Networking Fundamentals Flashcards

1
Q

Name the Layers to OSI 7-Layer model

A
  1. physical
  2. Datalink
  3. Network
  4. Transport
  5. Session
  6. Presentation
  7. Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Layer 2 Data Link

A
  • runs on top of layer 1
  • devices at L2 have unique hardware (MAC) address
  • Frames (containers for information) can be addressed to a destination or broadcasted
  • CSMA(carrier sense multiple access) -senses if data is already be transmitted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Layer 1 Physical

A

the transmission and reception of raw bit streams between a device on a shared physical medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Drawbacks to Layer 1 Physical of the OSI 7-Layer model

A
  • layer 1 has no media access control and no collision detection
  • no device addressing all data is processed by all device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Switch

A

L2

  • Maintains a mac address table which over time learns what computer is connected to what port
  • Only valid frames are stored and forwarded
  • Collisions are isolated on the port they occurred
  • Every Port is a separate collision domain

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Layer 3 Network

A

Internet Protocol (IP) - adds cross-network IP addressing and routing to move data between local area networks without direct P2P links

IP Packets are moved step by step from source to destination via intermediate networks. Encapsulated in different frames along the way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IP Packet Structure

A
  • Similar to frame in that they contain data to be moved and contain source and destination address
  • as they move through networks they are placed inside frames specific to the local network that changes every time the packet moves through the network
  • the IP Packet itself never changes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ARP

A
  • Address Resolution Protocol
  • finds the Mac address for this IP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Route

A

where the IP packet is forwared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Route Roles

A

multiple routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Router

A

moves packet from SRC to DST encapsulating in L2 on the way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cons of Layer 3

A

No method for channels of communications src IP ≤=> dst IP only

can be delivered out of order

no flow of control → if the source transmit faster than the destination IP saturating the destination causing packet loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Layer 4 Transportation / Layer 5 Session

A

TCP - Transmission Control Protocol

  • reliability, error correction, and ordering for data/slower
  • connection oriented protocol → you have to set up a connection between two devices once setup creates bidirectional methods of communication

UDP- User Datagram Protocall

  • faster less reliable

*Both run on top of IP and use IP as transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Subnet Mask

A

used by Host to determine if an IP address it needs to communicate with is local or remote - which influences if it needs to use a gateway or can communicate locally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network Address Translation (NAT)

A
  • Translates private IPv4 addresses to public
  • Designed to overcome IPv4 Shortages
  • Static NAT- 1 private to 1 (fixed )public address(IGW)
  • Dynamo NAT- 1 private to 1st Available Public
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who originally managed IPv4 Addresses and who manages them now?

A

originally managed by IANA(internet Assigned Numbers Authority) now managed by reginal authorities

17
Q

When was IPv4 created?

A

created in 1981

18
Q

What is the full range of IPv4 Addresses?

A

0.0.0.0 → 255.255.255.255

19
Q

IP Address Range 1

A
  • 10.0.0.0 - 10.225.255.255 (1 x Class A Network)
  • 1,677,215 IPv4 addresses
  • Private range that is usually used for cloud networks and is usually chopped up into sub networks
20
Q

IP address Range 2

A
  • 172.16.0.0 - 172.31.255.255(16 x class B Networks)
  • 16x 65,536 IPv4 Address
  • Usually Broken into smaller subnets

-

21
Q

IP address Range 3

A
  • 192.168.0.0 - 192.168.255.255(256 x C class networks)
  • 256x 256 IPv4 addresses
  • usually used for home and small office networks
22
Q

Communications between two overlapping IP Ranges

A
  • If you have a need to connect private networks together and they user the same network address you would have issues with configurations
23
Q

Static Network Address Translation

A
  • The router (NAT Device) maintains a NAT table, it maps PrivateIP : Public IP(1:1)
24
Q

Port Address Translation (PAT)

A

The NAT Device records the source(private)IP and source port. it replaces the source IP with the single Public IP and a public source port allocated from a pool which allows IP overloading(many to one)

25
Q

Dynamic Network Address Translation

A

The router(NAT Device) maintains a Nat table, it maps Private IP: Public IP Public IP allocations are temporary allocations from a Public IP Pool.

26
Q

IP Subnetting

A

subnetting the process of talking a larger network, and breaking it into more smaller networks(higher prefix)

27
Q

Distributed Denial of Service (DDOS)

A
  • Attacks designed to overload Websites
  • Compete against ‘Legitimate Connections’
28
Q

DDOS- Application Layer Attack

A
  • it’s cheep for clients to make requests but computationally expensive for servers to deliver
  • Legitimate User of the application can’t access the website because they have to compete for access with the attack
  • performance reduce to failure levels
29
Q

DDOS - Protocol Attack

A

a network of devices called Botnets are user to generate a hug number of spoofed SYN’s(connection Initiations). The serve sees these as normal and sends SYN-ACK’s back to the spoofed IPS

the serves will wait for an ACK which never happens

the serve consume available network resources attempting to establish connections

30
Q

DDOS - Volumetric /Amplification Attack

A

A botnet exploits a protocol where a response is larger than the request

botnet make a spoofed request to DNS

The DNS server respond to the ‘spoofed IP’ , the frontend servers of out application becomes overwhelmed by the amount of data.

31
Q

SSL and TLS (newer)

A
  • privacy and Data integrity between client and server
  • Privacy - communication are encrypted
  • asymmetric and symmetric
  • Identity (serve or client/server) Verified
  • Reliable connection - protect against alternation