• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/119

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

119 Cards in this Set

  • Front
  • Back

UNICAST

Communication from one host to one other host

BROADCAST

Communication from one host to all other hosts on the network

MULTICAST

Communication from one host to few hosts only

4 Router Functions

  • Packet Switching
  • Communication between networks
  • Path Selection
  • Packet Filtering

Packet Switching

Switching packets between networks

Communication between networks

Allow send/receive from connected networks

Path Selection

Ping all routers to find the best path to reach a given network

Packet Filtering

Drop or forward packets based on criteria (ex: source or destination)

Local Area Network (LAN)

A network covering a limited geographical area


  • high data transfer rate
  • (ex: floor, building, or campus)

Wide Area Network (WAN)

A network covering a large geographical area


  • used to connect LAN\s across coverage area
  • (ex: various office LANs connected by a WAN)

Open Systems Interconnection (OSI)

An open standard networking model published in 1984 by the International Organization for Standardization (ISO)

TCP/IP model

An open standard networking model developed by DARPA from 1973-1985.



TCP/IP eventually replace the OSI model

OSI Application Layer (ALL)

Provides a user interface


  • Applications use the HTTP protocol to send/receive page requests and contents

HTTP Protocol

  • Resides at the application layer
  • Used by an application to get webpages from web servers across the network

OSI Presentation Layer (PEOPLE)

  • Presents data to the Application Layer
  • Handles encryption/decryption
  • Translates data to/from the Application layer
  • Data Compression/Decompression

OSI Session Layer (SEEM)

  • Maintains distinction between data of separate application / sessions
  • Provides dialog control between hosts
  • Coordinates communication between systems

OSI Transport Layer (TO)

  • Provides end-to-end connections
  • Provides reliable or unreliable delivery
  • Provides Flow Control
  • Provides Error Recovery

OSI Network Layer (NEED)

  • Provides Logical Addressing
  • Provides Path determination using logical addressing

Path Determination

A router determines the best path to a destination address

OSI Data Link Layer (DATA)

  • Provides data access and physical addressing
  • Deals with data moving on the local network
  • Defines protocols used to send/receive data across the media
  • Switches function at this level

OSI Physical Layer (Processing)

  • Converts digital data (to bits) so it can be sent over the physical medium
  • Moves data between hosts
  • Activates, Maintains, and Deactivates the physical link between systems (ex: switch & host)
  • Connectors, cables, electrical currents etc.

Header

Contains control information related to the protocol being used at that layer

Data Encapsulation

The addition of a header to each layer in front of the data from the previous layer

Protocol Data Unit (PDU)

The header and data being send from one layer to the next lower layer

Decapsulation

Examining, processing, and removing the header

OSI Layer Name Mnemonic

  • ALL -application
  • PEOPLE - presentation
  • SEEM - session
  • TO - transport
  • NEED - network
  • DATA - data link
  • PROCESSING - physical

TCP/IP Application Layer

  • Various protocols that equate the OSI model's Application, Presentation, and Session layers
  • interaction with the application
  • data translation & encoding
  • coordinating communication between systems

Telnet Protocol

  • A terminal emulation protocol used to access the resources of a remote host
  • usually provides access to the command line interface of the host

HTTP Protocol

  • HyperText Transfer Protocol
  • used to transfer webpages and resources from the Web Server to the Web Client

FTP Protocol

  • File Transfer Protocol
  • used for transferring files between two hosts

TFTP Protocol

  • Trivial File Transfer Protocol
  • only sends/receives files

SMTP Protocol

  • Simple Mail Transfer Protocol
  • used for sending email

DNS Protocol

  • Domain Name Service
  • helps map IP addresses of the host where a website originates/resides
  • makes it easier to find resources on a network

DCHP Protocol

  • Dynamic Host Configuration Protocol
  • Automatically provides a host with an IP address
  • Provides the address of the DNS server to resolve Names, Gateways, Subnet Masks, etc

TCP/IP Transport Layer

  • End-toEnd transportation of data
  • Sets up a logical connection between hosts

Transmission Control Protocol (TCP)

  • Connection-oriented and reliable protocol
  • Uses windowing to control flow
  • provides ordered delivery of data in segments

User Datagram Protocol (UDP)

  • simple data transfer without perks

Well-Known Ports

  • Port numbers in the range of 1-1024

Socket

  • Combination of IP address, Protocol (TCP or UDP), and Port Number

HTTP Application Protocol

  • TCP Protocol
  • Port 80

HTTPS Application Protocol

  • TCP Protocol
  • Port 443

FTP (control) Application Protocol

  • TCP Protocol
  • Port 21

FTP (data) Application Protocol

  • TCP Protocol
  • Port 20

SSH Application Protocol

  • TCP Protocol
  • Port 22

Telnet Application Protocol

  • TCP Protocol
  • Port 23

DNS Application Protocol

  • TCP or UDP Protocol
  • Port 53

SMTP Application Protocol

  • TCP Protocol
  • Port 25

TFTP Application Protocol

  • UDP Protocol
  • Port 69

Three-Way Handshake (TCP)

  • Virtual Circuit between Source and Destination
  • Uses SYN and ACK flags for sequencing data

Maximum Transmission Unit (MTU)

  • Maximum amount of data that can be sent across a single Internet Layer PDU
  • Limited by the Protocol used in that layer
  • TCP breaks the data into segments each equal to the MTU

Sliding Window (TCP)

  • Determines the number of segments that can be sent at a time
  • The size of the window increases over time, but can be decreased by the destination host
  • The source can only send the amount of segments designated by the window until it receives an ACK from the destination

Reliable Delivery w/Error Recovery (TCP)

  • when the dest. receives the last segment in the window, it sends an ACK in the header to the source
  • if the destination doesn't receive a segment, it does not send an acknowledgement back

Ordered Delivery (TCP)

  • TCP transmits the data in the order received from the application layer
  • Uses a sequence number to mark the order

Sequence Number (TCP)

  • The source sequence number is the same as the previous ACK sent from the destination
  • Used for ordering data if data is received in the wrong order to to network conditions

Connection Termination (TCP)

  • Source sends a FIN flag and the destination responds with an ACK to close the session
  • The source initiates a four-way handshake to close the session

User Datagram Protocol (UDP)

  • Connectionless and unreliable protocol
  • Delivers data without overheads
  • good for voice and video to avoid delay

UDP Header

  • Source Port
  • Destination Port
  • Length
  • Checksum
  • 8 bytes in size

Internet Layer (UDP)

  • Corresponds to OSI Network Layer
  • Ensures segments are moved across networks to the destination
  • Provides logical addressing, path determination, and forwarding

Internet Protocol (IP)

  • A logical address for each interface on a network (hosts, routers, switches, etc)

Packet

  • A PDU (segment + header) including the source and destination IP addresses
  • When a router receives a packet, the destination address tells the router where the packet should get forwarded

Hop

  • Every time a packet goes through a router, it goes "one hop".
  • Packets may have to travel multiple hops to reach its destination

IPv4 Header

IPv4 Header Length

  • minimum size of 20 bytes
  • Most IPv4 headers are 20 bytes in length

IPv4 Header Differentiated Services (DS) Field

  • Mark packets for priority depending on what kind of data they are carrying
  • Data with no tolerance for delay (voice & video), are "marked up", while peer-to-peer traffic is "marked down"

IPv4 Header Total Length Field

The total size of the packet (header + data)

IPv4 Header Identification Field

  • Segments may need to be broken into fragments before sending the data out
  • Each fragment of a segment will have the same identification number

IPv4 Header Flags Field

Used in the fragmentation process

IPv4 Header Fragmentation Offset

Used by hosts to reassemble the data in the correct order

IPv4 Header Time to Live (TTL) Field

  • Set at the originating host
  • Passing through a router decreases TTL by 1
  • If TTL reaches 0 before reaching the destination, the packet is dropped

IPv4 Header Protocol Field

Identifies the protocol to which the data belongs

IPv4 Header Checksum Field

  • Used to check for errors in the header
  • Each router performs a cyclic redundancy check on the header
  • If the value does not match, the packet is discarded

Cyclic Redundancy Check

A test a router performs on a packet to check for errors in the packet header. A mismatched value results in discarding the packet

IPv4 source IP address Field

Stores the IP address of the packet's source

IPv4 destination IP address Field

Store the IP address of the packet's destination

Routing Table

  • A table of all networks known by a router and all the routers in the internetwork
  • Lists the next hop toward the destination
  • Routers use routing protocols to build the Routing Table

Internet Control Messaging Protocol (ICMP)

  • A management system and messaging service for IP
  • Whenever IP encounters an error, it sends ICMP data as an IP packet

"Destination Network Unreachable"

A message generated by ICMP if the packet cannot be routed to the network in which the destination address resides

"Time Exceeded"

A message generated by ICMP if TTL expires to 0

"Echo Reply"

  • When a source uses Ping to check network connectivity, the destination responds with and echo reply
  • Successful receipt of an Echo Reply shows the destination host is reachable and available

TCP Network Access Layer

  • Corresponds to the Data Link and Physical Layers of the OSI model
  • Defines Protocols and Hardware required to connect a host to a physical network and deliver datas across it
  • Limited to the physical layer boundary often defined by a layer 3 device (router)

Frame

  • TCP Network Access Layer PDU
  • contains the IP packet as well as a protocol header and trailer from the Net Access Layer`

Ethernet

A contention media access method that allows all hosts in a network to share the available bandwidth

Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Protocol

An ethernet protocol to resolve collision


  • In the event of a collision, the host sends a jamming signal to notify all hosts
  • Each host randomizes a timer and waits that random duration to resend the collided frame

Half Duplex Logic

A host can either send or receive at one time


  • Hub-based networks use half-duplex to detect collisions

Full Duplex Logic

A host can send and receive data simultaneously


  • Uses 2 pairs of wire instead of 1
  • Switch-based networks use Full Duplex logic
  • CSMA/CD is disabled at both ends

Ethernet at the Data Link Layer

Responsible for addressing and framing packets from the Network Layer and preparing them for transmission

MAC address

  • Ethernet addressing used to identify a device or group of devices
  • 48 bits (6 bytes) long
  • written in hexadecimal format
  • Each LAN interface card has a globally unique MAC address

Unicast Address

  • Identifies a single device
  • Used to identify the source and destination in a frame

Organizationally Unique Identifyer (OUI)

Each LAN card is assigned a code


  • The first half of the MAC address is the OUI of the manufacturer assigned by the IEEE
  • The second half is assigned by the manufacturer and is unique to the card

Institute of Electrical and Electronics Engineers

(IEEE)

Responsible for defining various electronics standards since 1980

Broadcast Address

A type of ethernet group address


  • Has the value FFFF.FFFF.FFFF which means
  • "all devices in the network process this frame"

Multicast Address

A type of ethernet group address


  • Used when a frame needs to go to multiple hosts in the network
  • the address 0100.5exx.xxxx is used where x can be any hexadecimal value

Ethernet Framing

Encapsulation of data from the Data Link layer into frames for transmission

Preamble Field

A Field on the Ethernet Frame


  • 7 bytes in length
  • Used for synchronization
  • Tells the received data where the header starts

Start Frame Delimiter (SFD) Field

A Field on the Ethernet Frame


  • 1 byte in length
  • Tells the receiving device that the next byte is the destination address

Destination Address Field

A Field on the Ethernet Frame


  • 6 bytes in length
  • Identifies the intended destination of the frame

Source Address Field

A Field on the Ethernet Frame


  • 6 bytes in length
  • Identifies the source of the frame

Length Field

A Field on the Ethernet Frame


  • 2 bytes in length (less than 0600 hex)
  • Contains the length of the data field of the frame
  • Field can be Length or Type but not both

Type Field

A Field on the Ethernet Frame


  • 2 bytes in length (0600 hex or more)
  • Identifies the Network Layer protocol whose data is contained in the frame
  • Field can be Type or Length but not both

Data Field

A Field on the Ethernet Frame


  • 45-1500 bytes in length
  • The Network Layer Data

FCS Field

A Field on the Ethernet Frame


  • 4 bytes in length
  • Stores the CRC value used to check for errors in transmission

Logical Link Control (LLC) Header

  • An IEEE 802.2 Header used on Headers using the Length Field
  • Inserted after the Ethernet 802.3 header but before the Layer 3 header

Subnetwork Access Protocol (SNAP) header

  • An IEEE 802.2 Header used on Headers using the Length Field
  • Inserted after the Ethernet 802.3 header but before the Layer 3 header

Ethernet 802.3 Standard

  • 10Mbps co-axial cable (Ethernet)
  • 802.3u (FastEthernet)
  • 802.3ab (Gigabit Ethernet on CAT 5+ cable)
  • 802.3ae (10Gbps over fiber and co-axial)

Electronics Industries Association & Telecommunication Industries Alliance (EIA/TIA)

The Standards Body which creates the physical layer specifications for Ethernet


Ethernet Cable

A registered jack (RJ) connector with a 4 5 wiring sequence on an unshielded twisted-pair (UTP)


  • Higher category cables have less attenuation and crosstalk

Attenuation

Loss of signal strength as data travels the length of the cable (measured in decibels (dB))


Crosstalk

Unwanted signal interference from adjacent pairs in the cable

Straight Through Cable

  • A type of Ethernet cable using 4/8 wires
  • The wire matches the corresponding numbers on either end
  • (1-1, 2-2, 3-3, 6-6)

Crossover Cable

  • A type of Ethernet cable using 4/8 wires
  • Uses the same wires as the straight through cable but connects to different pins
  • (1-3, 2-6, 3-1, 6-2)

Rolled Cable

  • Cannot be used for any Ethernet connection
  • Connects host to Console (Switch/Router)
  • Each wire connects to its opposite number
  • (1-8, 2-7, 3-6, 4-5)

Cisco 3-layer Model

  • Core Layer
  • Distribution Layer
  • Access Layer
  • (Layers are logical not physical)

Core Layer

  • Function is to transport a large amount of data quickly
  • gets data from the distribution layer and sends it back to the distribution layer after transportation

What to Avoid at the

Core Layer

  • Anything that can slow down traffic
  • Direct user connections
  • Direct Server Connections
  • Complex Service Policies

The Distribution Layer

  • Provide Routing, Filtering, and WAN access to determine ho packets can access the core
  • Selects the fastest way and access request can be completed
  • Acts as the convergence point for all switches

What to Keep in Mind when Designing the

Core Layer

  • Routing protocol should have low convergence time
  • Network Access layer technologies should be fast with low latency
  • Redundancy should be built into this layer`

Practices generally executed at the

Distribution Layer

  • Routing between subnets and VLANS
  • Implementation of security policies
  • Breaking broadcast domains

The Access Layer

  • Also known as the Desktop Layer
  • The edge of the network where devices (PCs, iPads, etc) connect to the network

Practices Generally Executed at the

Access Layer

  • Access control and policies in addition to what exists at the Distribution Layer
  • Dynamic Configuration Mechanisms
  • Breaking Collision Domains
  • Ethernet Switching and Static Routing