Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
96 Cards in this Set
- Front
- Back
OSI Model
|
Open Systems Interconnection Model is the primary architectural model for networks. It was created in the late 70's by the International Organization for Standardization (ISO). |
|
Application Layer
|
Provides a user interface. |
|
Presentation Layer
|
Presents data and handles processing such as encryption. |
|
Session Layer
|
Keeps different applications' data separate. |
|
Transport Layer
|
Provides reliable or unreliable delivery and error correction before retransmit. |
|
Network Layer
|
Provides logical addressing which routers use for path determination. |
|
Data Link Layer
|
Combines packets into bytes and bytes into frames. Provides access to media using the MAC address. Performs error detection but not correction. |
|
Physical Layer
|
Moves bits between devices through cables. |
|
LAN
|
A data network that is restricted to a single geographical location and encompasses small areas such as an office building or school. LAN's purpose is to interconnect workstation computers for sharing of files and resources. |
|
WAN
|
A network that spans more than one geographic location, often connecting separated LANs. Slower than LANs and more expensive due to adding routers, dedicated leased lines and implementation is more complicated. |
|
PAN
|
A LAN created to share data among devices associated with you. AKA Wireless PAN (WPAN). Connections are via Bluetooth, infrared or near-field communications (NFC). |
|
MAN
|
A WAN confined to a certain geographic area such as a university campus or city. Smaller than a WAN but bigger than a LAN. Utilizes Internet Service Provider (ISP) or Telecommunications (Telco) provider. |
|
SCADA/ICS
|
Communication between remote equipment of almost anything i.e.: pumping stations, robotic machines, etc. A typical configuration includes an ICS server, Distributed Control System (DCS) devices creating a closed network, a remote terminal unit and a programmable logic controller. Often used to analyze data from remote systems in real time. |
|
Medianets
|
Useful with Video Teleconferencing (VTC) and often used with Session Initiation Protocol (SIP) |
|
Network Models
|
Peer-to-Peer and Client/Server |
|
Peer-to-Peer Network
|
a network where all systems can share resources on their local computers as well as use resources from other systems. Cheaper and easier to implement but doesn't work well with large numbers. Can have no more than 10 computers connected. Can't backup files due to lack of centralized data storage. |
|
Client/Server Network
|
More expensive because it requires dedicated server hardware and software. Most widely implemented model in real-world environments. Client requests data from the server and presents that data to the users. |
|
Centralized vs Distributed Computing
|
Distributed: Process power is distributed between the client systems and the server. |
|
Topology
|
A network's physical and logical layout. |
|
Bus Topology
|
Loose or missing terminators disrupt data transmissions. A break in the systems prevents all systems from accessing the network. Uses IEEE 802.3 Ethernet standard. |
|
Ring Topology
|
If one system fails, the whole network fails. |
|
Star topology
|
All computers and network devices connect to a central device called a hub or switch. Each connected device requires a single cable to be connected to a hub or switch creating a point-to-point connected between the device and hub or switch. A single break in any cable doesn't cause the network to fail. However if the hub or switch fails the devices can't connect to the network. Easy to troubleshoot and add or remove devices but more expensive to implement. |
|
Mesh Topology (Wired)
|
Purpose of mesh is to create a high level of redundancy. One network cable fails, the data always has an alternative path to get to its destination. Implementation is very complicated and troubleshooting is tricky. |
|
Hybrid Mesh Topology
|
Most seen in WANs. |
|
Infrastructure Wireless Topology
|
Wireless devices communicate with the wired LAN via an Access Point (AP) aka Wireless Access Point. APs connect to the wired network. |
|
Ad Hoc Wireless Topology
|
Connecting devices via Bluetooth is an example of an ad hoc network. |
|
Point-to-Point Network (PtP)
|
Often used in wireless backbone systems such as microwave relay communications or as a replacement for a single wired communication cable. |
|
Wireless Bridge
|
Used to connect two wired networks together over Wi-Fi. |
|
Point-to-Multipoint Network (PtMP)
|
A wireless connection designed to link multiple wired networks. Signals travel from a central node such as a base station of a cellular systems, an AP of a WLAN or a satellite. Used in Wireless Internet Service Providers (WISPs), large corporate campuses, etc. |
|
Wireless LAN (WLAN)
|
Wireless network that's dependent on a hotspot. Coffee shops, train statins, restaurants or any public place uses hotspots. Security is a concern and encryption should be used. |
|
Wireless Mesh Networks
|
Signal starts at a wireless base station (access point), attached to a wired network. Extends the transmission distance by relaying the signal from one computer to another. Cheaper than a wired mesh network. |
|
Wireless Mesh
|
Data signals in a wireless mesh rely on all nodes to propagate signals. |
|
Advantages of a Wireless Mesh
|
Scalable: Possible to add new systems to the network w/o cables. Reliability: Due to the redundant number of paths for the data to travel ensures the data can reach its destination. Cost: Self-configuring and doesn't needs cables. Can add, remove or relocate with little cost or disruption to the network. |
|
Hybrid Topology
|
Can also refer to the combination of wired and wireless networks. |
|
Creating a SOHO Network
|
2. Device types/requirements: Cost 3. Environment limitations: If there's a wall that can block wireless connections. 4. Equipment limitations: number of ports on a network device. 5. Compatibility requirements: can they work well together? 6. Wired/Wireless considerations: Confirm if the area can go wireless. 7. Security considerations: Primary concern |
|
SOHO Network
|
A network that serves 1 to 10 users in a small environment. Consists of a SOHO router, and either a cable or DSL modem. |
|
Demarcation Point (Demarc)
|
A box outside of a home or office located at the splitter nearest where the cable originates. |
|
Media Access Control (MAC) layer |
MAC address is defined at this layer. It's burned into the NIC card. |
|
Logical Link Control (LLC) layer |
Responsible for the error and flow-control mechanisms of the Data Link layer. |
|
Layer 1 protocols |
USB, Ethernet, DSL, ISDN, T-carrier links, GSM and SONET |
|
Layer 2 protocols |
High-Level Data Link Control (HDLC), Layer 2 Tunneling Protocol (L2TP), Point-to-Point Protocol (PPP), Point-to-Point Tunneling Protocol (PPTP), Spanning Tree Protocol (STP), & VLANs. |
|
Layer 3 protocols |
Routing Information Protocol (RIP), Open Shortest Path First (OSPF), Address Resolution Protocol (ARP), Reverse ARP (RARP), Asynchronous Transfer Mode (ATM), Intermediate System to Intermediate System (IS-IS), IP Security (IPsec) and Multiprotocol Layer Switching (MPLS) |
|
Transport Layer mechanisms |
Error checking ensures data is sent correctly
service addressing ensures data is passed to the right service segmentation breaks data into packets for the lower levels to handle |
|
Layer 4 protocols |
User Datagram Protocol (UDP) connectionless Transmission Control Protocol (TCP) connection-oriented |
|
Data Flow Control (Layer 4) |
How the receiving device accepts data in two ways: Buffering: data is temporarily stored until destination device becomes available. Windowing: data sent in groups of segments requiring only one acknowledgement.
|
|
Layer 5 Protocols |
NetBIOS, Network File System (NFS) & Server Message Block (SMB) |
|
Dynamic Host Configuration Protocol (DHCP)
|
enables ranges of IP addresses, known as scopes, to be defined on a server running a DHCP server application.
|
|
Static addressing
|
method of manually assigning an address from those available to you and allowing the host to always use that address. |
|
DHCP Process
|
Server sees DHCPDISCOVER packet and picks it up. If it finds a scope for the network from which the packet originated, it chooses an address from the scope, reserves it and sends the address to the client in another packet called DHCPOFFER. DHCPREQUEST packet notifies the server that the offer has been accepted after the selection process is completed. |
|
DHCP and DNS Suffixes
|
suffixes define the DNS servers to be used and the order in which to use them. DHCP settings pushes a domain suffix search list to DNS clients. |
|
DHCP Relays
|
an agent on the router that acts as a go-between for clients and the server. It makes the job of responding to requests easier. |
|
IP Helper
|
Same as DHCP relay but by default will forward broadcasts for DHCP/BOOTP, TFTP, DNS, TACACS, the time service and the NetBIOS name/datagram service.
|
|
Domain Name Service (DNS)
|
Resolves hostnames to IP addresses
|
|
Dynamic DNS (DDNS)
|
A newer system that enables hosts to be dynamically registered with the DNS server.
|
|
DNS Namespace
|
Space that has logical divisions hierarchically organized such as .com, .gov, .uk, etc. |
|
Fully Qualified Domain Name (FQDN)
|
includes all the components from the top of the DNS namespace to the host. |
|
Top-Level Domain Names
|
edu- Education Organizations gov - US Government org net - Network providers/centers org - Non profit org mil - Military arpa - Reverse DNS lookup de - country specific domain |
|
Reverse Lookup
|
DNS performs IP address-to-hostname resolution using pointer (PTR) records. |
|
Types of DNS Entries
|
MX - entries that correspond to mail exchanger systems CNAME (Canonical Record) - creates alias records for a system. |
|
DNS Records
|
Name Server (NS): Stores information that identifies the name servers in the domain that store information for that domain. Canonical Name (CNAME): Stores add'l hostnames or aliases for hosts in the domain. Pointer (PTR): A pointer to the CNAME used to perform a reverse DNS lookup. IPv6 Address (AAAA): Stores info for IPv6 addresses. IPv4 Addresses (A): Stores info for IPv4 addresses. Mail Exchange (MX): Stores info about there mail for the domain should be delivered. |
|
Windows Internet Name Service (WINS)
|
a system on Windows networks used to enable NetBIOS names to be resolved to IP addressed. |
|
Simple Network Management Protocol (SNMP)
|
enables network devices to communication information about their state to a central system. |
|
Components of SNMP
|
Agent - SNMP software configured with the manager's IP address to manage and monitor each device on the network. Traps - Occurrences of certain events that the agent can communicate to the SNMP manager. |
|
SNMP Management Systems
|
A computer running a special piece of software called a Network Management System (NMS). It allows you to monitor all the devices on a network. |
|
SNMP Agent
|
any device that can run a small software component that facilitates communication with an SNMP manager. |
|
Management Information Bases (MIB)
|
defines which parameters are accessible, which are read-only and which can be set. |
|
SNMP Communities
|
Logical groupings of systems. |
|
SNMPv3
|
The latest version of SNMP that supports authentication and encryption. Not available in the previous versions. |
|
Connection-Oriented Protocol
|
Guarantees data delivery via the sending device re-sending any packet that the destination device doesn't receive. |
|
Connectionless Protocol
|
Offers only a best effort delivery mechanism. Information is sent, but the sending device doesn't receive confirmation that it was received. These are popular in applications for streaming audio and video. |
|
Internet Protocol (IP)
|
Used to transport data from one node on a network to another. It's a connectionless protocol that operates at Layer 3. |
|
Transmission Control Protocol (TCP)
|
A Layer 4, connection-oriented protocol. It uses the 3-handed handshake where it sends a message called a SYN to the target host. Target host then opens a connection for the request then sends back an acknowledgement message called an ACK. The originating host then sends another ACK saying the ACK has been received and the session is ready to be used to transfer data.
|
|
User Datagram Protocol (UDP)
|
A fire-and-forget protocol that assumes the data sent will reach its destination. |
|
File Transfer Protocol (FTP) |
Provides for the uploading and downloading of files from a remote host running FTP server software. A Layer 7 protocol. Operates on Ports 20 & 21. |
|
Secure FTP (SFTP) |
Based on secured-shell (SSH) technology that provides robust authentication between sender & receiver, and encryption. |
|
Trivial FTP (TFTP)
|
Associated with simple downloads. A Layer 7 protocol that uses UDP. Port 69 |
|
Simple Mail Transfer Protocol (SMTP)
|
Defines how mail messages are sent between hosts. Uses TCP. Port 25. |
|
Hypertext Transfer Protocol (HTTP)
|
Protocol that enables text, graphics, multimedia and other material to be downloaded from an HTTP server. It uses an Uniform Resource Locator (URL) to determine what page should be downloaded from the remote server. Uses Port 80. |
|
Secure HTTP (SHTTP)
|
Uses Secure Sockets Layer (SSL) which encrypts information sent between client & host. Uses Port 443.
|
|
Post Office Protocol version 3(POP3)/Internet Message Access Protocol version 4(IMAP 4) |
Mechanisms for downloading, or pulling email from a server. Difference between the two is POP3 transmits passwords in clear text where IMAP uses an authentication system which makes it difficult to determine a password. Ports: POP3 - 110, IMAP - 143. |
|
Telnet |
A virtual terminal protocol that enables sessions to be opened on a remote host. Port 23. |
|
Secure Shell (SSH) |
A secure alternative to Telnet which encrypts data as it travels between systems. Port 22.
|
|
Internet Control Message Protocol (ICMP)
|
Works with the IP layer to provide error checking and reporting functionality. |
|
Address Resolution Protocol (ARP)/Reverse ARP (RARP)
|
ARP - Resolves IP addresses to MAC addresses. RARP - Resolves MAC addresses to IP addresses. |
|
Network Time Protocol (NTP)
|
Facilitates communication of time between systems. Port 123. |
|
Network News Transfer Protocol (NNTP)
|
Posts and retrieves messages from news groups. Port 119. |
|
Secure Copy Protocol (SCP)
|
Provides a secure means to copy files between systems on a network. |
|
Lightweight Directory Access Protocol (LDAP) |
Provides a mechanism to access query directory service systems. |
|
Internet Group Management Protocol (IGMP)
|
Part of the TCP/IP Suite - Manages multicast groups. Multicasting: groups of network devices who are able to send and receive data between the members of a group at one time. |
|
Transport Layer Security (TLS)
|
A security protocol designed to ensure privacy between communicating client/server applications. Two Layers of TLS: TLS Record - Ensures connection made is private using encryption. TLS Handshake - Used for authentication between client & server. |
|
Voice over Internet Protocol (VoIP)
|
Enables regular voice conversations to occur by traveling through IP packets and via the Internet. |
|
Session Initiation Protocol (SIP) |
Layer 7 protocol designed to establish and maintain multimedia sessions for audio/video conferencing, online gaming & person-to-person communication over the Internet. Uses TCP or UDP. Port 5060 & 5061.
|
|
Real-Time Transport Protocol (RTP) |
Transports real-time data including audio and video. Ports 5004 and 5005. |
|
Remote Desktop Protocol (RDP)
|
Used in Windows for remote connections. Port 3389. |
|
Server Message Block (SMB)
|
Used on network for providing access to resources. Port 445. |
|
|
|