Networking P2 Flashcards

1
Q

protocol

A

defined set of standards that computers must follow in order to communicate properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer networking

A

full scope of how computers communicate with each other. Networking involves ensuring that computers can hear each other, that they speak protocols other computers can understand, that they repeat messages not fully delivered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TCPIP five-layer model intro

A

protocol used to get data from one end of a networking cable to the other. It’s totally different from the protocol you use to get data from one side of the planet to the other. But both of these protocols are required to work at the same time in order for things like the internet and business networks to work the way they do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The TCP(Transmission Control Protocol)/IP Five-Layer Network Model

A

00

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

econd layer in our model is known as the data link layer

A

layer the network interface or the network access layer. data link layer is responsible for defining a common way of interpreting these signals, so network devices can communicate.Lots of protocols exist at the data link layer, but the most common is known as Ethernet, although wireless technologies are becoming more and more popular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

third layer

A

the network layer is also sometimes called the Internet layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

third layer

A

the network layer is also sometimes called the Internet layer. layer that allows different networks to communicate with each other through devices known as routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

internetwork

A

A collection of networks connected together through routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Internet Protocol

A

the heart of the Internet and most small networks around the world.Network software is usually divided into client and server categories, with the client application initiating a request for data and the server software answering the request across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

single node

A

may be running multiple client or server applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the transport layer known as TCP or Transmission Control Protocol. ( TCP IP)

A

While the network layer delivers data between two individual nodes, the transport layer sorts out which client and server programs are supposed to get that data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

transfer protocols also use IP to get around

A

including a protocol known as UDP or User Datagram Protocol. The big difference between the two is that TCP provides mechanisms to ensure that data is reliably delivered while UDP does not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

fifth layer is known as the application layer.

A

Protocols used to allow you to browse the web or send receive email are some common ones. The presentation layer is sometimes present in other networking models. Under our model, though, it’s included in the application layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Visual description of layers

A

he physical layer is the delivery truck and the roads. The data link layer is how the delivery trucks get from one intersection to the next over and over. The network layer identifies which roads need to be taken to get from address A to address B. The transport layer ensures that delivery driver knows how to knock on your door to tell you your package has arrived. And the application layer is the contents of the package itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wired Network: Cables

A

most basic component of a wired network: cables. Cables are what connect different devices to each other allowing data to be transmitted over them. Network cables splite into 2 catagories: fiber and copper.The most common forms of copper twisted pair cables used in networking are Cat5, Cat5e, and Cat6 cables. The sending device communicates binary data across these copper wires by changing the voltage between two ranges. The system at the receiving end is able to interpret these voltage changes as binary ones and zeros which can then be translated into different forms of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Common forms of cables

A

Cat5e cables have mostly replaced those older Cat5 cables because their internals reduce crosstalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Crosstalk

A

Cat5e cables have mostly replaced those older Cat5 cables because their internals reduce crosstalk.electrical pulse on one wire is accidentally detected on another wire.So, the receiving end isn’t able to understand the data causing a network error.Cat6 cables follow an even more strict specification to avoid crosstalk, making those cables more expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hubs and Switches

A

Cables allow you to form point-to-point networking connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

hub (Rare and almost never used now a days) ( phyical layer)

A

a physical layer device that allows for connections from many computers at once.All the devices connected to a hub will end up talking to all other devices at the same time. It’s up to each system connected to the hub to determine if the incoming data was meant for them, or to ignore it if it isn’t.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

collision domain

A

is a network segment where only one device can communicate at a time.If multiple systems try sending data at the same time, the electrical pulses sent across the cable can interfere with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

switch

A

very similar to a hub, since you can connect many devices to it so they can communicate. The difference is that while a hub is a layer 1 or physical layer device, a switch is a level 2 or data link device.that a switch can actually inspect the contents of the Ethernet protocol data being sent around the network, determine which system the data is intended for and then only send that data to that one system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

switch

A

very similar to a hub, since you can connect many devices to it so they can communicate. The difference is that while a hub is a layer 1 or physical layer device, a switch is a level 2 or data link device.that a switch can actually inspect the contents of the Ethernet protocol data being sent around the network, determine which system the data is intended for and then only send that data to that one system.a switch can inspect Ethernet data to determine where to send things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

router

A

is a device that knows how to forward data between independent networks.A router operates at layer three, a network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

router

A

is a device that knows how to forward data between independent networks.A router operates at layer three, a network layer.a router can inspect IP data to determine where to send things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Core ISP routers

A

A core router usually has many different connections to many other routers. Routers share data with each other via a protocol known as BGP, or Border Gateway Protocol.form the backbone of the Internet

26
Q

BGP, or Border Gateway Protocol.

A

Routers share data with each other via a protocol.That lets them learn about the most optimal paths to forward traffic

27
Q

nodes

A

in most network topographies, each node is primarily either a server or a client

28
Q

server

A

as something that provides data to something requesting that data

29
Q

client

A

hing receiving the data

30
Q

twisted pair cable ( most common cable)

A

it features pairs of copper wires that are twisted together. These pairs act as a single conduit for information, and their twisted nature helps protect against electromagnetic interference and crosstalk from neighboring pairs.

31
Q

standard cat six cable

A

has eight wires consisting of four twisted pairs inside a single jacket.

32
Q

duplex communication ( c6 cable allows this)

A

Duplex communication is the concept that information can flow in both directions across the cable.

33
Q

full duplex

A

a networking link can both communicate with each other at the exact same time

34
Q

Half-duplex

A

only one device can be communicating at a time.a network link degrade and report itself as operating

35
Q

RJ-45 or Registered Jack 45

A

It’s one of many cable plugs specifications but by far the most common in computer networking. A network cable with an RJ-45 plug can connect to an RJ-45 network port

36
Q

Network ports

A

ports are generally directly attached to the devices that make up a computer network.Switches would have many network ports because their purpose is to connect many devices. But servers and desktops usually only have one or two

37
Q

Patch panel

A

is a device containing many net ports but it does no other work. It’s just a container for the endpoints of many runs of cable.Additional cables are then generally ran from a patch panel to switches or routers to provide network access to the computers at the other end of those links.

38
Q

Line coding

A

the modulation of an electrical charge so that each side of a connection knows what is a one and what is a zero.

39
Q

CSMA/CD

A

used to determine when the communications channels are clear and when the device is free to transmit data

40
Q

network segment is a collision domain

A

it means that all devices on that segment receive all communication across the entire segment. This means we need a way to identify which node the transmission was actually meant for.

41
Q

MAC address (ethernet lvl)

A

a globally unique identifier attached to an individual network interface. It’s a 48-bit number normally represented by six groupings of two hexadecimal numbers. A MAC address is a 48-bit number consisting of 6 octets.

42
Q

hexadecimal

A

ust like how binary is a way to represent numbers with only two digits, hexadecimal is a way to represent numbers using 16 digits

43
Q

octet

A

in computer networking, is any number that can be represented by 8 bits. In this case, two hexadecimal digits can represent the same numbers that 8 bits can

44
Q

organizationally unique identifier or OUI

A

The first three octets of a MAC address are known.These are assigned to individual hardware manufacturers by the IEEE or the Institute of Electrical and Electronics Engineers. last three octets of MAC address can be assigned in any way that the manufacturer would like with the condition that they only assign each possible address once to keep all MAC addresses globally unique

45
Q

unicast

A

transmission is always meant for just one receiving address.

46
Q

unicast (Ethernet transmission)

A

At the Ethernet level, this is done by looking at a special bit in the destination MAC address. If the least significant bit in the first octet of a destination address is set to zero, it means that Ethernet frame is intended for only the destination address. This means it would be sent to all devices on the collision domain, but only actually received and processed by the intended destination.

47
Q

multicast frame. (Ethernet transmission)

A

A multicast frame is similarly set to all devices on the local network signal. What’s different is that it will be accepted or discarded by each device depending on criteria aside from their own hardware MAC address.

48
Q

broadcast (Ethernet transmission)

A

An Ethernet broadcast is sent to every single device on a LAN. This is accomplished by using a special destination known as a broadcast address. The Ethernet broadcast address is all Fs. Ethernet broadcasts are used so that devices can learn more about each other. The address FF:FF:FF:FF:FF:FF is used for Ethernet broadcast traffic.

49
Q

data packet

A

is an all-encompassing term that represents any single set of binary data being sent across a network link. isn’t tied to any specific layer or technology. It just represents a concept. One set of data being sent from point A to Point B.

50
Q

Ethernet frames.

A

Data packets at the Ethernet level are known as Ethernet frames. An Ethernet frame is a highly structured collection of information presented in a specific order. This way network interfaces at the physical layer can convert a string of bits, travelling across a link into meaningful data or vice versa.

51
Q

preamble

A

is 8 bytes or 64 bits long and can itself be split into two sections

52
Q

SFD or start frame delimiter.

A

his last byte in the preamble is known as the SFD or start frame delimiter.his signals to a receiving device that the preamble is over and that the actual frame contents will now follow.

53
Q

destination MAC address

A

his is the hardware address of the intended recipient. Which is then followed by the source MAC address, or where the frame originated from.

54
Q

source MAC address

A

frame originated from.Don’t forget that each MAC address is 48 bits or 6 bytes long

55
Q

EtherType field

A

It’s 16 bits long and used to describe the protocol of the contents of the frame.

56
Q

VLAN stands for virtual LAN

A

It’s a technique that lets you have multiple logical LANs operating on the same physical equipment. Any frame with a VLAN tag will only be delivered out of a switch interface configured to relay that specific tag. This way you can have a single physical network that operates like it’s multiple LANs

57
Q

payload

A

in networking terms is the actual data being transported, which is everything that isn’t a header. The data payload of a traditional Ethernet frame can be anywhere from 46 to 1500 bytes long.

58
Q

frame check sequence

A

his is a 4-byte or 32-bit number that represents a checksum value for the entire frame. This checksum value is calculated by performing what’s known as a cyclical redundancy check against the frame.

59
Q

frame check sequence

A

his is a 4-byte or 32-bit number that represents a checksum value for the entire frame.

60
Q

checksum value

A

This checksum value is calculated by performing what’s known as a cyclical redundancy check against the frame.

61
Q

cyclical redundancy check or CRC

A

is an important concept for data integrity and is used all over computing, not just network transmissions. A CRC is basically a mathematical transformation that uses polynomial division to create a number that represents a larger set of data. A cyclical redundancy check ensures that there was no data corruption.