Networking Flashcards

1
Q

Static

A

Definition: The IP address is a fixed and permanent identifier assigned to a device or network. It remains constant and does not change over time.

Importance: Fixed address that help your device or network be easily identifiable and accessible on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DHCP (Dynamic Host Configuration Protocol)

A

Definition: A system that distributes temporary addresses to devices when they connect to a network.

Works: When a devices joins the network, it sends request to DHCP server, which then assigns an available IP address from a pool of addresses. Automatically assigns IP addresses and network settings to a devices on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

LAN/Ethernet cable

A

Definition: wired connection linking devices in a local area network.

Works: With the UTP (Unshielded Twisted Pair) or STP or Fibr cable and RJ45 connection at both ends.

Importance: Essential for creating wired connections between devices like computers and routers.

Note: All CATX cable are UTP type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hub

A

Definition: Used to exchange data within a local area network.

  • operate at the physical layer of the networking protocol stack and are considered “dumb” devices.
  • When a device sends data to a hub, the hub broadcasts the data to all connected devices on the network.
  • do not have the capability to process or examine IP addresses or MAC addresses.
  • Each device connected to a hub receives the data packet, regardless of the destination MAC address.
  • The device with the matching MAC address accepts the packet, while others discard it.

IP address

  • In the case of hubs and switches, IP addresses are not directly involved in their operation.
  • IP addresses are primarily used for routing data between different networks or subnets.
  • Devices connected to hubs or switches use IP addresses to communicate with devices on other networks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Switch

A

Definition: Used to exchange data within a local area network.

  • operate at the data link layer of the networking protocol stack and are more intelligent than hubs.
  • have the ability to examine MAC addresses and make forwarding decisions based on them.
  • When a device sends data to a switch, the switch examines the destination MAC address of the packet. The switch forwards the packet only to the port associated with the destination MAC address.

IP addresses:

  • IP addresses are used at the network layer of the networking protocol stack.
  • In the case of hubs and switches, IP addresses are not directly involved in their operation.
  • IP addresses are primarily used for routing data between different networks or subnets.
  • Devices connected to hubs or switches use IP addresses to communicate with devices on other networks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Modem (modulator-demodulator)

A

Definition: is a device that connects your network to the internet service provider (ISP) by converting the internet signal from ISP. Handles the conversion between analog and digital signals (usually through telephone lines, cable lines, fiber optics, or satellite).

Importance: responsible for establishing and maintaining the internet connection between your network and the ISP.

Connections: typically provide direct, wired connections to devices through ethernet ports. Can also connect to a router for local network management.

Note: Modems typically have one or more Ethernet ports to connect to devices within your network, such as routers or computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Router

A

Definition: connects multiple devices within a local network and facilitates communication between them.

  • Manages the local network in your home assigns local ip addresses directs data traffic between devices and the internet and often provides Wi-Fi capability.

Connections: connects to the modem to handle internet connectivity. Distributes the internet connection to multiple devices both wired and wirelessly.

Note: doesn’t convert analog and digital signals its primary function is local network management. It relies on the modem to handle signal conversion and connect to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firewall

A

Definition: Like a security guard on a computer or network. It acts as a barrier between your device or network and the internet. Helping to monitor and control the data in and out.

Importance: To keep out unwanted potentially harmful network traffic (Hackers, Malware, and etc.) while allowing the safe and authorized data to pass through.

  • Security rules: Ex. The other ip address or ports is allow and deny.

A. Host-based firewall - software firewall that is installed on a computer protects the pc only.

Ex: MS Windows it is a free package the firewall is already included or built in.

  • There’s also third party firewall that can be purchased example zone alarm

Note: can have two host base firewall running simultaneously, needs to be configured correctly so they can complement each other.

B. Network based firewall- combination of software and hardware and it operates on network layer

Jt is placed between private and public network

FW Hardware>Router>FW>PC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network Ports

A

Definition: A logical connection that’s used by programs and services to exchange information.

  • Determines which service or program in the server You want to use to send and receive data make sure that the right info reaches the right application.

Works:

  1. a port is always associated with an ip address. an ip address determines the location of the server.
  2. a port number determines which service or program on the server it wants to use.

Ex:

IP address | Port
192.168.1.1 | 21 (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MAC address (Media Access Control address)

A

Definition: is a unique identifier assigned to the network interface card (NIC) of a device. It is a hardware address that helps identify a device on a local network. Think of it as a device’s “physical address” on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IP address (Internet Protocol address)

A

Definition: is a unique numerical label assigned to each device connected to a network. It serves as an identifier for devices, allowing them to communicate with each other over the internet or a local network. It’s like a device’s “internet address”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Subnet Mask

A

Definition: is a number that helps determine the network portion and the host portion of an IP address.

It assists in dividing IP addresses into network and host addresses. It helps devices on the same network communicate with each other.

EX: A of “255.255.255.0” indicates that the first three octets (or 24 bits) represent the network portion, while the last octet (or 8 bits) represents the host portion.

For example, if you have an IP address of 192.168.1.10 and a subnet mask of 255.255.255.0, the first three octets (192.168.1) represent the network, and the last octet (10) represents the host within that network.

To determine if two devices are in the same network, you compare the network portions of their IP addresses using the corresponding subnet mask. If the network portions are the same, they are in the same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Gateway

A

Definition: is a device, often a router, that acts as an entry point between different networks.

It facilitates communication between devices on different networks. It’s like a “doorway” between networks, allowing data to flow between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

LDAP (Lightweight Directory Access Protocol)

A

Definition: Open and standard protocol used to access and manage directory information services such as AD over network.

Works: Operates on a client server model where LDAP clients send requests to LDAP servers which in turn process the request and respond with the requested information

EX: LDAP client such as an email client or authentication system sends a query to an LDAP server (AD) requesting info about a user the LDAP server processes the request, search its databases for the requested information (eg. username email address phone numbers) and returns the results to the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network Protocol

A

is a set of rules that devices follow to communicate and exchange data. It ensures that data is transmitted in a structured and consistent manner, enabling devices to understand and interact with each other effectively.

  • Like a language (English, Filipino)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HTTP (Hypertext Transfer Protocol)

A

Definition: it is used for transferring data over the web. It enables communication between web browsers and web servers,
allowing users to access websites.

Works: when you enter a url in your browser and load the web page. Http is used to retrieve and display the web page content.

17
Q

HTTPS (Hypertext Transfer Protocol Secure)

A

it is a secure version of http used for secure data transfer over the web.

Works: it ensures secure communication between your web browser and a website it encrypts the data exchange protecting it from an authorized access.

EX:

  1. When you enter sensitive information like credit card details on a secure website https ensure that the data is transmitted securely.
  2. when you access a website with a padlock symbol in the address bar it indicates a secure http is connection.
18
Q

TCP/IP (Transmission Control Protocol/Internet Protocol)

A

Definition: Forms the foundation for internet communication. Allows different networks and servers to connect with each other and establish a connection, it ensures reliable data transfer.

Works: Ensures reliable delivery of data between devices by dividing it into small pockets and reassembling them at the destination. IP handles addressing and routing ensuring that packets are sent to the correct destination across different networks.

Analogy: It’s a like a road. While the other protocols is a vehicle to transfer the data.

19
Q

How does the TCIP/IP work together with other protocols?

A

Think of TCP/IP as the road system of a country. It connects different places and allows vehicles to travel from one place to another. It’s an essential infrastructure, but it doesn’t dictate what kind of vehicles should travel on it or what these vehicles should carry. It just provides the path.

Now, the other protocols like HTTP, FTP, SMTP can be thought of as different types of vehicles traveling on these roads:

1.HTTP could be likened to cars. They’re common, used by many people to get to a variety of places, and they’re good for relatively small loads (like loading a webpage).
• FTP might be like a cargo truck, designed for carrying large loads from one place to another (like transferring large files).
• SMTP could be like the postal service vans, specifically designed to deliver mail (or in this case, email).

2.UDP (User Datagram Protocol), SSH (Secure Shell), and TLS (Transport Layer Security): UDP, SSH, and TLS can be considered as specialized vehicles that operate on the road system (TCP/IP).

  • UDP is like a motorcycle, providing a lightweight and fast mode of transport. It’s suitable for applications that prioritize speed and efficiency over reliability.
  • SSH is like a secure courier service that ensures the safe and authenticated delivery of packages. It provides a secure channel for remote access and data transfer.
  • TLS is like a high-security armored truck. It provides encryption, authentication, and data integrity for secure
  • Telnet: Telnet is like traveling in an open-top convertible car. You can easily communicate with the destination, but the conversation is not private. Just as anyone passing by can overhear your conversation, Telnet transmits data in clear text, making it vulnerable to eavesdropping. Telnet is an older protocol and is considered less secure.
  • SSL (Secure Sockets Layer): SSL is like traveling in a bulletproof armored car. Before you start your journey, the car is equipped with advanced security features. These features ensure that your conversations are encrypted, protecting the confidentiality and integrity of the data being transmitted. SSL provides a secure and encrypted communication channel.

3.SNMP (Simple Network Management Protocol): SNMP is like a network of surveillance vehicles. These vehicles monitor the status of various network devices, just as surveillance vehicles monitor the traffic and activities on the roads. SNMP allows network administrators to collect data, monitor network performance, and manage network devices remotely.

Each of these vehicles (protocols) has a specific purpose and is designed to do its job efficiently. They all use the road system (TCP/IP) to get where they need to go, but the road system itself doesn’t dictate what kind of vehicle you should use for a particular job. That’s why we need both TCP/IP (to provide the path) and the various protocols (to carry out specific tasks).

20
Q

SMTP (Simple Mail Transfer)

A

Definition: use for sending emails over the internet, it enables the transfer of email messages between mail servers.

EX: when you set an email from your email client SMTP is used to transmit the email to the recipient’s mail server.

21
Q

TFTP (TRIVIAL FILE TRANSFER PROTOCOL)

A

Definition: it is a simple file transfer protocol used for transferring files within a local network it is a lightweight but lacks advanced features security like authentication and encryption.

Analogy: would be like a bicycle. It’s simpler and lighter than a car or a truck. It simply allows for the basic transfer of files, which is useful in certain situations where simplicity is more important than functionality.

EX: NETWORK ADMINISTRATORS USE TFTP TO TRANSFER CONFIGURATION FILES TO NETWORK DEVICES LIKE ROUTERS OR SWITCHES.

22
Q

FTP (File Transfer Protocol)

A

Definition: it is used for transferring files over the internet it allows user to upload and download files to and from a remote server

EX: WHEN UPLOADING FILE TO A WEBSITE OR DOWNLOADING A FILE FROM AN FTP SERVER.

23
Q

UDP (User Diagram Protocol)

A

Definition: it is a fast but unreliable protocol for sending data packets, it does not establish connection before sending data (some pockets may be lost or arrive out of order) making it suitable for real time applications like video streaming or online gaming.

Analogy; - UDP is like a motorcycle, providing a lightweight and fast mode of transport. It’s suitable for applications that prioritize speed and efficiency over reliability.

24
Q

SSL and TLS

(Secure Socket Layer & Transport Layer Security)

A

Definition: provide secure communication over the internet by encrypting data during transmission they are used to establish secure connections for protocols like HTTPS FTPS and SMTPS.

TLS- more secure way of SSL.

Works: used to secure any type of data transmission between a client and server includes securing email communication protecting login credential on websites ensure the data exchange between client and server is encrypted and cannot be intercepted or tempered with by an authorized properties.

EX: when you make an online payment and see the padlock symbol in the browser’s address bar ssl or tls is used to encrypt the payment information.

TLS to other protocols.

• HTTP (Hypertext Transfer Protocol): HTTP is like a regular car traveling on the road system. It is used for transferring hypertext (web pages) between a client (web browser) and a server. However, HTTP communication is not inherently secure.
• TLS (Transport Layer Security): TLS is like an armored transport vehicle that provides protection and guidance for the HTTP car. When a client wants to establish a secure connection with a server, TLS is used to encrypt the communication. It creates a secure tunnel over the TCP/IP network, shielding the HTTP car from potential threats and ensuring the confidentiality and integrity of the data being transmitted.

So, in this analogy, the TLS armored vehicle (TLS protocol) acts as a protective guide, safeguarding the HTTP car (HTTP protocol) as it travels on the TCP/IP road system. TLS provides the necessary security measures to establish a secure connection and protect the data exchanged between the client and server.

25
Q

SSH (Secure Shell)

A

Definition: it provides security remote access to computers over a network it encrypts to communicate between the local and remote devices preventing an authorized access or data interception.

EX: network administrators use ssh to remotely manage servers and perform administrative tasks.

Analogy: SSH is like driving a heavily fortified and armored vehicle on the road of TCP/IP. It provides a secure and encrypted connection between the client and server. The data transmitted during an SSH session is protected, similar to how an armored vehicle shields its passengers and cargo from external threats. SSH ensures that the communication remains confidential and secure, even when traveling on the TCP/IP network.

26
Q

Telnet (Teletype Network)

A

Definition: network protocol that allows remote access to a command-line interface of a remote computer or server. It provides a text-based interface for interactive communication. Telnet transmits data in clear text, which means the information exchanged during a Telnet session is not encrypted.

  • It can also test parts like if the parts are open or closed in a server.

To do: Control Panel > Programs > Turn Windows Features > Enable Telnet client (Telnet link) carbonara true here you can fetch the data to servers in simple and direct way without encryption.

Analogy: Telnet is like driving an open-top convertible car on the road of TCP/IP. It allows you to remotely access and communicate with a remote computer or server. However, just as an open-top car exposes you to external elements, Telnet exposes the transmitted data to potential eavesdropping. The information exchanged during a Telnet session is not protected, similar to how conversations in an open-top car can be overheard by anyone nearby.

27
Q

SNMP (Simple Network Management Protocol)

A

Definition: allows monitoring and remote configuration of network devices through messages traps and etc.
corresponds with object identifiers (OIDS( and management information bases (MIBS)

OIDS: are numeric addresses separated by dots representing information like TEMP or memory usage in network devices.
MIBS: are text file containing oids and their human readable representations eating in interpretation.
•mid information is sent to s&mp manager through messages or traps.

messages and traps smp uses messages for communication between the smp manager and agents.
traps a type of message notify the manager about specific events or conditions
device configuration for oids or memes consult the device manual to find equivalent for monitoring specific parameters.