Networking Flashcards
HTTP
Hypertext Transfer Protocol
Port 80
TCP
Application Layer
HTTPS
Hypertext Transfer Protocol Secure
Port 443
TCP
Application Layer
DNS
Domain Name System
Translate domain names to IP addresses
Port 53
UDP for queries
TCP for Zone Transfer
Application Layer
DHCP
Dynamic Host Configuration Protocol
Automatically assigns IP addresses
Port 67/68
UDP
Application Layer
OSI
Open System Interconnection
Networking framework to implement protocols in layers. It conceptually divides computer network architecture into a logical seven-layer progression.
When network traffic is generated, it is assembled (encapsulated) from the top layer to the bottom layer.
When received, traffic goes through the model in the reverse direction: from bottom to top (decapsulation).
OSI Layers
Layer 7 Application
Layer 6 Presentation
Layer 5 Session
Layer 4 Transport
Layer 3 Network
Layer 2 Data Link
Layer 1 Physical
Encapsulated Layer 7-1 All People Seem To Need Data Processing
Decapsulated Layer 1-7 Please Do Not Throw Sausage Pizza Away
Layer 7
Application
Users interact directly with applications that operate at Layer 7. Examples of Layer 7 applications include web browsers such as Google Chrome, Firefox, and Safari, and other applications, such as SSH and FTP.
Layer 6
Presentation
Data formatting: encryption and decryption
Ensure data is in useable format
Layer 5
Session
Inter-host communication
The session layer is responsible for creating a session between two devices. Controls ports and sessions
Layer 4
Transport
Data transmission.
UDP and TCP
Layer 3
Network
Decides what path the data will take
Layer 3.
Diagnostic tools, such as ping and tracert, operate in this layer.
Layer 2
Data Link
Physical addressing/MAC
Decides format of data.
Switches operate in this layer.
Layer 1
Physical
How data is physically sent through the network.
This layer determines how bits are electrically or optically transferred by hardware devices that interface directly with a network medium, such as coaxial cable, optical fiber, or twisted-pair copper wire.
Hubs operate in this layer.
FTP
File Transfer Protocol
File Transfer protocol is used to transfer files over the network.
For example, the FTP service can be used to transfer files to another device over the
network.
Port 20 data transfer/ 21 authentication
TCP
SSH
Secure SHell
Secure SHell is a secure command-line protocol that allows the user to run remote commands on a remote machine.
Any data that passes through SSH is encrypted.
Port 22
TCP
TCP/IP
Transmission Control Protocol/Internet Protocol
The model describes how data is exchanged over the Internet, including how data should be divided into packets, addressed, transmitted, routed, and received by the destination.
TCP/IP Layers
Layer 4 Application
Layer 3 Transport
Layer 2 Internet
Layer 1 Network Access
ipconfig
Displays a computer’s IP configuration
Private IP Space
Non-Routable
RFC1918
Class A 10.0.0.0/8
Class B 172.16.0.0/12
Class C 192.168.0.0/16
ping
Used to check connectivity between computers over the network.
It also provides information, such as connection speed and reliability.
ICMP is its protocol
nslookup
Sends a query to get the name of a computer by its IP address.
It can also do the opposite - query an IP address by the domain name.
tracert
Displays all the stations (hops) along the route taken by the information to its
destination.
It can work with a domain name or an IP address
netsh
It allows the configuration of the IP address, DNS, default gateway, and various network
functions.
TCP 3 way handshake
- The client sends a SYN
- The server responds with a SYN-ACK
- The client finalizes with ACK
Segment
A broken piece of a packet with a TCP header in each of them.
Frame
The protocol data unit at the data link layer.
Packet
A data fraction transmitted over the network layer.
UDP
User Datagram Protocol: connectionless protocol. Faster, less strict about data integrity. Doesn’t rearrange data packets or check for errors.
TCP
Transmission Control Protocol: connection-oriented protocol. High reliability, rearranges data packets in order, detects errors. 3 way handshake
RDP
Remote Desktop Protocol
TCP
Port 3389
SMTP
Simple Mail Transfer Protocol
Used in sending and receiving email
TCP
Port 25
SMB
Server Message Block
A network file sharing protocol that allows applications on a computer to read and write to files
TCP
Port 445
netstat
Provides statistics about all active connections so you can find out which computers or networks a PC is connected to.
TFTP
Trivial File Transfer Protocol (TFTP) is a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host.
UDP
Port 69
NTP
Network Time Protocol (NTP)
Synchronizes computer clocks
UDP
Port 123
Switch
Designed to forward frames from source to destination according to specific MAC addresses in the Frame.
Layer 2 device
MAC Address Table
A way to map each and every port to a MAC address.
Dynamic- Automatic configured MAC address
Static- Manually configured MAC address
Store-and-Forward Switch
Buffers the entire frame upon receipt. Checks for errors. Slow
Cut-Through Switching
Faster. Only the first 6 bytes of the incoming frame is buffered (MAC address). Forwards immediately. No error checking.
Fragment-Free Switching
Buffers the first 64 bytes including MAC address data and the frames payload. Provides partial error checking.
Auto-Negotiation
Tells connected devices to announce their capabilities. Bases on the settings, chooses the optimal speed and duplex mode.
Cisco IOS
Internetwork Operating System
User mode
Exec (enable) mode
Config term
interfaces
ARP
Address Resolution Protocol (ARP)
Procedure for mapping a dynamic IP address to a permanent physical machine address in a local area network (LAN)
Telnet
Manage devices from anywhere.
Not encrypted
TCP
Port 23
Hexadecimal
0-9
A-F