Section 2: Introduction to networking concepts Flashcards

1
Q

What does OSI stand for?

A

Open systems interconnection model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Aside from the number of layers, how are OSI and TCP/IP different models from each other?

A

OSI is more granular in how it accomplishes data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does MAC stand for and what is a MAC address?

A

MAC stands for Media Access Control and a mac address is a 12-digit hexadecimal number assigned to each device connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Does TCP/IP ‘frame’ information?

A

Yes, they are generated at layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does TCP/IP stand for?

A

Transmission control protocol / internet protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the layers of TCP/IP?

A
  • From the bottom up:
    1. Network Interface
    2. Network
    3. Transport
    4. Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the layers of OSI?

A
  • From the bottom up:
    1. Physical
    2. Data link
    3. Network
    4. Transport
    5. Session
    6. Presentation
    7. Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the relationship(s) between layers in OSI and TCP/IP?

A
  • Layers 1 and 2 of OSI correspond to layer 1 of TCP/IP
    • Layer 3 of OSI corresponds to layer 2 of TCP/IP
    • Layer 4 of OSI corresponds to layer 3 of TCP/IP
    • Layers 5/6/7 of OSI correspond to layer 4 of TCP/IP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In TCP/IP, what is the application layer responsible for? What protocols are commonly used in this layer? What number is it?

A

Communication between nodes. Common protocols include HTTP/HTTPS, secure shell (SSH), and network time protocol (NTP). It is the fourth layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In TCP/IP, what is the transport layer responsible for? What protocols are commonly used in this layer? What number is it?

A

End to end transport of data. Common protocols here are user datagram protocol (UDP), and Transmission control protocol (TCP). It is the third layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In TCP/IP, what is the network layer responsible for? What protocols are commonly used in this layer? What number is it?

A

Defines logical transmissions for the whole network. Common protocols include Internet Protocol (IP), Internet Control Message Protocol (ICMP), and Address Resolution Protocol (ARP). It is layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In TCP/IP, what is the network interface layer responsible for? What number is it?

A

Establishes how data should be physically sent through the network. It is the first layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In OSI, what is the application layer responsible for? What number is it?

A

Responsible for network applications (like HTTP or FTP) and their production of data to be transferred over the network. It is the seventh layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In OSI, what is the presentation layer responsible for? What number is it?

A

Responsible for translating data over the network as well as encrypting data for security (if encryption is used). It is the sixth layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In OSI, what is the sessions layer responsible for? What number is it?

A

Responsible for connection establishment, session maintenance, and authentication. It is the fifth layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In OSI, what is the transport layer responsible for? What number is it?

A
  • The heart of OSI
    • Provides services to the application layer and receives services from the network layer
    • Responsible for the reliable delivery of data
    • It segments and reassembles data in the correct order for it to be sent to the receiving device
    • May also handle the reliable delivery of data and any entries of data that are lost or corrupted
    • It is the fourth layer.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In OSI, what is the network layer responsible for? What number is it?

A

Responsible for transmission of data between hosts in different networks as well as routing of data packets and Implemented through the use of devices like routers and some switches. It is the third layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In OSI, what is the data link layer responsible for? What number is it?

A

Responsible for error free delivery of data to the receiving node or device. A physical way of ensuring data continuity. Implemented through devices such as switches and bridge devices, as well as anything with a network interface (like wireless cards or wired network cards). It is the second layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In OSI, what is the physical layer responsible for? What number is it?

A

Responsible for the physical connections of the devices in a network. Hubs, repeaters, modem devices, physical cabling. It is the first layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Describe opening a web page in the OSI model:

A
  • Layer 7: You open a web browser and type an address into the search bar
    • Layer 6: Command is encrypted as it is sent (and decrypted by receiving server)
    • Layer 5: Establishes the connection between your laptop and websites server and maintains it while you accomplish your tasks on the website
    • Layer 4: Data is transferred, segmented, and then numbered. This allows the network to send manageable sizes of information ( about 1,500 bytes max), and then reassembled correctly.
    • Layer 3: Receives the segments, and transmits them across the network as packets. Adds source and destination IP addresses to each data packet. The destination IP address will be the router on the network that will move data off the local network. The series of routers between that router and the destination server will determine how the packet is moved across the various networks between them
    • Layer 2: Receives the packets and adds physical addressing by adding sender and receiver MAC addresses to each data packet. This information forms a unit called a frame.
    • Layer 1: Receives the frames and data and sends them via the local media (wires etc.) to the switches, routers, etc. along the network path.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Name 6 network media devices

A

Modem, router, bridge, switch, hub, and repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does a modem do?

A

Sends and receives information. Allows computers to send digital information over analog lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does a router do?

A

A point of connection between two or more networks. Connects networks to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does a switch do?

A

A more complex version of a hub which is used to connect devices in a specific network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What does a bridge do?

A

Connects two or more networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How is a bridge different from a router?

A

A bridge does not analyze data. It simply forwards data to the next network, whereas a router will.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What does a repeater do?

A

Extends a weak signal or general range of a connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What does a hub do?

A

A device used to connect a router to a network, takes data packets from router, and sends them to devices connected in the network. A USB hub is an example of a hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the network media devices associated with the third layer of OSI and why?

A

Switch and router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the network media devices associated with the second layer of OSI and why?

A

Modem, switch, and bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the network media devices associated with the first layer of OSI and why?

A

Modem, hub, and repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a host device?

A

any hardware device that has the capability of permitting access to a network via a user interface, specialized software, network address, protocol stack, or any other means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What does UTP stand for?

A

Unshielded twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are the categories of UTP?

A

CAT1-CAT6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is different about a coaxial cable?

A

Shielded with metal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is fiber optic?

A

Type of cable that uses light instead of electricity to transfer data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are the different modes of fiber optic?

A

Single-mode and Multi-mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which is better for longer distance; single- mode or multi-mode fiber?

A

Single-mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the IEEE?

A

Institute of electronic and electrical engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the difference between 2.5gh and 5gh?

A

the higher the frequency the higher the bandwidth, but shorter the range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What does ICMP stand for?

A

internal control message protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Describe the command ping

A
  • Sends an internal control message protocol (ICMP) echo request to a host and listens for the reply.
  • If the echo is received, it will display the time it took and the time to live (TTL) left.
  • Useful for troubleshooting!
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Describe the command traceroute

A

Displays each hop (next router) in a numerical list with the hop’s IP address and the time it takes to receive the packet
- traceroute for Linux or tracert for windows
- Need admin privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Describe the command tracepath

A

Same as traceroute, but with regular privilege

45
Q

Describe the command ifconfig

A

Similar to ipconfig. Used to configure kernel network interfaces. Used at the time of booting to configure interfaces, and used later for troubleshooting

46
Q

Describe the command ARP

A

Address resolution protocol displays the IP to physical (MAC) address mappings for hosts that have been discovered in the ARP cache

47
Q

Describe the command netstat

A

network statistics. displays information about active ports and their state and can be useful in troubleshooting

48
Q

Describe the command nslookup

A

name server lookup displays information for displaying DNS info and troubleshooting DNS problems. Useful for displaying names to IP address mappings.

49
Q

Describe the command dig

A

domain information groper is used for displaying DNS info and troubleshooting. Is a replacement for nslookup

50
Q

Describe the command whois

A

provides information on who a domain belongs to. Primarily used in Linux. Certain pieces of information are private.

51
Q

Describe the command route

A

Defines the paths a data packet takes through networks. Can also be used to add or remove routes. Used by local host to determine where to send traffic.

52
Q

Describe the command scp

A

security copy protocol is used to securely copy files between servers leveraging SSH for authentication and encryption.

53
Q

Describe the command ftp

A

File transfer protocol copies the file from one host to another host. Uses TCP.

54
Q

Describe the command tftp

A

trivial file transfer protocol transfers a file from server to host or from host to server. It uses UDP instead of FTP so it is usually used on local networks.

55
Q

Describe the command finger

A

displays information about a user or users on a remote system, including such things as last login and username. Primarily used on Linux.

56
Q

Describe the command nmap

A

Network mapper scans networks to see what it can find in terms of hosts and open ports. Commonly used to find vulnerabilities on a network. Nmap is not native to either windows or Linux.

57
Q

Describe the command tcpdump

A

Displays TCP/IP packets that are being transmitted over the network system. A form or protocol analyzer (sniffer) and is designed to show the contents of network packets in human readable form. Not native to Linux or windows.

58
Q

Describe the commands telnet/ssh

A

allows a user to manage accounts and devices remotely. SSH is encrypted, telnet is not.

59
Q

Describe a local area network

A
  • House or office building
    • Uses router or switch to manage traffic
60
Q

Describe a personal area network

A

Connects personal devices within 20-30 meter distance. Phone → blue tooth head phones

61
Q

Describe a wireless local area network

A

Like a LAN but data is transmitted wirelessly

62
Q

Describe a campus area network

A

Uses a router to connect each LAN in the geographical region ‘campus sized’

63
Q

Describe a metropolitan area network

A

city wide network. The city will run a high speed signal, usually connected to a WAN, and businesses, schools, and offices connect to it.

64
Q

Describe a wide area network

A

No area limits to the network size. The internet is a WAN.

65
Q

Describe a storage area network

A

Connects networks but only for storage

66
Q

Describe a client-to-server network

A

In a client-server network model, there is a distinct server and a distinct client. The server is the system that stores data and information. The client is the machine that needs access to that data. This is the traditional model of networking since the 1990s

67
Q

Describe a peer-to-peer network

A

In a peer-to-peer model, or P2P, there is no individually designated server or client. Each machine on the network can act as both server and client, sometimes requesting data from other nodes and sometimes answering requests from others. Bitcoin and Tor are examples of peer-to-peer networks.

68
Q

Describe a Mesh network topology

A

Every device is connected to every other device. Difficult to manage with more than two devices. self-healing network

69
Q

Describe a Star network topology

A

All devices are connected to one central device. Most common topology, and provides easy central control.

70
Q

Describe a Ring network topology

A

Devices connect in a circular fashion. A→B→C→D→A. Each device serves as a beginning and end, so termination isn’t an issue. This topology is like a talking token at a campfire. Each person at the fire can only talk while they hold the token, and are given a limited amount of talk time

71
Q

Describe a Buss network topology

A

One long cable, devices are plugged into cable, terminator at each end. Very simple, cheap, and easy to make but, like a walkie talkie, each computer operates in ‘half-duplex mode’ only ever sending OR receiving information. Not both.

72
Q

Define SONET ring

A

synchronous optical network

73
Q

Describe the client-to-server model

A

Centralized data source accessed by multiple devices. Front-end/back-end

74
Q

Describe some benefits of the client-to-server model

A

Offloads computing power from server to client machines.

75
Q

Describe some drawbacks to the client-to-server model

A

Scalability, version control issues, user error

76
Q

Describe centralization

A

Centralization refers to the concentration of control, resources, and decision-making in a single, central location or entity within a computing system or network.

77
Q

Describe the benefits of centralization

A

Allows more control over performance and availability. Higher security.

78
Q

Describe a drawback to centralization

A

single point of failure

79
Q

Describe decentralization

A

Puts data management and computing in the users hands

80
Q

Describe some benefits of decentralization

A

Can operate with or without a network connection & no single point of failure

81
Q

Describe some drawbacks to decentralization

A

Users mismanage security and data leading to loss and data falling into the wrong hands. Compatibility issues between users.

82
Q

Define virtualization

A

the technique of converting a hardware-based resource into software

83
Q

What does virtualization allow admins to do?

A
  • Deploy new devices without needing to be onsite
    • Increase the reliability of a service by removing the hardware need, a single point of failure(SPoF)
    • Create snapshots or clones of virtual devices for backup purposes
    • Increase or decrease the compute, storage, and network resources allocated to a virtual device on demand, as its utilization rises and falls
84
Q

What does SPoF stand for?

A

Single point of failure

85
Q

What is virtual computing?

A

Outsources computing to virtual machines. Mimics the old model of computer and mainframe, but this time the users computer is used to manage 1 or more virtual machines

86
Q

What is a hypervisor?

A

Software that allows the the creation and maintenance of virtual machines

87
Q

What is an OS installed on a VM called?

A

Guest operating system

88
Q

What is a type 1 hypervisor also referred to as?

A

Bare metal hypervisor

89
Q

What is a type 2 hypervisor also referred to as?

A

Hosted hypervisor

90
Q

What are some benefits to type 1 hypervisors?

A

Doesn’t compete for resources and alleviated performance issues due to unrestricted access to hardware

91
Q

What are some benefits to type 2 hypervisors?

A

Installed on personal computer, and therefore easier to configure than type 1.

92
Q

What are some drawbacks to type 2 hypervisors?

A

Performance issues due to it’s restricted access to hardware.

93
Q

What is cloud computing?

A

Computing done outside of the users physical hardware

94
Q

What are some characteristics of cloud computing?

A

on-demand, self-service, resource pooling, elastic, accessible, and measurable. The quickness with which IT can pivot based on market demands is a huge plus to cloud computing.

95
Q

What is a CSP?

A

cloud service provider

96
Q

What are the three primary models for cloud computing?

A

Infrastructure, Software, and Platform ‘as a service’

97
Q

What are the three cornerstones of IaaS?

A

server virtualization, network virtualization, and storage virtualization

98
Q

Describe network virtualization

A
  • Gives the CSP the ability to create virtual private cloud (VPC) networks for each of their customers, keeping their info private.
  • Customers can create their own networks for testing and development purposes
  • Virtual servers are usually the flagship service of CSPs.
  • Note that CSP are not responsible for backing up data.
  • A good idea is to back up data locally, and store it geographically far away.
99
Q

Describe server virtualization

A
  • CSP manages the hypervisor and underlying hardware
  • Client is given access to a web portal where they can manage the VM’s
  • Can customize the available resources to suit needs
  • CSP will allow the customer to choose number of CPU’s, RAM, storage, number of network cards, etc.
100
Q

Describe storage virtualization

A

CSP provides elastic storage that shrinks or expands as needed

101
Q

Describe the model ‘platform as a service’

A

cloud provider is responsible for the virtual servers and sometimes the services that run on top of them (like a data base engine)

102
Q

Describe and give some examples of the model ‘software as a service’

A

Could represent nearly every application you consume over the internet. Facebook, Gmail, Instagram, office 365 etc.

103
Q

What are the five cloud deployment models?

A

Private, public, community, multi-cloud, and hybrid

104
Q

Describe a private cloud deployment

A
  • Equipment is hosted within a single companies on-site data center
  • Company can maintain absolute control over the hardware, but also bare the responsibility of maintaining it
105
Q

Describe a public cloud deployment

A
  • CSP is responsible for maintaining the physical hardware
  • Good analogy: Many different people live within the same apartment building (the physical computer), but each tenant (the customer) has their own apartment (a VPC) with a lock on the front door (a firewall).
106
Q

Describe a community cloud deployment

A
  • More common in universities or government
  • Each tenant has a private cloud, but the maintenance of the hardware is shared amongst the community
107
Q

Describe a hybrid cloud deployment

A
  • Refers to a combination of public and private cloud
  • A company may be required to maintain a private cloud, but need access to extra computing power in bursts (a public cloud)
108
Q

Describe a multi-cloud deployment

A

a customer may use one CSP for hosting, and another for machine learning.