Networking Flashcards
PCI
Peripheral Component Interconnect
What is a Network Interface Card (NIC)?
A Network Interface Card (NIC), also known as a network adapter or network interface controller, is a critical hardware component that enables computers and servers to connect to a network.
Example sentence: My computer’s NIC allows me to access the internet.
What is the primary function of an NIC?
The NIC converts digital data from the computer into signals suitable for transmission over the network medium. It also translates incoming signals back into digital data that the computer can process.
Example sentence: The NIC is responsible for converting data into signals for network transmission.
What is another function of an NIC?
The NIC manages data flow to prevent collisions and reduce network congestion, employing various algorithms and protocols.
Example sentence: NICs use algorithms to control data flow and prevent network congestion.
What does an NIC do in terms of error detection and correction?
It checks data packets for errors and can request retransmission or attempt to correct errors based on the protocols in use.
Example sentence: NICs can detect errors in data packets and request retransmission when needed.
What is the role of an NIC in data transfer?
It handles the actual sending and receiving of data packets.
Example sentence: NICs are responsible for sending and receiving data packets on the network.
Why is addressing important for an NIC?
Each NIC has a unique MAC address, which is essential for identifying the device on the network and ensuring accurate packet delivery.
Example sentence: MAC addresses are crucial for identifying devices on the network and ensuring proper packet delivery.
How does an NIC work?
When a device is turned on, the NIC initializes and configures itself to communicate with the network. This includes setting up the MAC address and possibly requesting an IP address from a DHCP server.
What does the NIC do after initializing?
Data from the computer is encapsulated into frames by the NIC. Each frame includes the data payload, source and destination MAC addresses, and error-checking information.
What happens when a frame addressed to the NIC’s MAC address is detected?
The NIC captures the frame, checks for errors, and if it’s error-free, passes the data to the computer’s operating system.
What happens when the NIC transmits frames onto the network medium?
The NIC transmits these frames onto the network medium, which could be a wired connection (e.g., Ethernet) or a wireless connection (e.g., Wi-Fi).
What does the operating system do with the data received from the NIC?
The operating system processes the data received and passes it to the appropriate application, allowing for network communication like browsing the internet, sending emails, or streaming media.
What are network devices?
Network devices are hardware components that facilitate the operation and connectivity of computer networks.
What is a Network Interface Card (NIC)?
A Network Interface Card (NIC), also known as a network adapter or network interface controller, is a critical hardware component that enables computers and servers to connect to a network.
What roles do network devices play?
Network devices play critical roles in managing data traffic, ensuring secure communications, and maintaining the overall efficiency of network operations.
What types of networks can network devices connect to?
Network devices can connect to various network types, from small local area networks (LANs) to expansive wide area networks (WANs).
What is the connection of network devices?
The connection can be for local area networks (LAN), wide area networks (WAN), or the internet.
What is the role of a NIC?
The NIC serves as the interface between the connections like Wi-Fi.
Example: Ethernet
What is the first layer of the OSI model?
PHYSICAL
Hubs, Repeaters, Modems, …
What devices operate at the second layer of the OSI model?
DATA LINK
Routers, L3 Switches, …
What is the term for the third layer of the OSI model?
NETWORK
L2 Switches, Bridges, …
Which layer of the OSI model includes firewalls and IDS?
APPLICATION
Firewalls, IDS, …
What is the term for the fifth layer of the OSI model?
PRESENTATION
Which layer of the OSI model includes some firewalls?
SESSION
What devices operate at the fourth layer of the OSI model?
TRANSPORT
What happens when a connected device sends data to an access point?
The access point receives the data wirelessly, converts it into a format suitable for the wired network, and forwards it through the Ethernet connection to the router or other network devices.
Example: When you browse a website on your phone, the access point receives the data and sends it to the router for further processing.
What happens when data is sent to a wireless device from the network?
The access point receives the data via the wired connection, converts it into wireless signals, and transmits it to the appropriate device.
Additional information: This process ensures that the wireless device can receive and interpret the data sent from the network.
What are Standalone Access Points?
These are individual devices that provide wireless coverage in a specific area. They are typically used in small networks, like in homes or small offices.
Example: A standalone access point in a small office provides Wi-Fi coverage for employees to connect their devices.
What are Controller-Based Access Points?
These are part of a larger network system and are managed centrally by a wireless LAN controller. They are commonly used in enterprise environments where multiple access points are needed to cover large areas.
Additional information: Controller-based access points offer centralized management and configuration for better network control.
What are Mesh Access Points?
These are used in mesh networks, where multiple access points work together to extend wireless coverage over a large area. They communicate with each other to provide seamless connectivity throughout the entire network.
Example: Mesh access points in a smart home network ensure that every corner of the house has strong Wi-Fi signal.
What does the access point do in signal transmission and reception?
The access point transmits wireless signals (radio waves) that cover a specific area, known as a “coverage area” or “wireless cell.” Devices within this area can connect to the network through the access point.
Example: “The access point in my office covers the entire floor with a strong Wi-Fi signal.”
What does the access point do with signals from connected devices?
It receives signals from connected wireless devices and forwards them to the wired network or other wireless devices.
Example: “The access point acts as a bridge between my laptop and the internet by forwarding signals.”
What security protocols do access points often support?
Access points often support various security protocols like WPA3 (Wi-Fi Protected Access 3) or WPA2, to encrypt data.
Example: “My access point uses WPA2 encryption to secure my network.”
What is SSID broadcasting?
The access point broadcasts a Service Set Identifier (SSID), which is the name of the wireless network. Devices use this SSID to identify and connect to the network.
Example: “I can easily connect to the Wi-Fi network by selecting the correct SSID broadcasted by the access point.”
How does an access point work in creating a wireless network?
- The access point generates and transmits a wireless signal over a certain frequency (usually 2.4 GHz or 5 GHz bands). This signal covers a specific area, creating a wireless network within that range.
Example: “My access point operates on the 5 GHz band to provide faster internet speeds.”
How do wireless devices connect to a network through an access point?
- Wireless devices scan for available networks by detecting SSIDs broadcasted by access points. When a device selects an SSID, it sends a connection request to the access point.
Example: “My smartphone automatically connects to the network after selecting the SSID broadcasted by the access point.”
What happens after a device selects an SSID and sends a connection request to the access point?
- The access point authenticates the device using security protocols like WPA3/WPA2, and once authenticated, it allows the device to join the network.
Example: “After the authentication process, my laptop is granted access to the network through the access point.”
What is an Access Point (AP)?
An Access Point (AP) is a networking device that allows wireless devices to connect to a wired network using Wi-Fi or other wireless standards.
(Wi-Fi Go3 60000 003 080 98833
What is the primary function of an access point?
The primary function of an access point is to connect wireless devices to a wired network, enabling them to communicate with each other and access network resources.
DES GONE 080 80 4000 00000 800 400 0000 600
What is Wireless Connectivity?
Wireless Connectivity is a key feature of an access point that allows IoT devices to join the network.
Key Features gabe @arts
What is Network Bridging?
Network Bridging is the function of an access point that connects wireless devices to a wired network, often through an Ethernet cable, enabling access to network resources.
0 TOTAN BARONES 0001. 600
What does a Wi-Fi Signal enable?
A Wi-Fi Signal enables wireless devices to connect to the network, accessing resources like servers, printers, and internet connections.
Laptop Router Laptop Switch Wi-FI Signal Laptop WI-FI Signal Wireless Access Point Laptop
What is an Access Point (AP)?
An Access Point (AP) is a networking device that allows wireless devices to connect to a wired network using Wi-Fi or other wireless standards.
(Wi-Fi Go3 60000 003 080 98833
What is the primary function of an access point?
The primary function of an access point is to connect wireless devices to a wired network, enabling them to communicate with each other and access network resources.
DES GONE 080 80 4000 00000 800 400 0000 600
What is Wireless Connectivity?
Wireless Connectivity is a key feature of an access point that allows IoT devices to join the network.
Key Features gabe @arts
What is Network Bridging?
Network Bridging is the function of an access point that connects wireless devices to a wired network, often through an Ethernet cable, enabling access to network resources.
0 TOTAN BARONES 0001. 600
What does a Wi-Fi Signal enable?
A Wi-Fi Signal enables wireless devices to connect to the network, accessing resources like servers, printers, and internet connections.
Laptop Router Laptop Switch Wi-FI Signal Laptop WI-FI Signal Wireless Access Point Laptop
What are Proxy Services?
Firewalls can act as intermediaries between a user and the internet.
Requests are made through the firewall, which then requests the data from the internet on behalf of the user. This helps to mask the user’s IP address and can inspect and block malicious content.
What is Deep Packet Inspection (DPI)?
DPI examines the data part (payload) of the packet in addition to the header.
This allows for more thorough analysis, such as identifying and blocking malware or enforcing data privacy rules.
What is the Purpose of Firewalls?
Firewalls block unauthorized users or programs from accessing your network or system.
They help monitor traffic to and from a network and enforce policies about what is allowed or disallowed. Firewalls can block known threats, such as viruses, worms, and other malware, from entering or spreading within a network.
What is a firewall?
A firewall is a network security system designed to monitor, filter, and control incoming and outgoing network traffic based on predetermined security rules.
What are the types of firewalls?
Firewalls can be hardware-based, software-based, or a combination of both.
What is the main purpose of a firewall?
The main purpose of a firewall is to establish a barrier between a trusted internal network and untrusted external networks, such as the internet, to prevent unauthorized access and threats.
How do firewalls work with packet filtering?
Firewalls inspect packets of data sent between devices on the network. Each packet is analyzed based on rules defined by the firewall.
What is Stateful Inspection?
Stateful Inspection is a method that tracks the state of active connections and makes decisions based on the state and context of traffic. It maintains a state table that records active connections and can make more nuanced decisions than packet filtering alone.
DSL Modems
Uses telephone lines to transmit data. They provide a digital signal over the existing phone lines.
Example sentence: My DSL modem allows me to access the internet through my phone line.
Cable Modems
Use coaxial cable to deliver internet service, typically offering higher speeds than DSL.
Fiber Optic Modems
Use fiber optic cables to deliver high-speed internet with high bandwidth and low latency.