Topic 1 - Network Fundamentals Flashcards

1
Q

OSI Model Layers

A
Application (Layer 7)
Presentation (Layer 6)
Session (Layer 5)
Transport (Layer 4)
Network (Layer 3)
Data Link (Layer 2
Physical (Layer 1)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TCP/IP model

A

Application Layer / Process
Transport Layer / Host-to-Host
Internet Layer
Link Layer/ Network Access Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OSI model in terms of a reference model.

A
Layer 7 - HTTP, FTP
Layer 6 - Telnet, X.25
Layer 5 - L2TP, PPTP
Layer 4 - TCP, UDP
Layer 3 - RIP, OSPF
Layer 2 - ARP
Layer 1 - Ethernet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain TCP

A
  • TCP is a full-duplex, connection-oriented, reliable and accurate protocol.
  • If a TCP packet is not received, the hosts will communicate this and the sending host can send the packet again. Before transmitting, a sending host establishes a connection with the TCP host.
  • This is done via a few handshake messages.
  • 3 way hand shacks:
    SYN (Host to Server) —–> SYN/ACK ( Server to Host ) ——> ACK ( Host to Server ) —> Connection Established

example: Videos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain UDP

A

UDP requires less bandwidth than TCP because it doesn’t care about reliability. It doesn’t need to be connection-oriented and know whether a packet is received or not. The best example of this is Voice over IP. VoIP packets are real-time. They are played as they’re received. If one is not received, it doesn’t make sense to retransmit it because it would be out of order anyways when it is received. So it makes sense for VoIP application developers to use UDP for their transport layer protocol.

Features of UDP: Voip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TCP Port numbers

A
FTP - 20,21
Telnet - 23
SMTP - 25
DNS  - 53
Http - 80
POP - 110
NNTP -119
HTTPS - 443
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

UDP Port numbers

A

DNS - 53
DHCP - 67, 68
SNMP - 161
NTP - 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firewalls?

A

Firewalls - designed to prevent unauthorized access to your network. Layer 4 device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Adaptive Security Appliances - ( ASA )

A

Asecurity device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities. It provides proactive threat defence that stops attacks before they spread through the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Autonomous AP

A

Configured individually, fully functional like Switch. AP can be overloaded if the neighbour goes down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Controller based AP

A

Controlled by controller, fully controlled by WLC.
All the configurations are done on controller.
Controller tells if the neighbour goes down
Load balances user connection to each AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Public cloud

A

Available for public. Either free or Pay per use model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Private Clouds

A

Application and services are offered in private for a specific organisation such as government. It has better security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hybrid

A

Hybrid is generally made of two or more clouds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Custom clouds

A

these are built to meet needs of specific industry like Health care or media. It an be private or Public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cloud computing vs Data Center?

A

Data Center are typically data storage facility run by IT department or leased site. It provided un un interrupted service.

Cloud: are off premises service and provided ON Demand basics and resources are available fast and with minimal management error.

17
Q

Core Layer

A

Core layer:Provides optimal transport between sites and high-performance routing. Due the criticality of the core layer, the design principles of the core should provide an appropriate level of resilience that offers the ability to recover quickly and smoothly after any network failure event with the core block.
Multilayer Switches between buildings

18
Q

Distribution layer

A

Provides policy-based connectivity and boundary control between the access and core layers.
Like Multilayer switch which can do routing etc

19
Q

Access layer

A

Provides workgroup/user access to the network.

Like Switches to Host/PC

20
Q

Three-Tier Model

A

This design model is typically used in large enterprise campus networks, which are constructed of multiple functional distribution layer blocks.

21
Q

Two-Tier Model or Collapsed core

A

Two-Tier Model or Collapsed core ( Combination of Core and Distribution layer )
is more suitable for small to medium-size campus networks (ideally not more than three functional disruption blocks to be interconnected), where the core and distribution functions can be combined into one layer, also known ascollapsed core-distribution architecture.

22
Q

Leaf layer and Spain layer

A

The Leaf layer consists of access switches that connect to devices like servers, firewalls, load balancers, and edge routers.

The Spine layer (made up of switches that perform routing) is the backbone of the network, where every Leaf switch is interconnected with each and every Spine switch.

23
Q

Crossover cable

A
  • Use when connecting like devices together
  • Switch to Switch (auto detect on most switches will work with straight-through cables, but crossover is the correct choice)
  • Switch to Hub ( hub is similar to a switch )
  • Hub to Hub
  • Router to Router
  • Router to PC
  • PC to PC
  • Switch to Switch
24
Q

Straight-through cable

A
  • Use when connecting unlike devices together
  • Also known as a patch cable
  • For a straight-through, use 568B on both ends
  • Switch to pc
  • Switch to Router
25
Q

Fiber

A
  • Very long distances, but seeing it more on the LAN now as well.
  • Made up of Core, Cladding and Buffer. Cladding is industry standard at 125m.
  • As a point of reference, a human hair is 50 microns
  • Single mode fiber: tighter cladding = smaller core, one mode of light propagates
  • Multi-mode fiber: looser, larger core allows multiple light particles, less distance
26
Q

Troubleshooting methodologies to resolve problems

A
  1. Define problem
  2. Gather Information
  3. Analyze information
  4. Elimination potential causes
  5. Propose Hypothesis
  6. Test Hypothesis
    7 .Solve problem and document solution
27
Q

Explain Unicast, Broadcast, Multicast IPv4

A

Unicastaddresses are assigned to a single interface on a device. They are used for one-to-one communication.

Broadcastaddresses are assigned to all interfaces in a subnet. Broadcast packets are sent from one host to everyone.

Multicastaddresses are assigned to a group of devices on various subnets. These are used for one-to-many communications.

28
Q

IPv6 Unicast Explain

A

An IPv6 unicast address is the same as an IPv4 unicast address; it is an IP that is assigned to an interface on a host. It can be the source of an IP packet or the destination for one. A packet sent to a unicast address goes to the one host with that address.

29
Q

IPv6 Global unicast Explain

A

A global unicast IPv6 address is the equivalent of a public, registered IP address. They are Internet routable, globally registered IPs that must be leased from an ISP.

30
Q

IPv6 Unique local?

A

Equivalent to a private IPv4 address; not registered with an ISP and not Internet routable.
Unique Local Address is an IPv6 address in the block FC00::/7,

31
Q

IPv6 Link local Explain

A

Every IPv6 interface gives itself a link-local address. The address range is FE80::/10, and usually combines this prefix with the last 64 bits in EUI-64 format. It is roughly equivalent to the Automatic Private IP Address (APIPA) address range of 169.254.0.0/16.

32
Q

IPv6 Multicast Explain

A

Just like in IPv4, a single IPv6 multicast address is assigned to multiple hosts so that a packet sent to the address may be delivered to multiple hosts more or less at the same time. IPv6 multicast addresses always start with the prefix FF00::/8

33
Q

IPv6 Anycast Explain

A

An anycast address is a single address that is assigned to multiple hosts. This is similar to a multicast, except that a packet for the anycast address will be delivered to the one host that is nearest according to the routing protocol’s idea of distance. There is no special prefix for anycast addresses.
There is no such thing as a broadcast in IPv6. Ever. Any requirement for broadcasting is performed by a multicast instead.
Google.com ( directs to then nearest server like in australia in sydney )

34
Q

EUI-64 - Extended Unique Identifier

A

EUI-64 (Extended Unique Identifier)is a method we can use to automatically configure IPv6 host addresses. An IPv6 device will use the MAC address of its interface to generate a unique 64-bit interface ID. However, a MAC address is 48 bit and the interface ID is 64 bit. What are we going to do with the missing bits?