Network+ Study Cards Flashcards
Define:
Long Term Evolution (LTE)
Long Term Evolution (LTE)
- Uses SIM cards and offers speeds up to 300/75 Mbps.
- Generally accepted as a true 4G technology.
Define:
Type-2 Hypervisor
Type-2 Hypervisor
- A hypervisor that runs on top of software.
- Ex. VM Ware Workstation
Define:
Port Aggregation Control Protocol(PAgP)
Port Aggregation Control Protocol(PAgP)
- The Cisco protocol used for port aggregation.
Define:
TCP
TCP-Transmission Control Protocol
- Sends a transmission to achieve “connection” before sending data.
- Is reliable.
Three-Way Handshake of TCP:
- SYN (synchronize…from client to host)
- SYN, ACK (syncronize, acknowledge..from host to client)
- ACK (acknowledge…from client to host)
Define:
Worm
Worm
- Functions similarly to a virus, though it replicates exclusively through networks.
Define:
Multicast
Multicast
- A method where a single computer sends a packet to a group of interested computers.
Define:
OSI Layer 4
Transport Layer-OSI Layer 4
- Defines how information moves.
- Segements the information into smaller portions.
Define:
Multiprotocol Label Switching (MPLS)
Multiprotocol Label Switching (MPLS)
- A router feature that enables certain data to use a desired connection. it works with any type of packet switching (even ethernet) to force certain types of data to use a certain path.
Define:
Loopback Address
Loopback Address
- 127.0.0.1
- Sending data to this address is telling the device to send packets to itself.
Define:
TCN
TCN-Topology Change Notification
- Allows switches to rework themselves around a failed interface or device.
Define:
ICMP
ICMP-Internet Control Message Protocol
- The request/response protocol of TCP/IP.
- Does not establish a connection, but rather, informs of one.
- Works at layer 3 and handles mundane tasks such as “host unreachable” messages.
- A good example of this is the “ping” command
Define:
Wireless Standards
Wireless Standards
Define:
Performance Monitors
Performance Monitors
- Tracks the performance of some aspect of a system over time and lets you know when things aren’t normal.
Define:
DNS Cache Poisoning
DNS Cache Poisoning
- An attacker targets a DNS server to query an evil DNS server instead of the correct one.
- The server can in turn tell the target DNS server spoofed DNS information. The DNS server will then cache that spoofed information and spread it to hosts and possibly other servers.
Define:
Spoofing
Spoofing
- The process of pretending to be someone or something you are not by placing false information into your packets.
Define:
DHCP Snooping
DHCP Snooping
- Creating a list of MAC addresses for all of a networks known DHCP servers & clients. If an unknown MAC address starts sending DHCP server messages, the DHCP snoop-capable switch will block that device, stopping all unauthorized DHCP traffic and sending an alarm to the appropriate person.
- Dynamic ARP Inspection (DIA)- Cisco’s proprietary version of DHCP Snooping
Define:
Anycast
Anycast
- Starts by giving a number of computers the same IP address. Then routers use border gateway protocol to determine which computer in the cluster is closest. When that router gets a packet addressed to that IP address, it sends it only to the closeset root DNS server, even though it may know where others are located.
- An anycast address is a unicast address, and, in most cases, the computer sending the packet doesn’t know or care to know the address is anycast. The only device that knows (and cares) is the top-tier router that has the smarts to send the packet only to the closest DNS server.
Define:
Link Aggregation
Link Aggregation
- The process of using multiple NICs as a single connection, increasing speed as a result.
- Also known as bonding.
Define:
UPC Connector
UPC Connector-Ultra Physical Contact Connector
- Polished significantly more over polished connectors for a superior finish & reduce signal loss significantly.
Define:
Convergence
Convergence
- Meaning the updating has completed.
- Also known as “ready state”
- Can refer to routing tables within a router or when Spanning Tree Protocol has mapped the switches within a network.
Define:
Tunnel
Tunnel
- An encrypted link between two programs on two seperate computers.
Define:
Unidirectional Antenna
Unidirectional Antenna
- Focuses a radio wave into a beam of sorts.
- Parabolic- Looks like a satellite dish.
- Yagi- Named for one of its inventors, and often called a beam antenna, can enable a focused radio wave to travel a long way, even miles.
Define:
Quality of Service(QoS)
Quality of Service(QoS)
- Policies to prioritize traffic based on certain rules. These rules control how much bandwidth a protocol, PC, user, VLAN, or IP address may use.
Identify Each:
Dynamic Routing Protocols
Dynamic Routing Protocols
Challenge:
Binary → IP Conversion
Binary → IP Conversion Challenge
- Study partner choose a random string of 8- 1s & 0s then provide them to the studee. Have the studee convert this to an octet of an IP address by hand.
- Use a calculator to confirm after the studee completes this work by hand.
Define & Identify Ports:
LDAPS
LDAPS-Lightweight Directory Access Protocol over SSL/TLS
- Port 636 TCP & UDP
- A protocol used to query & change a database used by the network. However, does this in a secure/encrypted mannser using SSL/TLS.
- Less common.
- Made obsolete by LDAPv2
Define:
Asymmetric-Key Algorithm
Asymmetric-Key Algorithm
- Any encryption that uses the different keys for encryption and decryption.
Define:
Omnidirectional Antenna
Omnidirectional Antenna
- Radiates the signal outward from the WAP in all directions.
Define:
Distributed Control System (DCS)
Distributed Control System (DCS)
- Similar to an ICS but for larger operations with multiple machines.
- Consists of smaller controllers directly on a machine, to distribute the computing load. These controllers then talk back to a cectralized controller called the ICS server.
- Typically controlled through Human Machine Interfaces (HMIs) that are typically built (physical) or programmed (software) for a specific task.
Identify & Define:
Troubleshooting Steps
Troubleshooting Steps
-
Identify the Problem
- Gather Information
- Duplicate the Problem
- Question Users
- Identify Symptoms
- Determine if anything has changed
- Approach multiple problems individualy
-
Establish a Theory of Probable Cause
- Question the obvious
- Consider multiple approaches
- Top-to-bottom/bottom-to-top OSI model
- Divide and conquer
-
Test the Theory to Determine the Cause
- Once a theory is confirmed, determine the next steps to resolve the problem.
- If the theory is not confirmed, re-establish a new theory or escalate.
- Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
- Implement the Solution or Escalate as Necessary
- Verify Full System Functionality and, if Possible, Implement Preventable Measures
- Document Findings, Actions, and Outcomes
Define:
Modulator
Modulator
- Takes a digital signal and converts it to analog.
- A demodulator reverses this process.
Define:
Point-to-Point Tunneling Protocol(PPTP)
Point-to-Point Tunneling Protocol(PPTP)
- A protocol that works with PPP to provide a secure data link between computers using encryption.
Define:
Radio-Frequency Identification (RFID)
Radio-Frequency Identification (RFID)
- Uses the same concepts of tag and reader as NFC, but has several differences.
- Not a single standard, but many.
- Uses diverse frequencies & protocols
- Much broader application than NFC
-
Similar features between different RFID’s:
- Close proximity-usually less than 1m
- Security- Usually weak with no encryption.
- Most commonly used for labels.
Define:
Integrated Services Digital Network (ISDN)
Integrated Services Digital Network (ISDN)
- The CCITT standard that defines a digital method for telephone communications. Originally designed to replace the current analog phone systems.
- ISDN lines have phone numbers & support up to 128-Kbps transfer rates.
- Also allows voice & data to share a common line.
Define:
Primary Rate Interface (PRI)
Primary Rate Interface (PRI)
- A full T1 line, carrying 23 B channels.
Define:
Link State Dynamic Routing Protocol
Link State Dynamic Routing Protocol
- Announces and forwards only indivisual route changes as they appear.
Define & Identify:
Private IP Addresses
Private IP Addresses
- Private IP addresses are unable to talk directly to the internet.
- They use NAT to speak to the internet.
Ranges:
10.0.0.0-10.255.255.255
- 16.0.0-172.31.255.255
- 168.0.0-192.168.255.255
Define:
IANA
IANA-Internet Assined Numbers Authority
- Formed to track & disperse IP addresses to those who need them.
Define:
FCS
FCS-Frame Check Sequence
- Enables ethernet nodes to identify when bad things happen to good data.
- Uses the CRC to verify data.
Define:
Software as a Service (SaaS)
Software as as Service (SaaS)
- Centralized applications that are accessed over a network.
Identify Each:
IP Classes
IP Classes
- Class A- 1st decimal value starts with 1-126
- Class B- 1st decimal value starts with 128-191
- Class C- 1st decimal value starts with 192-223
- Class D- 1st decimal value starts with 224-239
- Class E- 1st decimal value starts with 240-254
Define:
Dynamic Multipoint VPN(DMVPN)
Dynamic Multipoint VPN(DMVPN)
- Enables a direct VPN connection between multiple locations directly, without having to take a less efficient path.
- Optional wording: Enables direct VPN connections between multiple sattelite locations.
- Typically uses IPsec for security.
Define:
TEMPEST
TEMPEST
- The NSA’s security standard that is used to combat radio frequency(RF) emanation by using enclosures, shielding, and even paint.
Define:
Port Forwarding
Port Forwarding
- The ability to designate a specific local address for various network services. Computers outside the network can request a service using the public IP of the router and the port number of the desired device.
Define:
Activation
Activation
- When a virus does something such as erase the boot sector of a drive.
- Requires human action to replicate.
- Usually attached to something like a host-file, not a standalone program.
- Does not replicate through networks.
Define:
Medianet
Medianet
- A network of typically far-flung routers & servers that provide – via QoS and other tools – sufficient bandwidth for video tele-conferencing.
Define:
Extended Service Set Identifier (ESSID)
Extended Service Set Identifier (ESSID)
- In an ESS every WAP connects to a central switch or switches to become part of a single broadcast domain.
Define:
Adaptive Network Technology (ANT+)
Adaptive Network Technology (ANT+)
- Low-speed, low-power networking technology that, similarly to NFC, consists of a passive ANT device & an ANT reader.
- Typically used for things like heart-rate monitors where low power is paramount.
- Encrypted with AES.
Identify Each:
Backups
Backups
- Full Backup- Every file selected is backed up in its entirety.
- Incremental Backup- Includes only files with the archive bit turned on. In other words, it copies only the files that have changed since the last full or incremental backup.
- Differential Backup- Copies all the files that have been changed since the last full backup. It does not turn off archive bits.
Define:
Permanent Virtual Circuit (PVC)
Permanent Virtual Circuit (PVC)
- A feature of MPLS, sold by ISPs that is essentially a VPN between two customer locations.
Define:
IDF
IDF-Intermediate Distribution Frame
- The location where all horizontal runs from all work areas on a single floor come together.
Define:
Carrier Sense Multiple Acccess w/ Collision Avoidance (CSMA/CA)
Carrier Sense Multiple Access w/ Collision Avoidance (CSMA/CA)
- Access method only used in wireless networks.
- Before hosts send out data, they first listen for traffic.
- If the network is free, they send out a signal that reserves a certain amount of time to make sure the network is free of other signals.
- If data is detected in the air, the hosts wait a random amount of time before trying again.
- If there are no other wireless signals, the data is sent out.
Define:
SSL/TLS
SSL/TLS-Secure Sockets Layer/Tunnel Layer Security
- A protocol developed by Netscape for transmitting private documents securely over the internet.
- SSL is technically depricated these days and Tunnel Layer Security is the current iteration.
- TLS is robust and works with almost any TCP application.
Define:
BPDUs
BPDU-Bridge Protocol Data Units
- Special STP packets that map the network between switches.
- Will elect one switch as the “root bridge” which acts as the center of the STP universe.
Define:
Broadcast
Broadcast
- A way to send packets in which every computer on the LAN hears the message.
Identify:
10GBaseT
10GBaseT Summary
- Speed: 10G
- Signal: Baseband
- Pairs: 4 pair @ full-duplex
- Distance: 55 meters or 100 meters
- Cable Type: CAT 6 or CAT 6a using RJ-45 Connectors
Define:
Dipole Antenna
Dipole Antenna
- The standard straight-wire antennas that provide the most omnidirectional function.
Define:
Port Aggregation
Port Aggregation
- A method used for joining two or more switch ports logically to increase bandwidth.
Define:
Session Highjacking
Session Highjacking
- Tries to intercept a valid computer session to get authentication information.
Define:
Route Redistribution
Route Redistribution
- When a router ontains routes using one protocol and then announces the routes over another protocol.
Define:
ARP
ARP-Address Resolution Protocol
- A special request sent by a computer used to obtain the MAC of other computers on the network.
Define:
Vulnerability Scanner
Vulnerability Scanner
- A program that will inspect a huge number of potentail vulnerabilities & create a report for you to then act upon.
Define:
Rivest Cypher 4 (RC4)
Rivest Cypher 4 (RC4)
- Encryption
- Was the dominant stream cypher for a while.
- A number of weaknesses were found starting in 2001 and continuing to this day, causing the industry to look at it as a legacy cypher and move more to AES and block cyphers.
Define & Identify Ports:
SSH
SSH-Secure Shell
- Port 22 TCP & UDP
- A terminal emulator that looks exactly like Telnet but encrypts the data.
Define & Identify Ports:
POP
POP-Post Office Protocol
- Port 110 TCP
- One of two protocols that recieve eamils from SMTP.
- Old and obsolete, was replaced by IMAP
- Currently on version 3
Define:
Primary & Secondary DNS Servers
Primary(Master) & Secondary(Slave) DNS Servers
- When a domain is large enough (ie. google) it may need more than one DNS server. In this setup secondaries act as subordinates to the primary, but they all support the same domain.
Identify:
1000BaseT
1000BaseT Summary
- Speed: 1000 Mbps
- Signal: Baseband
- Distance: 100 meters
- Node Limit: 1024 Nodes per hub/switch
- Topology: Star-bus
- Cable Type: CAT 5e or better UTP/STP w/ RJ-45
Define:
Ad hoc Mode
Ad hoc Mode
- Sometimes called peer-to-peer, each wireless node is in direct contact with each other node in a decentralized free-for-all.
- Mesh topology.
Define:
Remote Terminal Units (RTUs)
Remote Terminal Units (RTUs)
- Provide the same function as a controller with 2 major differences.
- Designed to have some amount of autonomyin case it loses connection with central control.
- Designed to take advantage of some form of long-distance communication such as telephony, fiber -optic, or cellular WANs.
Define:
Man-in-the-Middle
Man-in-the-Middle
- An attacker taps into communications between two systems, covertly intercepting traffic thought to be only between those two systems, reading or in some cases even changing the data and then sending that data on.
Identify Each:
Last-Mile Solutions
Last-Mile Solutions
- Dial-Up
- DSL
- Broadband Cable
- Satellite
- Fiber
Define:
Spyware
Spyware
- A function of any program that sends information about your system or your actions over the Internet.
Define:
Autonomous System
Autonomous System
- One or more networks that are goverened by a single dynamic routing protocol. They do not deliver data using IP addresses but rather an ASN
Define:
BGP
BGP-Border Gateway Protocol
- The one protocol the internet has settled on to use as the communication protocol or EGP for ALL Autonomous Systems.
- Most likely in use to allow you to communicate to/from your ISP.
- Currently version BGP-4
Define:
Message-Digest v5 (MD5)
Message-Digest v5 (MD5)
- The first commonly used hash algorithm.
- Created a 128-bit message-digest
- Considered unsecure these days.
Define:
Digital Signature
Digital Signature
- Nonrepudiation
- A hash of the public key encrypted by the private key. The person with the matching public key decrypts the digital signature using the public key, generates their own hash, and compares it to the decrypted has to verify that it came from the intended sender.
Define:
MAC Address
MAC Address-Media Access Control Address
- 48-bit or 6-byte identifier used for identifying a NIC.
Define:
MDF
MDF-Main Distribution Frame
- The combination of demarc, phone cross-connects, and LAN cross-connects where all IDF locations centralize to.
Define:
Data Encryption Standard (DES)
Data Encryption Standard (DES)
- The oldest symmetric-key algorithm of TCP/IP.
- Block cypher
- Uses a 128-bit block size and a 56-bit key.
- The 56-bit key length has made it obsolete.
Define:
Denial of Service (DOS)
Denial of Service (DOS)
- An attack on a server (or servers) that provides some sort of service to the Internet, with the goal of making that site unable to process any incoming server requests.
- Physical
- Amplified
- Dynamic
- Reflective
Define & Identify Ports:
SMB
SMB-Server Message Block
- Port 445 TCP
- Protocol used by Microsoft clients & servers to share files & print resources.
Define:
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access (WPA)
- A wireless security protocol that addresses the weaknesses and acts as a upgrade to WEP.
- WPA offers security enhancements such as dynamic encryption key generation (ie. keys are issued on a per-user and per-session basis), an encryption key integrity checking feature, user authentication through the industry standard EAP, and other advanced features that WEP lacks.
- Temporal Key Integrity Protocol (TKIP)- This is the extra layer of security that WPA adds on top of WEP.
Define:
Virtual Router Redundancy Protocol (VRRP) & Hot Standby Router Protocol (HSRP)
Virtual Router Redundancy Protocol (VRRP) & Hot Standby Router Protocol (HSRP)
- Both take multiple routers and gang them together into a single virtual router to provide redundancy.
- Cannot provide load balancing
- HSRP is Cisco proprietary.
Identify:
Important IPv6 Multicast Addresses
Important IPv6 mUlticast Addresses
- ff02::1- All Nodes Address
- ff02::2- All Routers Address
- ff02::1:ffxx:xxxx- Solicited-Node Address
Define:
Deauthentication Attack (Deauth)
Deauthentication Attack (Deauth)
- A form of DOS that targets 802.11 wireless networks, specifically by sending out a frame that kicks a wireless client off of its WAP connection. Then, a rogue WAP nearby presents a great and often automatic alternative option for connection. The rogue WAP then proceeds to collect data from the client after connecting the client to the internet.
Define:
Stateful DHCPv6
Stateful DHCPv6
- Works similar to IPv4 DHCP servers, handing out complete IPv6 information: addresses and default gateways, as well as items such as DNS server addresses.
Identify Each:
Authentication Examples
Authentication Examples
- Usernames/passwords
- Biometrics
- Smart Cards
- MFA/2FA
- Something you know
- Something you have
- Something you are
- Something you do
- Somewhere you are
Define:
Block Cypher
Block Cypher
- More common
- Encrypt data in single chunks of a certain length at a time.
Define:
IGP
IGP-Internal Gateway Protocol
- The protocols used to communicate on the network/s within an automated system.
Define:
Jitter
Jitter
- The loss of packets due to an overworked AP.
Define:
NIU
NIU-Network Interface Unit
- Serves as the demarc between your netwrok and your ISP.
ie. modem
Define:
Z-Wave/Zigbee
Z-Wave/Zigbee
- Both use mesh
- Competing technologies
- Z-wave is proprietary with and open API for programmers.
- Zigbee is completely open source
- Both are used in home automation.
Define:
Active Directory Domain
Active Directory Domain
- A form of directory service used in networks with Windows servers. Creates an organization of related computers that share one or more Windows domains.
- Used to control things such as permissions, GPOs, and computer settings from one central location.
Define:
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI)
- Nonrepudiation
- The system for creating and distributing digital certificates using sites like Comodo, Symantec, or GoDaddy
Define:
Replication
Replication
- To make copies of itself, often as code stored in boot sectors or as extra code added to the end of executable programs.
Define & Identify Ports:
TFTP
TFTP-Trivial File Transfer Protocol
- Port 69 UDP
- A simple FTP that allows a client to get a file from or put a file on a remote host.
Define:
Near-Field Communication (NFC)
Near-Field Communication (NFC)
- A low-speed, short-range technology designed primarily for small-value monetary transactions.
- Typically consists of an unpowered, passive tag that holds personal data & an NFC reader that when brought close to the tag, creates an electromagnetic induction in the tag and allows the two devices to communicate using only the power from the reader.
Define:
Service Level Agreement (SLA)
Service Level Agreement (SLA)
- A document between a customer & a service provider that defines the scope, quality, and terms of service to be provided.
- Definition of service provided
- Equipment
- Technical support
Define:
IGMP
IGMP-Internet Group Management Protocol
- Enables routers to communicate with hosts to determine a “group” memebership.
- An example of this is Multicasting-You can provide one IP that multiple clients view instead of sending them multiple streams.
Name the Sections:
Ethernet Frame
Ethernet Frameconsists of what?
- Reaches the NIC and then changes.
- Preamble
- Destination MAC
- Source MAC
- Destination IP (Type ie. IPv4 or IPv6)
- Source IP
- Destination Port
- Source Port
- Data minimum of 64 bytes
- FCS
Define:
SIP Trunk
SIP Trunk
- Connects PBX systems from multiple locations seamlessly over the internet via a virtual connection.
Define:
Routing Table
Routing Table
- The table a router uses to inspect IP packets and send data where it needs to go.
Define:
Enhanced Data Rates for GSM Evolution (EDGE)
Enhanced Data Rates for GSM Evolution (EDGE)
- The last iteration of GSM
- Offers speeds up to 384 Kbps
Identify & Define Each:
EAP Types
EAP Types
-
EAP-PSK(Pre-Shared Key)- A shared secret code between the WAP & the wireless client.
- Uses AES for encryption
- EAP-TLS- Defines the use of a RADIUS server as well as mutual authentication, requiring certificates on both the server & every client.
- EAP-TTLS- Similar to EAP-TLS but only uses a single server-side ticket.
-
EAP-MS-CHAPv2- More commonly known as Protected EAP (PEAP), it uses a password function based on MS-CHAPv2 with the addition of an encrypted TLS tunnel.
- The most common implementation of EAP.
- EAP-MD5- A very simple version of EAP that only uses MD5 hashes for transfer of authentication credentials. It is weak, and the least common.
- Lightweight EAP (LEAP)- A proprietary EAP used almost exclusively by Cisco wireless products.
- EAP Flexible Authentication via Secure Tunneling (EAP-FAST)- Cisco’s replacement for LEAP.
Define:
PC Connector
PC Connector-Physical Contact Connector
- A fiber connector in which the two pieces of the fiber make physical contact.
Identify:
10GBase ER/EW
10GBase ER/EW (Extra Long Range/Extra Long Wavelength) Summary
- Single Mode Fiber
- 1550nm Wavelength
- Commonly LC & SC Connectors
- 40 km distance
Identify:
Configure Router
Serial Connection
Configure Router Serial Connection
- Speed(Baud): 9600
- Data Bits: 8
- Stop Bits: 1
- Parity: none
Define & Identify Ports:
FTP
FTP-File Transfer Protocol
- Port 20 & 21 TCP
- Standard communication protocol used to transfer files from server to client.
Define & Identify Ports:
Telnet
Telnet Protocol
- Port 23 TCP
- A program that enables users to log onto remote systems from their own host systems.
- Not really used anymore, has been replaced by SSH.
Identify:
10GBase SR/SW
10GBase SR/SW (Short Range/Short Wavelength) Summary
- Multi-Mode Fiber
- 850nm Wavelength
- Connectors not defined
- 26-300 meter distance
Define:
Virtual Local Area Network (VLAN)
Virtula Local Area Network (VLAN)
- Enables you to segment a physical network into multiple discreet networks without having to add additional hardware.
- The most common method for configuring a VLAN capable switch is to log in via SSH and configure using command line.
Define:
Industrial Control System (ICS)
Industrial Control System (ICS)
- The overall system that monitors and controls machines.
Has 3 basic components:
- Input/Output functions on the machine
- A controller
- Interface for the operator
Define:
Persistent Agent
Persistent Agent
- A small scanning program that, once installed on the computer, stays installed and runs everytime the computer boots. These agents are composed of modules that perform a thourough inventory of each security-oriented element in the computer.
Define:
Reverse Lookup Zone
Reverse Lookup Zone
- Enables a system to determine an FQDN by knowing the IP address.
Define:
Macro
Macro
- Any type of virus that exploits application macros to replicate & activate.
Define:
Infrastructure as a Service (IaaS)
Infrastructure as as Service (IaaS)
- Uses virtualization to minimize idle hardware, protect against data loss and downtime, and respond to spikes in demand.
Define:
OSI Layer 6
Presentaion Layer-OSI Layer 6
- Translates lower layers into a format useable by the Application Layer and vice versa.
- Not really used anymore in modern computing.
Define & Identify Ports:
LDAP
LDAP-Lightweight Directory Access Protocol
- Port 389 TCP & UDP
- A protocol used to query & change a database used by the network.
- ie. Databases used to track who is logged into a network, how many DHCP clients are currently active, or the location of all the printers on a network.
- Talks between active directories, to update information.
Define & Identify Ports:
HTTPS
HTTPS-Hyper Text Transfer Protocol over SSL/TLS
- Port 443 TCP
- Same as HTTP but instead does this in a secure/encrypted manner using TLS.
Define:
APC Connector
APC Connector-Angled Physical Contact Connector
- A fiber connection in which an 8-degree angle is added to the curved end, lowering signal loss further.
- The connection does not degrade with multiple insertions.
Define:
OSI Layer 5
Session Layer-OSI Layer 5
- Manages the communication method and opens/closes the communication lanes between computers.
Identify & Define:
Cable Issues
Cable Issues
- Open Circuit- When one or more of the wires in a cable do not connect end to end.
- Lacks Continuity- One of the wires touches another, creating a short.
- Wire Map Problem- The proper pinout is not used on one or more ends.
- Crosstalk- When electrical signal leaks from one wire to another.
Define:
CRC
CRC-Cyclic Redundancy Check
- The sending machine runs data throught this mathematical formula to create the FCS. Then the receiving machine opens the frame, runs the CRC again, then compares the answer with the one included in the frame.
Define:
APIPA
APIPA-Automatic Private IP Addressing
- The address automatically assigned to a DHCP device when it does not receive a response to a DHCP discover message.
- This IP is in the range 169.254.0.0 /16
Define:
OSI Layer 2
Data Link Layer-OSI Layer 2
- Communicates using MAC Addresses
- NIC’s, Switches
Define:
Asymmetrical Digital Subscriber Line (ADSL)
Asymmetrical Digital Subscriber Line (ADSL)
- Uses different upload & download speeds.
- Download speeds are much faster than upload speeds.