• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/191

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

191 Cards in this Set

  • Front
  • Back
LAN
A specifically designed configuration of computers and other devices that are
located within a confined area and connected by wires or radio waves that permit the
devices to communicate with one another to share data and services.
Node
A device with an address that can be accessed to send or receive
information
Host
A computer with an operating system that manages its applications, its
hardware, its network connection, and the resources that are shared on the network
Segment
The portion of the network on either side of two network transmission
devices. These devices include routers, bridges, repeaters, switches, and hubs.
Backbone
A high-speed network link connecting segments. Backbones are used in
large buildings or in networks that span more than one building.
Bus
All nodes are connected to a main communication line (bus)—typically
a coaxial cable that is terminated at both ends. Transmissions from the nodes propagate the length of the medium and are received by all other nodes. In a bus topology, a malfunctioning node doesn’t disrupt the entire network. However, a break in the bus will disconnect hosts from each other.
Ring
Nodes are arranged in a closed loop, with each node connected to a central
device by two wires. The central device is called a multistation access unit (MSAU).
Communication is enabled by passing a token around the ring; if a node has the
token, it can transmit data. Repeaters at each node connection minimize signal
degradation. Adding new nodes can be difficult, however, due to the closed ring.
Star
Nodes are connected via point-to-point links to a central location (a hub or switch). This topology minimizes failure from an individual segment break and
simplifies the adding or moving of nodes. One disadvantage: If the central node fails,
the whole network becomes disconnected.
Mesh
All nodes in the mesh have independent connections to all other nodes in
the mesh. The mesh topology requires computers to have multiple network cards,
and due to its complexity, it’s rarely used.
Hybrid
Two or more different types of network topologies are combined into one
network.
Coaxial
Either a 0.25"-thick cable (Thinnet, RG-58) that carries a signal up to 185 meters and has a 50-ohm
impedance, or a 0.5"-thick cable (Thicknet, RG8 and RG-11)
that carries a signal up to 500 meters.
UTP (unshielded twisted-pair)
A type of twisted-pair wiring
that carries a signal up to 100 meters. UTP cable does not
have an insulating jacket, so it is susceptible to crosstalk.
STP (shielded twisted-pair)
Twisted-pair wiring that carries
a signal up to 100 meters. STP cable has a foil or braided
jacket around the wiring to help reduce crosstalk and prevent
electromagnetic interference.
Fiber optic
A cable that carries light-pulse signals through a glass core at speeds ranging from 100 to 200,000 Mbps.
SMF (single-mode fiber)
Has a core large enough to propagate only one light-pulse signal.
MMF (multi-mode fiber)
Has a core large enough to propagate multiple light-pulse signals.
10-Mbps Ethernet (also called Twisted-Pair Ethernet or Ethernet IEEE 802.3)
Operates at a speed of 10 megabits per second (Mbps).
100-Mbps Ethernet (or Fast Ethernet)
Operates at a speed of 100 Mbps. It can also handle data at 10 Mbps, so devices running at the slower speed can operate on the same network.
1000-Mbps Ethernet (or Gigabit Ethernet)
Operates at a speed of 1000
Mbps (1 gigabit per second). It’s used for large, high-speed LANs and heavy-traffic server connections
10 Gigabit Ethernet (or 10GbE)
The fastest of the current Ethernet
standards, operating at a speed of 10 gigabits per second (Gbps)
BASE-X and BASE-R standards
Run over fiber optic cable
BASE-W standards
Run over fiber optic cables; Ethernet frames are
encapsulated in SONET frames
BASE-T standards
Run over twisted-pair cable, shielded or unshielded
BASE-CX standards
Run over shielded copper twisted-pair cable.
CAT 5
100 Mbps; 100 MHz 155 Mbps ATM
Used for data and voice in Ethernet
networks running at 10 or 100 Mbps.
CAT 5e
1000 Mbps; 200 MHz 155 Mbps ATM Used for data and voice in Fast Ethernet and Gigabit Ethernet
networks.
CAT 6
1000 Mbps; 250 MHz 155 Mbps ATM Used for data in Fast Ethernet and Gigabit Ethernet networks.
Currently the fastest UTP standard.
CAT 6e
10 Gbps; 550 MHz Used in Gigabit Ethernet networks.
CAT 7
10 Gbps; 600 MHz Used for full-motion video and in
government and manufacturing
environments.
RJ-11
A 4-wire connector used in North America to connect telephone equipment.
RJ-45
An 8-pin modular plug that is used to terminate UTP and STP cables. This connector can be used for both Ethernet and Token Ring applications.
USB (Universal Serial Bus)
A universal connector that
provides data transfer rates of up to 480 Mbps (USB 2.0)
Direct cable connection with a null modem cable
A serial cable with RS-232 connectors on either end to
enable direct two-way communication.
IEEE 1394 (FireWire®)
A universal connector that
supports Plug-and-Play installation and hot plugging.
Provides data transfer rates of up to 400 Mbps and is often used for digital audio and video equipment
BNC
A 2-pin connector used to connect coaxial cables.
Its twist-lock mechanism prevents cable disconnections
FC (fiber connector)
A threaded optical connector that
uses a special curved polish on the connector. Good for SMF or MMF.
ST (straight tip)
A frequently used fiber optic connector. It is a keyed, BNC-style connector.
SC (subscriber connector)
An international standard
push-pull fiber optic connector. The SC connector has both
transmit and receive fibers in a single clip.
LC (local connector)
A small-form-factor connector
based on the RJ-45 interface; suited for high-density
applications.
100BASE-TX
Twisted-pair copper: CAT5 or above 100 meters per segment
100BASE-T4
Twisted-pair copper: CAT3 100 meters per segment
100BASE-T2
Twisted-pair copper 100 meters per segment
100BASE-FX
Single- or multi-mode optic fiber 400 meters for half-duplex 2 km for full-duplex over MMF
100BASE-SX
Multi-mode optic fiber 300 meters
100BASE-BX
Single-mode optic fiber 20 km
1000BASE-T
Unshielded twisted-pair: CAT5, CAT5e, or CAT6 100 meters per segment
1000BASE-CX
Balanced copper shielded twisted-pair 25 meters
1000BASE-LX
Single-mode optic fiber 5 km (minimum)
1000BASE-LX10
Single-mode optic fiber 10km
1000BASE-BX10
Single-mode fiber, over single-strand fiber 10km
1000BASE-LH
Single-mode optic fiber 10km
1000BASE-ZX
Single-mode optic fiber 70 km
1000BASE-SX
Multi-mode optic fiber 500 meters
10GBASE-T
Copper twisted-pair: shielded or unshielded 100 meters with CAT6a; up to 55 meters with CAT6
10GBASE-SR
Multi-mode optic fiber 26 or 82 meters, depending
on cable type
10GBASE-SW
Multi-mode optic fiber 300 meters over 50 microns at 2000 MHz/km
with OM3 multi-mode fiber
10GBASE-LR & 10GBASE-LW
Single-mode optic fiber 10 km
10GBASE-ER & 10GBASE-EW
Single-mode optic fiber 40 km
10GBASE-ZR & 10GBASE-ZW
Single-mode optic fiber 80 km
FTP
Ports (20, 21) Supports uploading and downloading files, and
requesting directory listings from remote servers.
SSH
Port (22) Exchanges data between two network nodes over a
secure channel. A secure replacement for Telnet.
Telnet
Port (23) Provides a simple application for remote terminal
emulation.
SMTP
Port (25) Provides a mechanism for the transfer of e-mail information between systems.
DNS
Port (53) Provides a common naming convention throughout
the Internet.
HTTP
Port (80) Provides the framework for exchanging text, images,
sound, and video on the Web.
HTTPS
Port (443) Provides the framework for exchanging text, images,
sound, and video on the Web. HTTPS runs over Secure Sockets Layer (SSL).
POP3
Port (110) Provides a component that receives and holds e-mail for you at your Internet mail server.
SNMP
Port (161) Provides a way to send management information between TCP/IP hosts.
OSI Model
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data Link (MAC / LLC)
1. Physical
TCP/IP Model
4. Application
3. Transport
2. Internet
1. Network Interface
Application Layer
Allows applications to use the network. Handles network
access, flow control, and error recovery.
Presentation Layer
Translates data into a form that’s usable by the Application
layer. Responsible for protocol conversion, data translation
and encryption, and data compression management.
Session Layer
Establishes, maintains, and manages communication sessions
between computers.
Transport Layer
Provides reliable transmission of data segments.
Network Layer
Ensures that information arrives at its intended destination.
Responsible for addressing, transport routes, routing,
packet switching, message handling, and network traffic
management.
Data Link Layer
Deals with the links and mechanisms to move data. Topology (Ethernet or Token Ring) is defined here. Contains two sublayers: MAC and LLC.
Physical Layer
Transmits data over a physical medium. Specifies cabling, cards, and other aspects of establishing a physical link between computers.
IPV4
These 32-bit addresses are written as four octets or bytes, separated by periods as follows: 208.206.88.56.
Class A
1.0.0.0 - 126.0.0.0 Default subnet mask = 255.0.0.0, Opening Bits = 0
Class B
128.0.0.0 - 191.255.0.0 Default subnet mask = 255.255.0.0, Opening Bits = 10
Class C
192.0.0.0 - 223.255.255.0 Default subnet mask = 255.255.255.0, Opening Bits = 110
Class D
224.0.0.0 - 239.0.0.0 Opening Bits = 1110
Class E
240.0.0.0 - 255.0.0.0 Opening Bits = 1111
IPV6
These 128-bit address are written as eight bytes, separated by colons as follows: "0:0:0:0:128:34:52:7"
Link-local
Similar to IPv4’s APIPA. Link-local addresses are self
assigned, using the Neighbor Discovery process. Link-local addresses start with fe80::.
Site-Local
Similar to an IPv4 private address. Site-local addresses begin with FE and use C to F for the third hexadecimal digit.
Global unicast
Similar to an IPv4 public address. A global unicast
address is identified for a single interface. Global unicast addresses are routable and reachable on the IPv6 Internet. All IPv6 addresses that
start with the binary values 001 (2000::/3) through 111 (E000::/3) are global addresses, except for FF00::/8, which are reserved for multicasts.
Multicast
An address that identifies a multicast group. As with IPv4,
an IPv6 multicast sends information or services to all members of a multicast group. If the first 16 bits of an IPv6 address are ff00n, it’s a
multicast address.
Anycast
A new type of address in IPv6. Anycast addresses identify
a group of interfaces, typically on separate nodes. Packets sent to an anycast address are delivered to the nearest interface as identified by the
routing protocol’s distance measurement.
Application Layer (TCP/IP model)
Combines (Session, Presentation, and Application) from OSI model
Protocols= SMTP, FTP, Telnet, SNMP, DNS, and NFS
Transport Layer (TCP/IP model)
Transport layer from OSI Model, Protocols =TCP and UDP
Internet Layer (TCP/IP model)
Network layer from OSI Model, Protocols = IP and ICMP
Network Interface (TCP/IP model)
Physical and Data layers from OSI Model, Protocols = Link 802.3, 802.5, 802.11, 802.15, coaxial, and fiber optic
TCP (Transmission Control Protocol) TCP provides guaranteed delivery,
proper sequencing, and data integrity checks.
Runs at the Transport layer and
provides connection-oriented services.
UDP (User Datagram Protocol)
Runs at the Transport layer and provides connectionless, unacknowledged communications.
IP (Internet Protocol)
Runs at the OSI Network or TCP/IP Internet layer and provides connectionless services. IP provides packet routing and delivery between computer systems, without guaranteeing proper sequencing or even arrival at the destination.
Dynamic Host Configuration Protocol (DHCP) A computer configured to obtain its IP configuration through DHCP or DHCPv6 will contact a DHCP or DHCPv6 server on the local network and get the needed information from it.
An automated mechanism
for assigning IP addresses to clients.
Wireless LAN (WLAN)
Technology that uses radio waves or infrared light instead
of cables to connect network nodes. Connections are made with a wireless
NIC, which includes an antenna to send and receive signals. Wireless
devices can communicate directly (for example, via an infrared connection),
or they can connect to a LAN by way of a wireless access point (WAP).
802.11a
Up to 54 Mbps at 5 GHz Up to 35 meters
802.11b
Up to 11 Mbps at 2.4 GHz Up to 35 meters
802.11g
20+ Mbps at 2.4 GHz Up to 35 meters
802.11n
Up to 300 Mbps at either 5 GHz or
2.4 GHz Up to 70 meters
Wi-Fi (Wireless Fidelity)
The most widely used wireless technology at present. IEEE wireless standards 802.11b and 802.11g
802.11a
An improved version of the original Wi-Fi technology, based
on the same IEEE 802 standard.
Bluetooth
A short-range wireless technology. Its limited transmission distance (10 meters) generally confines it to connecting nodes in a single
room or adjacent rooms. Newer devices have a higher transmitting power that increases the range to 100 meters.
WiMAX (IEEE 802.16 Air Interface Standard)
A point-to-multipoint broadband wireless access standard. It’s an emerging wireless connection standard for long distances.
WEP (Wired Equivalent Privacy)
A security protocol for wireless LANs specified by 802.11. WEP uses encryption to protect the vulnerable link between clients and access points.
WPA (Wi-Fi Protected Access) WPA also adds a strong message-integrity check and allows for authentication using 802.1X.
A specification that replaces WEP’s keying mechanism with a more robust system called Temporal Key Integrity Protocol.
WPA2, WPA2 uses the Advanced Encryption System (AES) cipher for stronger encryption.
A specification that builds on WPA by adding more features from the 802.11i standard. Notably,
802.11i
An authentication standard for wired and wireless LANs, used
to identify users before allowing their traffic onto the network. It can be used in wireless environments to authenticate users for more secure
WEP, Wi-Fi Protected Access, or 802.11i deployments.
A firewall
hardware or software that controls traffic between networks,
typically between a public network and a private internal network. They examine the contents of network traffic and permit or block transmission
based on rules
Packet filter
A mechanism for filtering out datagrams that don’t meet
specified security criteria as the datagrams pass through a router.
Bastion host
A heavily fortified network server through which all external traffic must pass.
Proxy server
A server that protects the IP addresses of internal hosts
by presenting its own IP address to external sites instead.
Extranet, Internet, or public network
A network area that sits
unprotected in front of a firewall.
Intranet or private network
A network area behind a firewall.
DMZ
A network area between the private network (intranet) and a public network (extranet).
Intrusion detection systems (IDSs)
monitoring devices that help you
identify attacks in progress and conduct forensic analysis after an attack.
Network intrusion detection system (NIDS)
Uses dedicated network
devices or servers (sensors) to monitor traffic volumes on one or more network segments or a network entry point, such as a firewall.
Host intrusion detection system (HIDS)
Uses software agents to detect
and track computer-related activity. A HIDS monitors operating system files for unauthorized changes and watches for unusual usage patterns or failed logon requests. Host-based IDS solutions don’t scale well across
enterprises with a large number of computers.
Intrusion prevention system (IPS)
takes the IDS functions one step
further. It can actually shut down suspicious traffic by terminating the network connection or user session or by blocking access to the targeted host, service, or application.
VPN, VPNs typically use Internet
Protocol Security (IPsec) for encrypting data traveling across a public network.
Uses a public infrastructure to provide remote offices or users
with secure access to the company’s network.
Transport encryption
The underlying data in a packet is encrypted and placed within a new packet on the public network.
Tunnel encryption
The entire packet, including its header, is encrypted and then placed in the public network’s packet.
Repeater
Device that Boosts the electronic signal from one network
cable segment and passes it to another. Operates on the Physical layer.
Hub
Device that Takes the signal transmitted from one computer and propagates it to all other computers on the network.
Operates on the Physical Layer
Wireless access point (WAP)
Device that Acts as a central transmitter and receiver of
WLAN radio signals; allows WLANs to join a wired network. Operates on the Physical Layer
Multistation access unit (MSAU)
Device that Connects the nodes in a Token Ring network. Each node is connected to the MSAU by two wires. Communication is enabled by passing a token around the ring to each node—if a node has the token, it can transmit data. Operates on the Physical Layer
Network interface card (NIC)
Device that Provides a communication channel between your computer’s motherboard and the network. Operates on the Data Link
Bridge
Device that Connects two LANs and makes them appear to be one; or segments a larger LAN into two
smaller pieces. Operates on the
Data Link layer
Switch
Device that Takes an incoming packet of data, looks inside
at the destination hardware address, and then sends the packet out the port that’s connected to the destination machine. Operates on the Data Link layer
Multilayer switch
Device that Combines data switching with routing by
using an application-specific integrated circuit (ASIC). Some switches can implement data
switching up to the Application layer.Operates on the Data Link layer up to Application
Brouter
Device that acts as a router for routable protocols, and as a bridge for non-routable protocols Operates on the. Data Link and Network
Router
Device that connects two networks and determines the
best path for forwarding data packets from one network to the next.Operates on the Network Interface
Gateway
Device that provides links between mixed environments
(such as PC-based LANs) and host
environments (such as SNAs). Operates on any layer
Dial-up networking (DUN)
Up to 53 Kbps Uses a modem to make connections through regular, analog phone lines
Digital Subscriber Line (DSL)
Up to 1.5 Mbps Uses a digital modem to make highspeed
connections through regular,
analog phone lines.
Cable
512 Kbps to 5 Mbps Uses a cable modem to make connections, using the same lines that carry cable television signals.
Satellite
Up to 1.5 Mbps Uses a dish to make connections by sending and receiving signals from satellites in orbit around the earth.
Wireless
Up to 10 Mbps Uses signals sent over radio waves to transmit data between devices.
Cellular
Faster than dial-up, but
slower than DSL or cable
Uses an Internet-capable device with a cellular network PC card to connect to the Internet by using one of the following connection technologies: EDGE, EVDO, or HSDPA.
T1
1.544 Mbps Provides digital communications through a dedicated leased line provided through a common carrier.
Network access point (NAP)
A major Internet connection point that’s used to connect and route
traffic between smaller commercial backbones.
Internet service provider (ISP)
a business that provides connectivity to the Internet.
Demarcation point (demarc)
The point at which the communications network
owned by one company connects to the communications network owned by another company. For most companies, the _____ is the point at which their network connects to the cabling owned by the ISP.
Demarc terminating device
The device, located at the demarc, that handles code and protocol conversions. It also handles the buffering
required for communications between an ISP and your internal network
Demarc extension
Cabling and a port; needed if the demarc isn’t in the same location as the main cross-connect. The extension is typically installed by the ISP.
Main cross-connect
The location where signals are distributed from the internal network to the demarc.
Main distribution frame (MDF
A network rack that holds the devices used to manage the connections between external communication cables and the cables of your internal network.
Intermediate cross-connects
Cross-connects on each floor that are connected to the main cross-connect through network backbone cabling. They are sometimes called vertical cabling.
Intermediate distribution frames (IDFs)
Network racks that hold the
devices connecting each floor’s internal wiring to the MDF.
Workstation drops
Horizontal cables that are run—without splice
points, cable junctures, or taps—from the telecommunications room on
each floor to each individual workstation.
Horizontal cross-connect
The junction point for the workstation cables on each floor.
Direct patch panel termination
Terminates wiring directly into a patch panel. Most often found in Cat 5e or Cat 6 installations.
Punchdown termination with cross-connect wiring
Uses a punchdown block to terminate station cables and cross-connect the cables to other punchdown locations.
110 block
Has two components. A 110 wiring block holds wires in place, and a 110C connecting block electronically terminates cables.
66M block
Terminates a 25-pair phone trunk cable in a wiring closet; then individual 4-pair wires go from there to the user’s desk.
Tracert
Determine the route that a packet took to reach its destination.
Ping
Verify connections to a remote host, or test the local TCP/IP
installation if the loopback address is used. Works by sending ICMP echo packets
Arp
Gather hardware addresses of local hosts and the default
gateway.
Netstat
Display protocol statistics and get information about TCP/IP
connections.
Nbstat
Display statistics and connections for NetBIOS over TCP/IP, including DNS and WINS name resolution, local cache lookup, and LMHOSTS and HOSTS file information.
Ipconfig
Display IP addressing information for the local network
adapter(s) or a specified NIC.
Nslookup
Query a name server and find out which name resolves to
which IP address.
Getmac
Display the NIC’s MAC address (new in Windows XP).
Cable stripper
Remove the outer insulation from network cables and
expose the wires inside them.
Snips
Cut or trim cables.
Punchdown tool
Connect wires to a punchdown block.
Crimper
Attach a connector to a network cable. It comes in varieties for RJ-11, RJ-45, and coaxial cable.
Butt set
Test and verify telephone lines.
Time-domain
reflectometer (TDR)
Locate problems or breaks in metallic wires, such as
coaxial cable and twisted-pair network cables.
Optical time-domain
reflectometer (OTDR)
Locate faults in optical fiber.
Certifier
Test and verify network cable speeds by sending data
packets across the network.
Temperature monitor
Monitor temperature in various environments,
especially in rooms that contain networking devices.
Voltage event recorder
Measure electrical properties to determine the level
and quality of the power supply.
Network analyzer
Identify problems with cabling, jacks, network cards,
hubs, and TCP/IP. Network analyzers are portable
devices.
Denial of Service (DoS) attack
An attack that consumes or disables resources in order to interrupt services to legitimate users.
Viruses
Malicious software that spreads from system to system by
attaching itself to data or other files.
Worms
Malicious software that exploits networking vulnerabilities with
the intent of propagating itself.
Man-in-the-middle attack
An attack in which the attacker listens in on a session between two communicating hosts. Wireless systems are very vulnerable to this type of attack.
Smurf attack
A non-OS-specific attack that uses a third party’s network segment to overwhelm a host with a flood of Internet Control Message Protocol (ICMP) packets.
Phishing
The act of impersonating a trusted sender in an attempt to
obtain the recipient’s logon information and other confidential data.
Social engineering
The act of exploiting someone’s trust in order to get information that the attacker can then use to gain access to a computer system.
Authentication
The positive identification of a person or system seeking
access to secured information or services.
User name
A unique identifier used to identify someone to a computer or network system during login
Password
A secret combination of keystrokes that authenticates a user
to the computer or network.
Biometric identification
Authentication based on an individual’s physical characteristics, such as fingerprints or retinal patterns
Security token
An authentication device assigned to a specific user.
CHAP (Challenge Handshake Authentication Protocol)
Used by PPP servers to validate the identity of the remote client at the beginning of or during a communication session
RADIUS (Remote Dial-In User Services)
Authenticates dial-in users,
authorizes their access, and enables remote servers to communicate with a central server.
Kerberos
Provides strong authentication for client/server applications
by using secret-key ryptography. Uses Symmetric-key encryption to pass a user’s credentials over unsecured channels and validate the user for network resources.