Networking Basic Flashcards

1
Q

What is a Link?

A

A link refers to the connectivity between two devices. It includes the type of cables and protocols used for one device to be able to communicate with the other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the layers of the OSI reference model?

A

1) Physical Layer
2) Data Link Layer
3) Network Layer
4) Transport Layer
5) Session Layer
6) Presentation Layer
7) Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a LAN?

A

LAN stands for Local Area Network. It refers to the connection between computers and other network devices that are located within a small physical location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a node?

A

A node refers to a point or joint where a connection takes place. It can be a computer or device that is part of a network. Two or more nodes are needed to form a network connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are routers?

A

Routers can connect two or more network segments. These are intelligent network devices that store information in its routing tables, such as paths, hops, and bottlenecks. With this info, they can determine the best path for data transfer. Routers operate at the OSI Network Layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a point to point link?

A

It refers to a direct connection between two computers on a network. A point to point connection does not need any other network devices other than connecting a cable to the NIC cards of both computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is anonymous FTP?

A

Anonymous FTP is a way of granting user access to files in public servers. Users that are allowed access to data in these servers do not need to identify themselves, but instead, log in as an anonymous guest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a subnet mask?

A

A subnet mask is combined with an IP address to identify two parts: the extended network address and the host address. Like an IP address, a subnet mask is made up of 32 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe Network Topology

A

Network Topology refers to the layout of a computer network. It shows how devices and cables are physically laid out, as well as how they connect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is data encapsulation?

A

Data encapsulation is the process of breaking down information into smaller, manageable chunks before it is transmitted across the network. In this process that the source and destination addresses are attached to the headers, along with parity checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a VPN?

A

VPN means Virtual Private Network, a technology that allows a secure tunnel to be created across a network such as the Internet. For example, VPNs allow you to establish a secure dial-up connection to a remote server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Briefly describe NAT

A

NAT is Network Address Translation. This is a protocol that provides a way for multiple computers on a common network to share a single connection to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the job of the Network Layer under the OSI reference model?

A

The Network layer is responsible for data routing, packet switching, and control of network congestion. Routers operate under this layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is RIP?

A

RIP, short for Routing Information Protocol is used by routers to send data from one network to another. It efficiently manages routing data by broadcasting its routing table to all other routers within the network. It determines the network distance in units of hops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the different ways of securing a computer network?

A

There are several ways to do this. Install a reliable and updated anti-virus program on all computers. Make sure firewalls are setup and configured correctly. User authentication will also help a lot. All these combined would make a highly secured network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is WAN?

A

WAN stands for Wide Area Network. It is an interconnection of computers and devices that are geographically dispersed. It connects networks that are located in different regions and countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the importance of the OSI Physical Layer?

A

The physical layer does the conversion from data bits to the electrical signal, and vice versa. This is where network devices and cable types are considered and setup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How many layers are there under TCP/IP?

A

1) The Network Layer
2) Internet Layer
3) Transport Layer
4) Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are proxy servers, and how do they protect computer networks?

A

Proxy servers primarily prevent external users who are identifying the IP addresses of an internal network. Without knowledge of the correct IP address, even the physical location of the network cannot be identified. Proxy servers can make a network virtually invisible to external users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the function of the OSI Session Layer?

A

This layer provides the protocols and means for two devices on the network to communicate with each other by holding a session. This includes setting up the session, managing information exchange during the session, and tear-down process upon termination of the session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a private IP address?

A

Private IP addresses are assigned for use on intranets. These addresses are used for internal networks and are not routable on external public networks. These ensure that no conflicts are present among internal networks. At the same time, the same range of private IP addresses is reusable for multiple intranets since they do not “see” each other.

22
Q

What is DoS?

A

DoS, or Denial-of-Service attack, is an attempt to prevent users from being able to access the Internet or any other network services. Such attacks may come in different forms and are done by a group of perpetrators. One common method of doing this is to overload the system server so it cannot anymore process legitimate traffic and will be forced to reset.

23
Q

What is the advantage of address sharing?

A

By using address translation instead of routing, address sharing provides an inherent security benefit. That’s because host PCs on the Internet can only see the public IP address of the external interface on the computer. Instead, it provides address translation and not the private IP addresses on the internal network.

24
Q

What are MAC addresses?

A

MAC, or Media Access Control, uniquely identifies a device on the network. It is also known as a physical address or an Ethernet address. A MAC address is made up of 6-byte parts.

25
Q

How can you identify the IP class of a given IP address?

A

By looking at the first octet of any given IP address, you can identify whether it’s Class A, B, or C. If the first octet begins with a 0 bit, that address is Class A. If it begins with bits 10 then that address is a Class B address. If it begins with 110, then it’s a Class C network.

26
Q

What are firewalls?

A

Firewalls serve to protect an internal network from external attacks

27
Q

Describe star topology

A

Star topology consists of a central hub that connects to nodes. This is one of the easiest to set up and maintain.

  • If the Hub or concentrator fails, attached nodes are disabled.
  • Performance depends on the Hub’s capacity
  • The cost of installation of star topology is costly.
28
Q

What is the disadvantage of a star topology?

A
  • If the Hub or concentrator fails, attached nodes are disabled.
  • The cost of installation of star topology is costly.
  • Heavy network traffic can sometimes slow the bus considerably.
  • Performance depends on the Hub’s capacity
  • A damaged cable or lack of proper termination may bring the network down.
29
Q

What is the advantage of a star topology?

A
  • Easy to troubleshoot, set up, and modify.
  • Only those nodes are affected, that has failed. Other nodes still work.
  • Fast performance with few nodes and very low network traffic.
  • In Star topology, addition, deletion, and moving of the devices are easy.
30
Q

What is DHCP?

A

DHCP is short for Dynamic Host Configuration Protocol. Its main task is to assign an IP address to devices across the network automatically. It first checks for the next available address not yet taken by any device, then assigns this to a network device.

31
Q

What is the main job of the ARP?

A

The main task of the ARP or Address Resolution Protocol is to map a known IP address to a MAC layer address.

32
Q

What is TCP/IP?

A

TCP/IP is short for Transmission Control Protocol / Internet Protocol. This is a set of protocol layers that is designed to make data exchange possible on different types of computer networks, also known as a heterogeneous network.

33
Q

What is peer to peer?

A

Peer to peer (P2P) are networks that do not rely on a server. All PCs on this network act as individual workstations.

34
Q

What is DNS?

A

DNS is the Domain Name System. The main function of this network service is to provide host names to TCP/IP address resolution.

35
Q

What is the difference between a hub and a switch?

A
Hub
- A hub operates on the physical layer.
- The transmission mode is Half-duplex
- Uses electrical signal orbits
Switch
- A switch operates on the data link layer.
- Uses frame & packet
- The transmission mode is Full duplex
36
Q

What protocols fall under the Application layer of the TCP/IP stack?

A

The following are the protocols under the TCP/IP Application layer: FTP, TFTP, Telnet, and SMTP.

37
Q

What is the client/server?

A

Client/server is a type of network wherein one or more computers act as servers. Servers provide a centralized repository of resources such as printers and files. Clients refer to a workstation that accesses the server.

38
Q

Describe networking.

A

Networking refers to the interconnection between computers and peripherals for data communication. Networking can be done using wired cabling or through a wireless link.

39
Q

What is SMTP?

A

SMTP is short for Simple Mail Transfer Protocol. This protocol deals with all internal mail and provides the necessary mail delivery services on the TCP/IP protocol stack.

40
Q

Explain Mesh Topology

A

The mesh topology has a unique network design in which each computer on the network connects to every other. It is developing a P2P (point-to-point) connection between all the devices of the network. It offers a high level of redundancy, so even if one network cable fails, data still has an alternative path to reach its destination.

41
Q

Types of Mesh Topology

A

Partial Mesh Topology: In this type of topology, most of the devices are connected almost similarly as full topology. The only difference is that few devices are connected with just two or three devices.

Full Mesh Topology: In this topology, every node or device are directly connected with each other.

42
Q

How can you fix signal attenuation problems?

A

A common way of dealing with such a problem is to use repeaters and hubs because it will help regenerate the signal and therefore prevent signal loss. Checking if cables are properly terminated is also a must.

43
Q

What is the RSA algorithm?

A

RSA is short for the Rivest-Shamir-Adleman algorithm. It is the most commonly used public-key encryption algorithm in use today.

44
Q

What is the difference between TCP and UDP?

A

TCP
- It is a connection-oriented protocol.
- TCP messages make their way across the Internet from one computer to another.
- TCP does error checking and also makes error recovery.
- Using handshake protocol like SYN, SYN-ACK, ACK
- TCP is reliable as it guarantees delivery of data to the destination router.
UDP
- It is a connectionless protocol.
- UDP performs error checking, but it discards erroneous packets.
- No handshake (so connectionless protocol)
- UDP has just a single error checking mechanism that is used for checksums.

45
Q

What Is TCP Three-Way Handshake?

A

THREE-WAY handshake or a TCP 3-way handshake is a process that is used in a TCP/IP network to make a connection between the server and client. It is a three-step process that requires both the client and server to exchange synchronization and acknowledgment packets before the real data communication process starts.

46
Q

What is a Hamming code?

A

Hamming code is a liner code that is useful for error detection up to two immediate bit errors. It is capable of single-bit errors.

In Hamming code, the source encodes the message by adding redundant bits in the message. These redundant bits are mostly inserted and generated at certain positions in the message to accomplish the error detection and correction process.

47
Q

What are the benefits of the Hamming code?

A
  • The Hamming code method is effective on networks where the data streams are given for the single-bit errors.
  • Hamming code not only provides the detection of a bit error but also helps you to indent bit containing error so that it can be corrected.
  • The ease of use of hamming codes makes it suitable for use in computer memory and single-error correction.
48
Q

What is a MAC Address?

A

MAC address is a unique identifier that is assigned to a NIC (Network Interface Controller/ Card). It consists of a 48 bit or 64-bit address, which is associated with the network adapter. MAC address can be in hexadecimal format. The full form of MAC address is Media Access Control address.

49
Q

What are the important differences between MAC address and IP address

A

MAC
- The MAC address stands for Media Access Control Address.
- 48bit
- Referred as Physical Address
- Works at link layer
IP Address
- IP address stands for Internet Protocol Address.
- It consists of a 32-bit address.
- IP address works at the network layer of OSI model.
- It is referred to as a logical address.

50
Q

What is MAN?

A

A Metropolitan Area Network is consisting of a computer network across an entire city, college campus, or a small region