Networking Flashcards
Patch panel
What to look out for
- Device that allows cable network jacks from a wall into a central area
- Computers are connected to wall jacks in this system, and connected to patch panel by cables, running in the walls
- Pre-wired, RJ 45 port on the switch using a switch through or patch cable
WAP
Wireless access point
What to look out for
- Device that allows wireless devices to connect to a wired network
- Connect directly to a wired LAN or local area network then the WAP provides wireless connections using Wi-Fi for other devices to use that wired connection
- supports multiple wireless devices through their wired connection
- should always be configured with channels 1, 6, and 11 to maximize distance between channels and prevent overlaps
Hub
Would you look out for?
- Whatever is received on one port is repeated out every other port
- Has several different ports between 4 and 48 po
Benefits
Cons
- Leads to collisions
- increases in the number of re-broadcasts which slows down the entire network
Static IP
What to look out for
- Manually input, IP address, subnet Mask, gateway, and DNS( domain name server or domain names system)
- used to ensure servers are easy to find
- used when DHCP is disabled
Dynamic IP
Would you look out for?
- Automatically assigned using DHCP
Benefits
Cons
APIPA address
Windows-based
Autom…
Automatic, private, IP, addressing (also called Link local address)
What to look out for
- windows-based operating systems feature
- 169.254.0.0 to 169.254.255.255
D iscover
O ffer
R equest
A cknowledge
- Enables computer to automatically assign itself an IP address when DHCP is not available to perform the function
- it can communicate with other hosts on the same network using APIPA
- APIPA to APIPA only
- can’t reach host that have valid IP obtained by DHCP
VLAN
Virtual local area network
What to look out for
- can divide single switch into multiple networks
- only supported on managed switches
- Can communicate between different VLAN
- allows sub networks
VPN
Virtual private network
What to look out for
- Extends private network across public network
Enables users to send/receive data share or public networks as if connected to private network
DSL modem
Digital subscriber line
What to look out for
- used to connect computer or router to phone line which supplies Internet connections
Dynamic NAT
What to look out for
- Many-to-one mapping of private IP addresses or subnet masks inside a LAN or local area network inside to a public IP or subnet the local area
802.11AC ( Wi-Fi 5)
What to look out for
- 5 GHz frequency
- 6.9 Gbps
- Multiple user multiple input multiple output (MUMIMO
- channel bonding? (160MHZ)
802.11AX (Wi-Fi 6)
What to look out for
- 2.4 GHz and 5 GHz frequency
- 9.6 Gbps
- orthogonal frequency division multiple access
802.11a
What to look out for
- 5 GHz frequency
- 54 Mbps
802.11b
What to look out for
- 2.4 GHz frequency
- 11 Mbps
802.11g
What to look out for
- 2.4 GHz frequency
- 54 Mbps
802.11n
What to look out for
- 2.4 GHz and 5 GHz frequency
- 150 Mbps (2.4GHz)
- 600 Mbps (5GHz)
- multiple input multiple output (MIMO)
- channel bonding? (Combining 220 MHz channels to a single 40 MHz channel)
MX record
What to look out for
- Used for outgoing SMTP and incoming POP 3/IMAP traffic
CNAME
Canonical name (or alias name)
What to look out for
- associates, one domain name as an alias of another (EX: beta.diontraining.com -> www.diontraining.com
A record
What to look out for?
- associates domain name with IPv4
AAAA Record
What to look out for
- Associates domain name with IPv6
Files sharing server
What to look out for
- A server that is used to host and control access to shared files/folders
What channels prevent interference and ensure non-overlapping of channels
Big Grapes Need Axes
- Channel 1, 6, and 11
- this includes 802.11B, 802.11G, 802.11N, 802.11AX
- utilizes 2.4 GHz (can only select 1 and 11 in the US)
- increases reliability and throughput
Network tap
What to look out for
- create a physical connection to network
- send copy of every packet received to a monitoring device for capture and analysis
Wi-Fi analyzer
What to look out for
- determines signal strength, frequency, radio, frequency interference
Tone generator
What to look out for
- Connected to a wall jack
- send repeating signal over cable
Toner probe
What to look out for
- detects cables connected to wall jack by detecting signal sent by tone generators
- Must be near or touching cable to identify positively
Cable tester
What to look out for
- Provide detailed info on physical/electrical properties of
- Test, test and report cable
- cross talk, attenuation, noise, resistance, etc
5 GHz wireless frequency
what to look out for
- 5 GHz has more channels
- Supports higher data rates than 2.4 GHz
- Less congestion and interference than 2.4 GHz
2.4 GHz frequency
What to look out for
- Longer wavelength than. 5 GHz
- Better at penetrating services than 5 GHz
- longer range with same output levels
- each channel on the 2.4 GHz spectrum is 20 MHz wide
Intrusion prevention system
Intrusion prevention system (IPS)
What to look out
- network security that detects and prevents identified threats
- Intrusion prevention systems continuously monitor your network, looking for possible malicious incidents, and capturing information about them
- IPS can block malicious network traffic, unlike an IDS, which can only log them.
Proxy server
What to look out for
- a server application that acts as an intermediary between a client requesting a resource and the server providing that resource.
Syslog
System logging protocol
What to look
- port 514
- a way network devices can use a standard message format to communicate with a logging server.
- It was designed specifically to make it easy to monitor network devices.
- Devices can use a Syslog agent to send out notification messages under a wide range of specific conditions.
SSH
Secure shell
What to look out for
- is the protocol used for remote administration and file copying
- TCP port 22
- SSH is considered secure since it uses authenticated and encrypted sessions for communication.
FTP
File transfer protocol
What to look out for
- used to transfer files across the internet
- ports 20 and 21
HTTP
Hypertext transfer protocol
What to look out for
- used to provide web content to browsers
- port 80
Network Basic Input/Output System (NetBIOS) Ports
Ports 137, 139
Simple Network Management Protocol (SNMP) ports
- TCP/IP
- Ports 161, 162
- Used to collect data about network devices and monitor
their status
Lightweight Directory Access Protocol (LDAP)
Port 389
Server Message Block (SMB)
o Port 445
o Used for Windows file and printer sharing services
Remote Desktop Protocol (RDP)
o Port 3389
o Provides graphical remote control of another client or
server
o RDP provides a full graphical user interface
Virtual Network Computing (VNC)
Port 5900
PAN
Personal area network
What to look out for
- Close range network
- based on Bluetooth or near field communication (NFC) for communications between personal devices, such as smartphones, laptops, printers, and other peripheral devices.
CAN
Campus Area Network (CAN)
▪ Connects LANs that are building-centric across a university, industrial
park, or business park
● Up to a few miles
LAN
Local area network
What to look out for
- is a network where all the nodes or hosts participating in the network are directly connected with cables or short-range wireless media.
- Connects components within a limited distance
● Up to a few hundred feet
WAN
Wide area network
What to look out for
- Spans multiple geographic locations
- Often established with leased telecommunications (Telecom) circuits
- Worldwide coverage
SAN
Storage area network
What to look out for
- Dedicated independent high-speed network
- Interconnect and delivers shared pools of storage devices to multiple servers
- Often uses fiber channel over ethernet (FCOE), fiber, channel, or Internet small computer systems interface (ISCSI) to achieve the speeds necessary to support SAN operations.
WLAN
Wireless local area network
What to look out for
- Connect computers within a small and specific geographical area using 802.11 protocols for their wireless connecting
- A wireless distribution method for two or more devices that creates a
local area network using wireless frequencies
MAN
Metropolitan area network
What to look out for
- Computer network that interconnects users within computer resources in a region, the size of a metropolitan area or city
Legacy system
What to look out for
- A legacy system is no longer directly supported by its vendor
- Legacy systems usually work well for what they do (which is why they don’t get prioritized for replacement), but they represent very severe risks in terms of security vulnerabilities.
- Networks often need to retain hosts running DOS or legacy versions of Windows (8.1 and earlier) or old-style mainframe computers to run services that are too complex or expensive to migrate to a more modern platform.
- The most convenient and least expensive way to connect older devices would be to buy an adapter
UTM
Unified threat management
What to look out for
- are network appliances that provide all the security functions of a firewall, malware scanner, intrusion detection, vulnerability scanner, data loss prevention, content filtering, and other security devices into a single device or appliance.
Advantages
- Reduced # of devices
- Lower costs
- Easier to install
Disadvantages
- Single point of failure
- Lacks detail provided by a
specialized tool
- Performance is not as effieient as single function devices
Patch systems
What to look out for
- used to conduct patch management across your organization’s network.
Embedded system
What to look out for
- is a computer system that is designed to perform a specific, dedicated function, such as a microcontroller in a medical drip or components in a control system managing a water treatment plant.
POE
Power over ethernet
What to look out for
- Power over Ethernet (POE) provide power over ordinary data cabling to devices such as VoIP handsets and wireless access points
- PoE can support up to 15.4W
- 802.3af (PoE)
- 15.4W of power at distance of up to 100m.
- PoE can support low-powered devices such as VoIP handsets.
PoE+
Power over ethernet +
What’s to look out for?
- Can support up to 25W
- 802.3at (PoE+) standard can support up to 25W of power at a distance of up to 100 meters
- PoE+ can support higher-powered devices such as PTZ cameras, door controllers, and thin client computers
Switches
▪ Smart hubs that remember the ports that are connected to them
● Switches can have multiple people talking at one time
o Unmanaged Switch
▪ Performs its functions without requiring a configuration
o Managed Switch
▪ Performs its functions with configuration
Firewall
Scans and blocks traffic that enters or leaves a network
● Unified threat management (UTM) contains firewall features
- Packet-filtering
● Stateful
● Proxy
● Dynamic packet-filtering
● Kernel proxy
Optical Network Terminal (ONT)
Terminates fiber connection
Small Office, Home Office (SoHo) LAN
Uses a centralized server or simply provides clients access to local
devices like printers, file storage, or the Internet
Twisted Pair Cables
o STP (Shielded) and UTP (Unshielded) operate about the same
o Keep cable runs under 70 meters from the IDF to the office
Single Mode Fiber (SMF)
▪ Used for longer distances and has smaller core size which allows for only
a single mode of travel for the light signal
- More expensive
● SMF’s core size is 8.3-10µ in diameter
Multimode Fiber (MMF)
Used for shorter distances and has larger core size which allows for
multiple modes of travel for the light signal
- Lager core size
- Covers shorter distances
- less expensive
● MMF’s core size is 50-100µ in diameter
● Up to 2 kilometers or less
Fiber Optic Cable
Uses light from an LED or laser to transmit information through a thin
glass fiber
● Greater usable range
● Greater data capacity
- Switches, routers, and end-user devices can become a limitation
Coaxial Cabling
Coaxial Cable (Coax)
▪ One of the oldest categories of copper media that is still used in
networking today
Cable Stripper
Used to strip off the end of the cable and prepare it for attachment to a
connector
Cable Crimper
Used to attach the connector to the end of the cable
Punch-Down Block
Terminates the wires and strips off excess installation and extra wires
that are no longer needed
Wi-Fi (802.11)
Creates point to point connections from one building to another over a
relatively short distance
Cellular
Uses a larger antenna and a larger hotspot powered by a power outlet
within an office or home
Microwave
▪ Creates point to point connection between two or more buildings that
have longer distances
▪ A traditional microwave link can cover about 40 miles of distance
- UHF, SHF, and EHF
Satellite
A long range and fixed wireless solution that can go for miles
● Slow
● Expensive
● High latency
Radio Frequency dentification (RFID)
A form of radio frequency transmission modified for use in authentication
systems
Cellular Connections
1G: 30 KHz - 2 Kbps
2G: 1800 MHz - 14.4 Kbps to 2 Mbps
3G: 1.6 to 2 GHz - 144Kbps to 2 Mbps
4G: 2 to 8 GHz - 100 Mbps o 1 Gbps
5G
- Low band: 600-850 MHZ (30-250 Mbps)
- Mid band: 2.5-3.7 GHz (100-900 Mbps)
- High band: 25-39 GHz (Extremely high speed (In Gbps)
TCP
- Transmission Control Protocol
- Reliable (Threeway handshake)
- Connection oriented
- Segment retransmission and flow control (Windowing)
- With segmentation of sequencing
- Acknowledgement
Network Interface Card (NIC)
Provides an ethernet connection to the network
Internet of Things
▪ A global network of appliances and personal devices that have been
equipped with sensors, software, and network connectivity to report
state and configuration
● Segregation of IoT devices is critically important for the business
network’s securit
Bandwidth
The theoretical measure of how much data could be transferred from a
source to its destination
Throughput
The actual measure of how much data is successfully transferred from a
source to its destination
568b
The standard that’s preferred when wiring jacks inside of buildings
MDIX
A medium dependent interface crossover (MDIX) is an automated way to
electronically simulate using a crossover cable
Wire Mapping Tool
Works like a cable tester, but specifically for twisted pair ethernet cables
Pre-Shared Key
▪ Both the access point and the client use the same encryption key
▪ It’s not a good idea to use pre-shared keys in large environments
Wired Equivalent Privacy (WEP)
Original 802.11 wireless security standard which is an insecure security
protocol
▪ WEP uses 24-bit Initialization Vector (IV) sent in clear text
Wi-Fi Protected Access (WPA)
▪ Replaced WEP and follows the Temporal Key Integrity Protocol (TKIP)
▪ WPA uses 48-bit Initialization Vector (IV) instead of 24-bit
● Rivest Cipher 4 (RC4)
● Message Integrity Check (MIC)
● Enterprise Mode
Wi-Fi Protected Access 2 (WPA2)
- requires stronger encryption
and integrity checking through CCMP
● Advanced Encryption Standard (AES)
● Personal Mode
● Enterprise Mode
Cable Modems
Uses a cable TV network that is made up of a hybrid fiber-coaxial (HFC) distribution network
Data-Over-Cable Service Interface Specifications (DOCSIS)
▪ Specific frequency ranges used for upstream and downstream
transmissions
● Upstream
o 5 MHz to 42 MHz
● Downstream
o 50 MHz to 860 MHz
Fiber To The Curb (FTTC)
Runs a fiber optic cable from an internet provider access point to a curb
Fiber To The Premises (FTTP)
Fiber optic that connects directly to a building and connects to an optical
network terminal (ONT)
Optical Network Terminal (ONT)
Physical devices that convert optical signals to electrical signals
Link/Network Interface Layer
In the link/network interface layer, the data can only travel through the
local area network
Internet Layer
Used to address packets and route them across the network
Transport Layer
Shows how to send the packets
● TCP
o Transmission Control Protocol
● UDP
o User Datagram Protocol
Application Layer
Contains all the protocols that perform higher-level functions
7 layers of the OSI Model
All: Application (Layer 7)
People: Presentation (Layer 6)
Seem: Session (Layer 5)
To: Transport (Layer 4)
Need: Network (Layer 3)
Data: Data Link (Layer 2)
Processing: Physical (Layer 1)
Loopback Address (127.0.0.1)
Creates a loopback to the host and is often used in troubleshooting and
testing network protocols on a system
Domain Name System (DNS)
▪ Converts the domain names used by a website to the IP address of its
server
▪ DNS is the internet version of a phone book
Bootstrap Protocol (BOOTP)
Dynamically assigns IP addresses and allows a workstation to load a copy
of boot image to the network
Dynamic Host Control Protocol (DHCP)
- Provides an IP address to every machine on the network and eliminates
configuration errors
192.168.1.100 through 192.168.1.200 - Ports 67, 68
- Each IP is leased for a period of time and returns to the pool when
the lease expires
MX (Mail Exchange)
Directs emails to a mail server
TXT
Adds texts into th DNS
NS (Name Server)
Indicates which DNS nameserver has the authority
Full Tunnel VPN
Routes and encrypts all network requests through the VPN connection
back to the headquarters
Split Tunnel VPN
Routes and encrypts only the traffic bound for the headquarters over the
VPN, and sends the rest of the traffic to the regular Internet
Secure Socket Layer (SSL)
Provides cryptography and reliability using the upper layers of the OSI model (Layers 5, 6, and 7)
Transport Layer Security (TLS)
▪ Provides secure web browsing over HTTPS
Globally Routed
Like IPv4’s unicast class A, B, and C addresses
and begins with 2000-3999
Link-Local/Local Use
Used like a private IP in IPv4 that can only be used on the
local area network and begins with FE80
Stateless Address Autoconfiguration (SLAAC)
Eliminates the need to obtain addresses or other configuration
information from a central server
Multicast Address
Used to identify a set of interfaces and begins with FF
Anycast Address
Used to identify a set of interfaces so that a packet can be sent to any member of a set
Extended Unique Identifier (EUI)
Allows a host to assign itself a unique 64-bit IPv6 interface identifier
called EUI-64
Port
▪ Logical communication endpoint that exists on a computer or server
- Ports can be any number between 0 and 65,535
Well-Known Ports
Ports 0 to 1023 are considered well-known and are assigned by the Internet Assigned Numbers Authority (IANA)
Registered Ports
Ports 1024 to 49151
Trivial File Transfer Protocol (TFTP)
● Ports 69
● a connectionless protocol that uses UDP as its transport
Remote Authentication Dial-In User Service (RADIUS)
Provides centralized administration of dial-up, VPN, and wireless
authentication services for 802.1x and the EAP
- Relies on UDP
- Combines authentication and authorization
- Does not support all network protocols
- has cross-platform capability
RADIUS operates at the application layer
Terminal Access Controller Access-Control System Plus (TACACS+)
Proprietary version of RADIUS that can perform the role of an
authenticator in 802.1x networks
- Relies on TCP
- Separates authentication, authorization, and accountinh processes
- Supports all network protocols
- Exclusive to Cisco devices
Authorization
▪ Occurs when a user is given access to a certain piece of data or certain
areas of a building
Kerberos
Authentication protocol used by Windows to provide for two-way
(mutual) authentication using a system of tickets
Accounting
Ensures the tracking of data, computer usage, and network resources is
maintained
Telnet
Port 23
Terminal Emulator (TTY)
▪ Any kind of software that replicates the TTY I/O functionality to remotely
connect to a device
▪ TTY is the terminal or end point of the communication between the
computer and the end-user
Managed Devices
Computers and other network-attached devices monitored using agents
by a network management system
Load Balancer/ Content Switch
▪ Distributes incoming requests across several servers inside a server farm
or a cloud infrastructure
▪ A load balancer is one of the key things to help defend against a DoS
attack or a DDoS attack
Industrial Control System (ICS)
▪ Provides the mechanisms for workflow and process automation by
controlling machinery using embedded devices
▪ Multiple ICSs can create a distributed control system (DCS)
Supervisory Control and Data Acquisition (SCADA)
▪ Type of ICS used to manage large scale multi-site devices and equipment
in a geographic region from a host computer
CAT5
- 100 Mbps
- 100Base-TX(Twisted pair)
- 100m
CAT5e (Gigabit Ethernet)
- 1000base-T
- 1000 Mbps (1Gb)
- 100m
CAT6
- 1000 Base-T
- 1000 Mbps
- 100m
or - 10G Base-T
- 10 Gbps
- 55m
CAT6a
- 10G Base-T
- 10 Gbps
- 100m
CAT7
- 10G Base-T
- 10 Gbps
- 100m
CAT8
- 40G Base-T
- 40 Gbps
- 30m