of networks under a single administrative control
RIP
hybrid between distance vector and link state protocol.
Enhanced Interior Gateway Routing Protocol (EIGRP)
a widely used interior gateway protocol (IGP) that is designed to efficiently route data traffic within a single autonomous system (AS), which is typically a single organization’s network. It falls under the link-state routing protocol category, which means that routers exchange information about their directly connected links and then use that information to build a detailed map of the network topology. This allows routers to calculate the shortest paths to different destinations within the network.
open shortest path first(OSPF)
in networking refers to the process by which routers in a network reach a consistent and up-to-date understanding of the network’s topology and routing information
convergence
standardized exterior gateway protocol that is primarily used to exchange routing and reachability information between different autonomous systems (ASes) on the internet. It is classified as a path vector protocol and is responsible for determining the best path for data to traverse from one AS to another.
Border Gateway protocol (BGP)
best routes from source to destination
routing
combine bandwidths
lacp(link aggregation control protocol)
detects and adjusts ethernet cables so they work properly
mdix(medium dependent interface crossover)
voice vlans are specific to what company
cisco
tagging
802.1q
copy from one port and send to another
Port Mirroring
only computers with certain macs can plug in here
port security
creates a topology that helps prevent network loops
Spanning tree protocol
radiates energy more effectively in a single direction
Directional
-directional
-dish
-yagi
non directional circular pattern/Radiated pattern
omnidirectional
-dipole
-collinear
one access point for multiple devices
Basic service set
multiple access points handling and controlling a single WAN/LAN
extended service set
when you get far from one access point and connect to another on a single network
roaming
weak, every frame has a static key, 64 - 128 bit key
WEP wired equivelant privacy
weak but has a new key generated across every frame also known as temporal key integrity
WPA wifi protected access
stronger encryption , uses ccmp, AES with a 128 bit encryption key
wpa 2 802.11i
strongest, uses SAE simultaneous authentication of equals, uses a 128 or 192 bit encryption 3
wpa3
psk or password
pre shared key
14 channels, 22 mhz wide, 1 6 11 are the ones that are in use, bluetooth operates in this frequency spectrum
2.4ghz spectrum
802.11 standards