• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/183

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

183 Cards in this Set

  • Front
  • Back

OSI Layer 1

Physical Layer that deals with hardware cables, NICs, Hubs

OSI Layer 2

Data Link layer
-Has 2 sublayers LLC (Logical Link control) and -MAC (Media Access Control)


-Data is called a frame


-Addressing/Forwarding done by MAC Address


-CRC (Cyclic Redundancy Check) helps the receiving device ID any errors in transmission

OSI Layer 3

Network Layer


-Routing is done on this layer


-Addressing/Forwarding done by IP Address


-Data is called a packet


-Fragments data into smaller pieces

OSI Layer 4

Transport Layer


-Deals with how data delivered through the network.


-Segmentation of large files to smaller files


-Data is called segments


-TCP and UDP protocols happen here

OSI Layer 5

Session Layer


-Makes a session between 2 devices.


-Each session layer uses a ID for each unique session. This keeps data streams separate.


-Is responsible for terminating a session after a certain amount of time.

OSI Layer 6

Physical Layer


-Deals with syntax, encryption and compression (SSL/TLS).


-Deals with character encoding



OSI Layer 7

Application Layer


-Integrates network services with the OS.


-This is what we see


-This layer provides a interface between the application and the rest of the network


-Some of the protocols on this layers are HTTP, TELENET, FTP, TFTP, SMTP,etc.



Class A B and C Private IP addresses

-Class A private IP 10.0.0.0-10.255.255.255




-Class B private IP 172.16.0.0-172.31.255.255




-Class C private IP 192.168.0.0-192.168.255.255

APIPA
-A feature in windows that gives a PC a IP address when the DHCP server is down.
-It is a link-local address
-The APIPA range is 169.254.0.0-169.254.255.254
-This address can't be routed out to the internet.
Multicast
-IDs a logical group of PCs. A single message can be sent to a group.

-Stock exchanges use multicast
Unicasting
-Is when a host sends out a message to a specific device.

Broadcast

-A device sends out one message to all devices on a network or subnet.

-Can't specify which devices get the message

-Routers don't foward broadcasts.

EIGRP

-Uses IGP and bandwidth and delay metric.


-It is a hybrid routing protocol. It uses distance vector with improvements which can act like a link state.


-Uses multiple routing metrics


-It avoids looping


-Uses Diffusing Update Algorithm (Dual) to try and find the best path for traffic


-Uses RTP (Reliable Transport Protocol) to talk to other routers


-Uses VLSM


-Use for medium to large networks


-Used by Cisco

OSPF

-Open Shorted Path first uses IGP uses the link cost metric.


-It uses link state method and supports VLSM


-It is design to support larger networks


-The network is divided into areas and those areas can have different subnets.


-All the areas need to be connected to a backbone area called Area 0


-All routers within a area share routes within that area and they're called internal routers. -Routers that sit on the edge of an area are called area border routers share info between areas.


-Autonomous system border routers communicate to outside the AS.


-Is a dynamic routing protocol


-Use for large networks

RIP

-Is a igp that uses HOP count metric.


-It can only hop 15 times


-It uses distance vector protocol and doesn't use VLSM


-RIPv2 is like RIP but uses VLSM


-A dynamic protocol


-For small networks

Distance Vector

-Distance Vector is a routing method that has every router share its entire routing able with its immediate neighbors.
-Communication method used is called HOP
-A characteristic is that the entire routing table is shared at every update interval
-It is simpler and uses less processing power-Best used for small networks

Link state method

-Shares information with other routers in order to determine the best path.


-Has routers only share info about their own directly connected networks.


-Routers share info using special messages called link state advertisements (LSA) and link state packets (LSP).


-When a router receives a LSA/LSP it records and forwards info to other routers this is flooding.


-When convergence is reached, routers only share info about changes not all known networks at every update.


-Updates are shared between routers.


-Uses less network traffic for sending routing info, converges faster and is less prone to errors.


-Best used in larger networks or sharing routes over WANs

Hybrid

-Combines both distance vector and link state. It shares full routing table at start up, but has partial updates when changes occur.

-Reduces negative effects of distance vector while having benefits of a link state.

-Updates are slower than Link state.

Static Routing

-Manually Set


- Use static routing to define a default route.


-The default route is like the default gateway on a PC. It IDs a router that is used to forward packets to networks that don't appear in the routing table


-The default route address is 0.0.0.0 with a mask of 0.0.0.0

Dynamic Routing
-It is automatic routing, so no configuring
-If a router goes down or part of the network goes down, the routers will automatically update the routes
-With dynamic routing, the router learns the private network , it won't learn the routes on the internet nor will it share the private info with the internet.
Routing Metric
-Metric is a value assigned to the network that indicates the distance to cost to the remote network.

-It is used to ID the best route to take to a destination when there are multiple routes.

-Lower metric shows a more preferred route.

Link cost

-Is a routing metric that uses a relative number that goes by the cost of using a route.




-Relative value is assign every link with a value based on various number of ideas like actual dollar amount of using a link.

Bandwidth/Delay

-Is a routing metric that uses relative value to assign bandwidth speed. Lower the value, faster the speed. The route with the lower value would be use.

Hop Count

-Is a routing metric that uses the number of routers used to get to the destination network. The route with least routers will be used
MTU
-Maximum Transmission Unit is a routing method that uses the metric of how big the packets can do through the network without fragmentation.

-Bigger packets are better

Spanning Tree Protocol (STP)

-Provides multiple paths between switches in a network.
-It also turns off redundant links to prevent a switching loop so there is only 1 path between switches. It does this by blocking ports.
-If a link ever goes down, then the blocking ports near the failed link would become forwarding ports.
-Spanning tree adds fault tolerance.

VLAN (Virtual LAN)

-These are logical groups of PCs on a switch port.
-You can ID the port with a VLAN ID (Port 1 can be VLAN 1).
-Devices on a single VLAN can talk to each other.
-Devices can't talk to devices on a different VLAN.
-You can move devices from one VLAN to another by changing the association of the port.
-801.2q IEEE standard

Port Mirroring

-All traffic on the switch will inbound and outbound traffic will be monitor.
Collision domains
-Collision domains are all devices that have a chance of colliding with signals sent from other devices.
Broadcast domains
-Broadcast domain IDs all devices that will see a broadcast packet.
IGP (Interior Gateway Protocol)
-A routing protocol that is used within a Autonomous System (AS). You use this in a private business network to share routes between routers.
EGP (Exterior Gateway Protocol)
-EGP (Exterior Gateway Protocol) is a routing protocol used to share routing info between Autonomous Systems (AS).

-This goes out to the internet
Routing table
-Contain addresses for known networks and the next router in the path used to the destination network.
Convergence
-Convergence is when each router knows the network.

TCP

-It's connection oriented. It cares if all the data is sent correctly. TCP will try to find errors and try to see if data was sent and received.





UDP

-UDP is connection-less oriented. It only cares about making the most efficient use of the network. It doesn't care if the data gets to its destination or some data loss is ok.


-UDP is also faster than TCP.


-UDP is often used for video streaming.

HTTP

-Port 80


-(Hypertext transfer protocol) is how a website exchanges HTML documents


-It IDs the browser used and makes a request to the website and that site formats the data and returns it to the browser so that the displays the information.


-Browsers and servers use HTTP to exchange small fileslike Web pages.


-HTTP can be described as a info requesting and responding protocol.

HTTPS

-Port443


-It's HTTP but with SSL (Secure Socket Layer).


-SSL protects data by encrypting it as it travels online by using RSA


-SSL is usually used to enter credit card info-HTTP/S basically define how sites send info

TLS

-(Transport Layer Security) is another way to encrypt online data transfer


-TSL is a improvement over SSL and includes other functionality


-Uses TSL Record to connect securely with encryption and uses TLS Handshake to have mutual authentication and choice of encryption method


-TLS like SSL are often used with other protocols.

FTP and TFTP

-Port 20 and 21


-TFTP uses UDP port 69


-FTP (File transfer protocol) and TFTP are file transfer protocols. These are used to transfer large documents or data.


-FTP uses TCP to transfer data.


-TFTP uses UDP

SFTP and SCP

*SFTP (Secure File Transfer protocol) and SCP ((Secure Copy Protocol)(used with Linix/Unix)) are used to encrypt data and provide user authentication for FTP protocols. They use SSH to provide security.

SMTP

-Port 25


-Used to send email via mail servers.


-Could be used to receive mail.

POP3
-Port 110
-Another protocol to receive email. It downloads the email to the PC and saved.
-You can read said email even if you're not connected to the internet.
-POP usually deletes the downloaded email on the server.
-Is not secured
-Think of P in Pop is like having physical mail
IMAP4
-Port 143
-A protocol to receive email. Unlike POP, the email stays on the server when you download it.
-Is secured
NTP

-UDP Port 123
-(Network Time protocol) allows devices to synchronized their clocks through a network.
-NTP accounts for lag between devices to sync the times correctly
NNTP
-Port 119
-It's like NTP but for news groups and reading news messages online
LDAP
-(Lightweight Directory Access Protocol allows for the searching and updating of a directory service).
-Follows a client/server model.
-This server has directory data and the LDAP client requests a directory service
SNMP
-Port 161
-(Simple Network Management Protocol) is a protocol where you can have a central PC (Manager) and communicate with other devices (Agents) on the network to find info on those devices
-You can give commands with SNMP to the other devices like tell them to turn on or off or just monitor the devices.-SNMP enables communication and also transfer of info from those other PCs
SSH
-(Secure Shell Protocol) is like Telenet but with security. It uses RSA public key for both connection and authentication
TELENET
-Allows you to connect another PC remotely so you can manage the device.
-Unsecured


ICMP
(Internet Control Message Protocol) checks the status of devices on the network (is it on, it is available, check the connectivity between both devices or inform if there are problems).

-PING uses ICMP to test connectivity between devices.
IGMP
(Internet Group Message Protocol) allows you to send a single message to a group of devices throughout the network.

-IGMP doesn't send separate messages, but the single message is replicated to multiple devices
VoIP
(Voice over IP) is a protocol that sends voice data over IP packet network.
-Analog telephones need a special converter box to convert analog to digital.
-A digital phone just connects to the network with special switches that have PoE (power of ethernet) to power phone.
- RTP (real time protocol) contains the data stream that is the actual phone call.
-H.323, SIP (session initiation protocol) or media gateway protocol are used to set up, maintain and end calls. These help control info to get one location to another.
SNMPv3
-Added 3 security measures to SNMP, authentication, encryption and message integrity.
SNMPv2
-Is very similar to SNMPv1
-GetBulkRequest for retrieving a bulk of data at once.
RTP
-(Real time protocol) contains the data stream that is the actual phone call in VoIP.
SIP
-(Session initiation protocol) is used for setting up, maintaining and terminating phone calls in VoIP.

-Help control info to get one location to another.
Hop count
-Hop count is the number of routers or nodes used to get to the destination network. The route with least routers will be used
Bandwidth/Delay
-Bandwidth/Delay use relative value to assign bandwidth speed. Lower the value, faster the speed. The route with the lower value would be use.
Link cost
-Link cost uses a relative number that goes by the cost of using a route.

-Lower the cost, the better.

-A example would be one link costing more money to use than another link.

Latency (Routing Metric)

-Latency is the time for one packet to get from one place to another.

Relative value
-Relative value is assign every link with a value based on various number of ideas like actual dollar amount of using a link.
Next hop
-Next hop in routing is the next closest router that a packet can gothrough.

HOPS

-To avoid packet looping IPV4 uses called "Time to Live" and IPV6 uses "Hop count".


-A packet can hop a number of times til it reaches 0 til it's dropped.

Routing tables
-Routing tables contain addresses for known networks and the next router in the path used to the destination network.
ARP
-ARP (Address resolution protocol) is used to associate IP address with a particular MAC address.
-MAC address to IP address
-Every host makes its own ARP table.
-ARP -a shows the hosts entire ARP table which is useful to troubleshoot communication problem.
-ARP-s allows you to add a address
-ARP-d allows you to delete a address
Dynamic DNS
-Dynamic DNS uses the DHCP server to auto populate the DNS server with updated host records whenever it hands out a IP address.
-Basically the DNS is updated by the DHCP so that the host name matches the new IP address that the DHCP handed out.

DNS Records

-An "a" record aka host record IDs the host name and IP (IPV4) address.
-An AAAA record IDs the host name and IP (IPV6)
-MX records IDs servers that can be used to deliver e-mail
-CNAME record provides alternate names to hosts that already have a host record
-PTR (Pointer) record IDs the IP address with the corresponding host name.

DNS

-Hierarchical


-Root is represented by a period


-After the root you have top level domains (.com, .net, .gov, etc)


-Below top level domains, you have domains that are given to companies (google, microsolf, apple, etc)


-A domain namespace is a number of domains that are maintain by a company


-At the very end, you have actual host names like server 1 and 2 or www


-When you start from the host name and go to the root, it is called FQDN (Fully Qualified Domain Name) and is separated by periods.-Zones are a area in the domain name space (microsoft, apple, etc) that are under the control of a server or on a server. Zones can have multiple domains.


-Root DNS servers that keep track of everything within the root domain which includes the IP addresses of servers at various levels.-At the .com domain you have DNS servers that has info about subdomains within that domain.


-Authoritative DNS servers has a full and complete back up of all records for a particular domain.


-Before DNS, there were host files to resolved host names from IP addresses and there were on PCs.


-Forward look up is when the host name is known and returns a IP address


-Reverse look up is when the IP address is known and returns the host name.



Virtual Desktops

-With Virtualization, A PC can run Windows 7 ,Windows Server 2008 andRed Hat Enterprise Linux at the sametime


-Useful to test multiple apps on multiple platforms


-The virtual desktop is often called a virtual desktop interface (VDI) andthat term encompasses the software and hardware needed to create the virtualenvironment.

-Users can use the Virtual deskstop from a low end PC


Virtual Servers
-With a virtual server you can shrink the amount of physical servers you need.
-You can have multiple virtual servers on one machine. So you can have one physical machine handle many different services.
Virtual Switches

-Work basically the same as physical switches, but in virtual enviroment

Virtual PBX
-Virtual PBXA virtual private branch exchange (PBX) is a phone system that handles suchfeatures as call routing, voicemail, faxing, and so on.

NAT
-NAT (Network Address Translation) allows single PC to use a different IP when out in a public network.
-Is used by the network router that interfaces between the LAN and the internet or public network.
-The Nat router private interface will have a private ip and the public interface will have a public ip
-NAT routers hides a private network.

PAT

-PAT (Port Address Translation) allows you to use a single IP address for your entire network.
Static NAT
-Static NAT allows a private host to be accessible through the NAT router. So a host could map its private IP to a public IP through the NAT. It static NAT is set up, dynamic NAT doesn't work.

Network configurations

Both sides need to match in a Ethernet network


-This is what you can configure on the host


-Duplex Half or Full


-Port speeds 10,100, 1000 Auto


-IP Address


-MAC Address


-Go to Network and Sharing > Change adapter settings>configure.

PoE

-Power over Ethernet is providing power over the Ethernet


-Special switches are needed to do PoE


-Devices like VoIP phones use PoE to power them

Traffic Filtering

-Can be done on most routers


-URL filtering blocks websites


-Port filtering blocks based on Port Numbers


-You can filter based on schedule. So you can filter traffic on a certain hour or day.

VTP

-Virtual Trunking Protocol ACisco proprietary protocol thatmanages the addition, deletion, andrenaming of VLANs for the entirenetwork. -Information about changesto a VLAN or the addition of a newVLAN to a network is distributed toall switches on the network simultaneouslyand does not need to bedone one at a time

Multimode
-Multimode cabling uses multiple rays of light.-Each light (mode or ray) is transmitted at slightly different frequency. This splits the fiber optic channel up and allows for multiple signals to be sent
-The cable is 50-100 microns thick
-These multiple lights can bounce causing a slower transfer rate and shorter distance cable (500 meters or less).
Single Mode
Single Mode cabling transfers data using a single ray of light (mode)
-The core is only 10 microns
-This cabling can transfer large amounts of data at very long distances (between cities or different parts of a geographic location in KM)
CAT 3
-CAT 3 was made to be used for 10mb Ethernet or 16mb token ring
-10BaseT is 10Mb
-100m distance

CAT5

-100BaseTX is 100Mb


-1000BaseT is 1000Mb


-100m distance

CAT 6

-10GBaseT is 10Gb


-1000BaseT is 1Gb


-55m distance (10GbaseT)


-100m distance (1000BaseT)


-CAT 6 supports very fast, high bandwidth, broadband communications. Supports 10gb Ethernet and includes a solid plastic core that keeps the twisted pairs separate. The core also prevents the cable from being bent too tightly.

1000BaseCX

-1000BaseCX is 1000Mb. This has a shorter distance of 26m and is used for wiring closets


-It is shielded copper wire

CAT 5E

-CAT 5E is similar to CAT 5 but offers more protection from EMI and supports 1gb Ethernet and 10gb Ethernet.


-10GBaseT is 10Gb


-100m



RG Coaxial Standards

-RG-58 was used a lot in PC networking. The central conductor had copper coated in tin and had 50ohms of resistance.
-RG-59 was used mainly for cable tv. It has a copper plated steel central conductor. It has 75ohmns of resistance which makes it bad for Ethernet networking.
-RG-6 is used mainly for satellite tv. The central conductor uses a solid copper and is also 75ohmns if resistance. RG-6 is used also cable networkingand TV
-RG-8 is for 10Base5 Ethernet networking and has 50ohmns of resistance

Coaxial

-Used in bus topology and not really in ring or star


-Called coaxial cause it uses two conductors within a single cable and both share these conductors share a common access.


-In the center of the wire is the inner conductor that is usually made of copper or copper coated in tin and conducts data signals. It is surrounded by pvc/plastic layer.There is a copper mesh that is the ground that is around this inner pvc/plastic insulator that is made from aluminum, but can be made of copper coated with tin. Everything is encased by the outer pvc/plastic sheath.


-It resists EMI and physical durable


-It is costly to install and not flexable.

Crossover cable

-Crossover cable is like a straight through cable but the transmit and receive wires are crossed over.


-One end will have T568A and the other will have T568B and visa versa


-Used to connect to other hosts.


-Connect to like devices

T1 crossover Cable
-A T1 crossover cable you use
Pin 1 to Pin 4
Pin 2 to Pin 3
Pin 3 to Pin 2
Pin 4 to Pin 1
Straight through cable
-Straight through cables have the same wiring at each end.
-Both ends will be either T568A or T568B
-Can't transmit and recieve data with other hosts
-Connect like devices
Plenum cable
-Plenum cable is fire resistant and non-toxic and must be used when running wiring above ceiling tiles

Media Converter

Media Converter can covert one media type (cables) to another.


-They are a layer one (physical) device


-They can't covert to a different network standard like WAN (wireless)


-They transform a electrical signal from one encoding scheme to another

Cat6a

-10GBaseT is 10Gb


-100m distance (10GbaseT)



10BaseFL Fiber

-Multimode


-Distance:1000-2000m


100BaseFX Fiber

-Multimode


-Distance:412m-2000m

1000BaseSX Fiber

-Multimode


-Distance 220-550m

1000BaseLX Fiber

-Multimode Distance: - 500m


-Single Mode Distance: 5km

10GBaseSR/SW

+10GBaseSR/SW Distance:300m


-Look at letters as S=Short L=Long E=Extra Long


-With 10GBase with a W, it uses SONET. SONET is a WAN tech that uses fiber optics to multiplex signals across one wire.

+10GBaseLR/LW

-10GBaseLR/LW Distance:10km


-Look at letters as S=Short L=Long E=Extra Long


-With 10GBase with a W, it uses SONET. SONET is a WAN tech that uses fiber optics to multiplex signals across one wire.

10GBaseER/EW

-10GBaseER/EW Distance:40km
-Look at letters as S=Short L=Long E=Extra Long
*With 10GBase with a W, it uses SONET. SONET is a WAN tech that uses fiber optics to multiplex signals across one wire.
Broadband Over Power Line
-Broadband Over Power Line (BPL) is highspeed data transmissions over public elertical power lines.
-A BPL modem Is used to get internet access.
-To run over powerlines, just multiplex the signal.
-It doesn't have very good data transfer 2-3Mbps)
-A problem with BPL is that a transformer filters out high frequencies and data transfer at high frequencies. To get around this a repeater needs to be installed in the transformer. There are a ton of transformers in the US, but not a lot in Europe.
-Another problem is that power lines are unshielded. It emit and absorb electrical signals. BPL runs around the same frequency as amateur shortwave radios. These radios will corrupt the internet signal and/or cause a interfence to the radio.

LC Connector

MTRJ connector

ST Connector

SC Connector

BNC Connector

110 Block

802.11A

-802.11A uses 5.75ghz with a transfer speed of 54Mbs with a distance of 150ft
-Dynamic Frequency Selection (DFS) avoids interference with weather radar and military satellites.
-Orthogonal Frequency Division Multiplexing (OFDM) transmits multiple data streams over a given bandwidth
-23 non overlapping channels

802.11B

-802.11B uses 2.4ghz with a transfer speed of 11Mbs with a distance 300ft


-Uses Direct sequence spread spectrum (DSSS) for communications


-Data is chipped and transmitted through different sequences


-14 channels

802.11G

-802.11G uses 2.4ghz with a transfer speed of 54Mbs with a distance of 300ft


-Orthogonal Frequency Division Multiplexing (OFDM) transmits multiple data streams over a given bandwidth


-Has 20 channels and 1, 5, 9, 13 are non overlapping


-Uses Direct sequence spread spectrum (DSSS) at slower speeds

802.11N
-802.11N uses 5.75ghz and 2.4ghz with a transfer speed of 600Mbs(theoretical actually speed is 100-500Mbs) with a distance of 1200ft. Farther away slower the speed.
-Dynamic Frequency Selection (DFS) avoids interference with weather radar and military satellites.-Orthogonal Frequency Division Multiplexing (OFDM) transmits multiple data streams over a given bandwidth-23 non overlapping channels
-Channel 3 and 11 use OFDM
Channel Bonding
Channel Bonding is when you combine 2 channels to more than double the transmission speed.
-For 2.4ghz you can only use non-overlapping channels to bond. You can only have 1 bonded channel.
-For 5.75ghz, you can have 6 bonded non overlapping channels.
Channels
-A channel is a portion of a frequency range. By dividing the frequency range into channels, you can have multiple devices in separate wireless networks transmitting at the same time, in a similar location.
-The range is divided into 11 channels in b and g. Due to channels being different, the devices can communicate within their own wireless network and allows them to keep track which is which.
-With these channels, you can have overlap which can cause interference. The channels are broad ranges. Channels that don't overlap are 1, 6, 11.
-A standard has 23 channels and 12 channels that don't overlap.
MIMO
-MIMO (Multiple Input, Multiple Output) is a technology that increases the distance and speed for 802.11N.
-Adds additional transmit and receive radios to your WAP.
-Antennas can be used to simultaneously send the same data or even different data.-With N you can have up to 4 radios transmit and receive. You can configure a 4x2 where you can have 4 radios send and 2 receive.
-For the fastest speeds,you can have 4 radios send the same data and this also increases the range.
-You can configure some radios to transmit on one standard and other radios on a different standard. So you can have N devices connect to the N radios and A devices connect to the A antenna and they will only slow the devices connected on the A standard.
-If you configure a N device in compatibility mode, the the N device will not use the N standard if one device isn't using N.
T1 line
-A T1 line is made of 24 multiplex channels so it can send and receive 24 multiplex channels at a time.
-Each channel can transfer data up to 64Kbps which is 1.544Mbs with all the channels added.
-Same bandwidth uploading and downloading.
-T1 can also use coaxial, fiber optic and satellite.
-T1 and T3 requires a connection to a CSU/DSU unit.

T3 Line
-T3 is like the T1 but it has many more channels. It has 672 T1 channels called a DS3 signal.
-T3 can use fiber optic
-It provides a bandwidth of 44.736Mbps.
-T1 and T3 requires a connection to a CSU/DSU unit.
E-Carrier system
-E-Carrier system is used by Europe and other places around the world compared to the T-Carrier system which is mainly used in the US and a handful of other countries. The E-Carrier system uses E1 and E3.
E1 Line
-E1 uses 32 channels that transfer up to 64Kbps which is a total of 2.047 Mbps.
E3 Line
-E3 uses 16 E1 signals (2.047Mbps) which provide a transfer rate up to 34.368Mbps.
Optical Carrier specifications
-OC-1 has a transfer rate of 51.84Mbps.
This is the baserate. The higher OC levels are multiples of the OC-1 baserate.
-OC-3 has a data transfer rate of 155.52Mbps which is 3 times more than OC-1
-OC-12 has a data transfer rate of 622.08Mbps
-OC24 has a data transfer rate of 1.244Gbps-OC48 has a data transfer rate of 2.488Gbps
-The OC levels can go all the way to OC-768 which has a data transfer rate of 38.82Gbps
SONET (US) is a subset of SDH (Rest of the world)
-A standard to transmit data over a fiber optical network.
-It is a standard for transmitting data over a optical network.
-SONET is a transport protocol, in that defines the structure of the WAN cloud how info is passed within the WAN cloud.
-You often find SONET being combined with other types of WAN access. For example you can a dial up connection to your Central Office and the Central Office converts the analog signal to digital to be used on the SONET netowork for transmission.
-SONET is the underlying tech networks like Frame Relay use to transport data through the WAN cloud.
-SONET uses fiber optics in a series of rings that are interconnected throughout the network. These are typically dual rings for every connection. Data flows one way on one ring and another way on the other ring. Devices connect both rings and different rings. If there is a break on one ring, the data can be routed to another ring for redundancy.
DWDM
*DWDM (Dense Wavelength Division Multiplexing) is a type of wavelength division multiplexing.
-It's a technology that uses multiplexing to combine optical carrier signals onto a single fiber optic cable.
-Multiplexing on a fiber optic cable is done by using different wavelengths or colors of laser lights.
-So you can send additional data at different wavelengths without interference from other signals on the cable.
-This also allows for for bi-directional communications on the same cable at the same time.
WDM (Wavelength Division Multiplexing)
WDM (Wavelength Division Multiplexing) uses a multiplexer at the transmitter to joinig the signals together and transmit them through the network media. It also uses a demultiplexer at the receiving end to split the single back to separate signals. Ther are 2 types of WDM Coarse and Dense.
Coarse WDM (CWDM)
-Coarse WDM (CWDM) is used in fiber optic ethernet networks. 10G Based LX4 uses CWDM)
Dense WDM (DWDM)
-Dense WDM (DWDM) can carry more fiber channels than CWDM. DWDM is usually used for fiber optic backbones and long distance data transmission lines.
-It can transfer data up to 400Gbps. It is just tied to transmission speed so you can use it with other WAN tech.
-You can use it with IP protocol, ethernet frames, ATM and SONET. All those different tech can be provided transmission speeds between 100Mbps to 2.5Gbps.
-You can also use it to transfer different types of data at different data rates on the same channel at the same time.
Satellite internet connection
*Satellite internet connection is like Satellite tv, you need to makes sure the dish is pointed at the satellite.
-Weather can be a problem.
-If snow builds up on the dish, the connection is lost
-LEO (low Earth orbit) satellites are used for internet
-Satellite operate on a LoS so mountains, tress, etc can interfere with the connection-Satellite experience high latency so VoIP, video stream, VPN connection, etc don't work well.
-Satellite is more expensive than DSL or Cable-There are 2 ways to install Satellite, 1 way and 2 way.
-1 way uses Satellite to download and a phone modem for upload.
-2 way uses the Satellite for both upload and download.
ISDN
ISDN is called a local loop technology that it operates on the connection to the WAN. ISDN has 2 implementations, ISDN BRI and ISDN PRI.
-It uses multiple channels so you have one channel for telephone calls and one for data. The central office may need to split the signal, one going to the PSTN for voice data and the other going to the internet for data.
ISDN BRI (ISDN Basic Rate Interface)
-ISDN BRI (ISDN Basic Rate Interface) uses the plain old telephone service lines (POTS). These are lines already located to your location. Digital signals uses the existing wires but you need to use a RJ45 connectors. It uses the copper wire and divides it into channels allowing you to send multiple streams of data along the same physical wire. The data channels are called B channels which has a transfer rat of 64Kbps. The 3rd channel called D is used for setting up and taking down a call. D channel as a transfer rate of 16Kbps. Basically ISDN BRI can only transfer data up to 128Kps. Sometimes other values are used like 144 since that is the possible throughput of the line when you add channel D
ISDN PRI
-ISDN PRI uses a T1 line that uses 23 B channels and 1 D channel. All channels are 64kbps which gives you a totals of 1.54Mbps. When uses ISDN PRI, a new line probably needs to be installed since it can't use the existing telephone wiring. You can use each channel separately like sending a telephone call on 1 channel and data on another. You can bind 2 channels to make a 128 Kbps connection.
Cable
-Max length is 100 miles.
-Cable has shared bandwidth with everyone on the same segment
-During peak hours (6pm-10pm) internet could be slow since everyone is using the bandwidth.-Rural areas can either use modems or Satellite
DSL (Digital Subscriber Line)
-DSL (Digital Subscriber Line) transmits digital signals over a telephone line. You can use your telephone and internet due to multiplexing on the same line at the same time.
-Voice data is transmitted frequencies above 3.4ghz and the digital data is transmitted frequencies under 3.4ghz
-To get DSL you needed to be 3-6 miles away from your local DSL loop originally.
-DSL loop extenders now extend DSL connections up to 10 miles away
-DSL modem connects to the RJ-11 port (phone port) to your wall.
-A simple way to split and filter DSL voice and digital data is to use a DSL filter that sits between the DSL modem and wall port. The filter will filter the voice data out. The filter will send the voice data to your phone.
Asymmetric DSL
-Asymmetric DSL or ADSL is the most common DSL service. It called asymmetric because the upload speed (256-512Kbps) is much slower than the download speed (10Mbps).

Symmetric DSL
-Symmetric DSL or SDSL is mainly for businesses and is able to upload as fast as it can download. Can only do data so no splitter
Very High DSL (VDSL)
-Very High DSL (VDSL) is similar to ADSL. You can download speeds up 100Mbps, but depending on the distance it can go as low as 12-16Mbps

-VDSL2 can provide speeds up to 100Mbps at a distance of 300 meters. Can use both voice and data so a splitter is required

3G Celluar

-3G is the third generation of mobile telecom. The minimum peak bandwidth for 3G is 200Kbps. A person who is outside and isn't moving much can get around 2Mbps

4G Celluar

-4G is the current generation of the Cellular network. To be considered 4G, you must support a peak speed of 1Gbps. Someone on the move can get a speed upwards of 100Mbps. It also uses MIMO.

HSPA+

-HSPA+ (Evolved High Speed Packet Access) is apart of the 3G and is defined in the 3GPP extension release number 7. It has downloads as fast as 84Mbps and upload speeds up to 22Mbps. It uses MIMO (Multiple Input Multiple Output) which uses multiple antennas on both the transmitter side and recieving side and that increases the data throughput and range without using any additional bandwidth. MIMO can multiply the base data rate by the number of antennas on the transmitter and reciever.

WiMAX

-WiMAX (Worldwide Interoperability for Microwave Access) has a goal of deliver high-speed wireless internet to large geographical areas. It is apart of 4G (MIMO, speed upwards to 1Gbps). You can buy WiMAX hotspots and function the same way as a 4G hotspot.

LTE

-LTE (Long Term Evolution) it was introduced in the 3GPP R8. It too uses MIMO and can download at 100MBps and upload up to 50Mbps. There is a new version of LTE called LTE Advanced which can download up to 1Gbps and upload up to 500Mbps.

Frame Relay

-Frame Relay uses T1 lines to connect to cloud and is a packet switching technology. When data is sent, a virtual circuit is made that lets the data go through the cloud. These virtual circuits can be configured in a couple ways, Point to Point and Multipoint.


-Point to Point connection that goes to a single location using a single virtual circuit.


-Multipoint uses a single virtual circuit to connect to multiple locations within the WAN cloud.


-Frame relay network requires a router and CSU/DSU or a router with CSU/DSU.

ATM

-ATM (Aysnchronous Transfer Mode) is a packet switching technology that divides data into packets called cells.


-Each cell is 53bytes long.


-In ATM WAN there would be packets of different lengths. The packets would have to be divided into cells.


-ATM is often use for Audio and video and other time sensitive type services.


-ATM adds a label to the header to help ID the virtual path info.

PON

-PON (Passive Optical Network) is a point to multipoint fiber. PON uses unpowered optical splitters to enable a single fiber optic cable to serve multiple premises.


-Up 128 premises (users? networks?) can use 1 line.


-The signal is sent by optical line terminal (OTL) to the splitter and signals then go to the ONUs (optical network units(pc, servers, routers etc? or are they networks?)).


-802.3ah

Circuit switching

-Circuit switching makes a dedicated path from one end to the other using devices in the cloud with a circuit. The signal is travels on the same path through the cloud til the conversation ends. It could be a permanent connection in that it always exists or a temporary one like a phone call. Temporary circuits use a different path each time a call is established.
Packet Switching
-Packet Switching is when data is broken down into packets and each packet is sent through the cloud. Each packet takes a different path to reach the destination. Packet Switching is used by all IP based networks because data has already been divided into packets. Circuit switching used with only a few WAN techs.
MPLS
*MPLS (Multi Protocol Label Switching) is how to prioritize data traffic as it travels through the WAN.
-With special routers on the edge of the network, MPLS adds labels to the packet between the IP header and MAC address with info about the characteristics of data being sent.
-The switches. at this label info to route data based on priority. Routers can ID data that is more sensitive it has higher priority.
CSMA/CA
*CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is like CSMA/CD, but for wireless.
-It starts off like CSMA/CD where the sending device checks to see if any other device is sending data.
-When it sees no one else is sending data it sends a request to the receiving device or RTS (Request to send). The message says I want to send a message and how long it will take to send the message.
-The RTS is sent to all devices in the area. The other devices will know that the sending device will sending data to the receiving device for a period of time.
-When the receiving device gets the RTS, it will send back a CTS (Clear to send).
-After the CTS, the sending device sends its message and awaits a ACK (acknowledgement) that it received the message. If the sending device doesn't get a ACK, it assumes there was a collision and retransmits the original message.
Demarc
*Demarc (demarcation point) is what separates the LEC and your building.
-Also called Minimum point of entry (MPOE) or end user point of termination (EU-POT)
-It is IDed by an orange plastic cover at businesses
-Everything from the demarc to the network is the LEC's responsibility.
-Everything on the other side of the demarc is your responsibility
-Demarcs are just inside the building, either on the main floor or basement.
-You can have a dermarc extension that extends a service line that goes from the demarc to a location in the building.
-Demarc extension isn't usually done by the service provider unless it is paid for or it can be done with another service or yourself.

Smartjacks

The smart jack, aka the Network Interface Device(NID). The smart jack performs several primary functions:
- The loopback feature enables remote testing so that technicians do not always need to be called to visit the local network to isolate problems.
-The smart jack can amplify signals. This feature is similar to that of the function of repeaters in an Ethernet network.
-Smart jacks include protection from environmental situations like lighting and other environmental conditions can cause electrical surges.
-Smart jacks can have an alarm that allows the owner to identify if something goes wrong
MDFs
*MDFs (main distribution frame) are the first entry point within the building.
-They are in the main wiring closet which is on the ground floor or basement.
-MDFs have a little wiring room that connect to other floors which have wiring closets called IDF (Intermediate Distrbution Frames)

IDFs

-IDFs are located above the MDFs to have straight wiring running from the IDFs to the MDF.
-Vertical cross connects connect the MDF with the IDFs on each floor. If you have 2 IDFs on the same floor, you will have to connect them to a horizontal cross connect.
-vertical and horizontal cross connects have a special cables called 25pair and 100 pair cables.
CSU/DSU
A CSU(channel service unit)/DSU (Data service Unit) iS a way to connect to a WAN
-CSU terminates the digital signal that comes out of the WAN cloud.
-DSU converts the signal into a format that can be read by routers and devices at your location.
-The CSU/DSU maybe a seperate box at your location and may be supplied by the service provider.
-You connect the CSU/DSU box to your router and rest of your network.
-Some routers have CSU/DSU in them so you can connect directly to the line that comes from your service provider.
Load balancing
*Load balancing is having the server workload divided between multiple servers
-To effectively do load balancing, you can use a server farm.
-A server farm is multiple server configured together. It acts as if it is one server with a single logical server with a single name.
-Load balancing distributes client requests between servers in one configuration. Another configuration would have clients go to the server that can handle more clients first.
-Depending on the service, the servers on the server farm need to contain the same resources so it doesn't matter which server a client goes to.
-Load balancing increases both performance and fault tolerance since if a server goes down, there are other servers to pick up the slack.
Proxy servers
-Proxy servers are a example of a application level gateway firewall
-Proxies can be configured to
-Control in and outbound traffic
-Increase performance by using cache. Content is retrieved from the proxy cache instead of the original server.
-Filter content
-Shield or hide a private network.
-Can block access by user or website.
VPN concentrator
-VPN concentrator server out on the edge of the network and it accepts VPN connections from hosts in a client to host config.
-Can also be software base
Traffic shaping
-Traffic shaping provides the ability to modify the flow of traffic through a network. The flow might be modified in response to QoS labels, delaying some traffic to ensure delivery of other traffic. Traffic shaping might perform rate limiting which restricts the bandwidth available. Bandwidth throttling also might be used limit the amount of data sent in a time period
Quality of Service
*Quality of Service is used to multiple solutions that seeks to eliminate or reduce delay for time sensitive traffic such as VoIP, streaming video or online gaming. Without Quality of service data might delayed or lost.
-Quality of service usually implements controls that provide some prioritization of traffic.
CARP
*CARP (Common addressing Redundancy Protocol) is a type of fault tolerance which allows multiple firewalls and/or routers on the same local network share the same set of IP addresses. If one firewall or router fails, the shared IP address allows hosts to continuing with or through the firewall or router without interruption.

WEP

-WEP was added to add some measure of security for wireless transmissions.
-It uses encryption method called RC4. This method used, each PC is configured with a share key value. This was shared so that both PCs can use the same shared key value and then the key is used to do encryption.
-WEP isn't secure as the shared key used by all PCs, so it was easy to hacked. Transmission can be intercepted and the encryption can be broken. Supports open authentication and preshared key. Use open authentication instead of shared key.
WPA
-WPA uses TKIP for encryption. It uses periodically rotating keys. It was meant as a intermediate solution between WEP and WPA2. Uses 3 forms of authentication, open, preshared key (WPA-PSK OR WPA Personal), and 802.1x (WPA Enterprise). WPA keys can be predicted by reconstructing the Message Integrity Check (MIC) of a intercepted packet, sending the packet to a access point and observing whether the packet is accepted by the WAP.
WPA2
-WPA2 is the final implementation of the 802.11i standard. It uses the AES encryption and like TKIP uses rotating keys, but is considered a stronger form encryption.
-Requires special hardware to do encryption. Uses Counter mode with CBC-MAC (CCMP) aka AES-CCMP. You would have to get new hardware to get WPA2.
-Uses 3 forms of authentication, open, preshared key, and 802.11x.
-WPA2 personal uses shared key
-WPA enterprise refers uses 802.1x.
-Use preshared key in smaller organizations or SOHO.
-Use 802.1x for larger organizations as it needs a RADIUS server.
Access Control Lists
-Access Control Lists (ACLs) to ID allowed and blocked traffic.
-MAC filtering is done by filtering physical devices, but is local
-IP Filtering is done by filtering IP addresses. This is done by firewalls and routers.
-Port filtering is done by firewalls by allowing or blocking port numbers.
PPTP VPN Tunnel Protocol
-PPTP(Point to point tunneling protocol) ses authentication protocols like CHAP (Challange Handshake Authentication Protocol) and PAP (Password Authentication Protocol).
-Only supports TCP/IP
-Encapsulates other LAN protocols and carries the data securely over a IP network.
-Uses Microsoft's MPPE for data encryption
-Is supported by most OSs and servers
-Uses TCP port 1723

L2TP VPN Tunnel Protocol

-L2TP is a open standard for secure multi-protocol routing
-Supports multiple protocols (not just IP)
-Uses IPSec for encryption
-Older OSs don't support this
-Uses TCP port 1701 and UDP port 500

IPSec VPN Tunnel Protocol

-IPSec provides authentication and encryption. It can be used with L2TP or by itself as a VPN. It includes 3 protocols for authentication, data encryption and connection negotiation


-Authentication Header (AH) provides authentication for IPSec. It provides a message integrity check with a Hashed Keyed Message Authentication Code (HMAC).


-HMAC uses a symmetric key in the message before the message is hashed.


-When the message is received, the recipient's key is added back into the message before it is hashed If both key values are the same, message integrity is proven


-AH uses SHA-1 (Secure Hashing Algorithm 1) or MD5 (Message Digest V5) for intergrity validation

IPSec VPN Tunnel Protocol

-IPSec can be used to secure the following types of communication


-Host to host communication withing a LAN -VPN communication through the internet, either by itself or with L2TP


-Any traffic supported by the IP protocol including Web, email, telenet, file transfer and SNMP traffic, etc

SSL VPN Tunnel Protocol

-SSL has been used to protect traffic generated by other IP protocols such as HTTP, FTP, and email. It also can be used as a VPN. It's mainly used for remote access.


-It authenticates the server to the client using public key cryptogtraphy and digital certs.


-Encrypts the whole communication session -uses port 443 which is opened on most firewalls

ISAKMP VPN Tunnel Protocol

-ISAKMP (Internet Security Association Key Management Protocol) makes a framework for negotiation.

Remote Access Service

-Remote Access Service (RAS) is the service used by the remote access server to control access for remote access clients. Remote clients might be only be able to use resources on the remote access server or might be allowed access to the private network.

PPPoE
-PPPoE is a modification of PPP that allows for negotiation of additional parameters that aren't found on regular Ethernet network. ISPs usually use PPPoE to control and monitor internet access over broadband links.
-Remote access protocol
PPP
-PPP(Point to Point) for dial up users
-Remote access protocol
Independent Computing Architecture
Independent Computing Architecture (ICA) can run apps remotely
PKI
-PKI is a organization who verify identity. To get a cert from PKI you have to apply to the public key infrastructure organization and supply them with something saying that you are who you say you are.
RADIUS
-RADIUS is a AAA server (Authentication, Authorization, Account) is used by Microsoft and combines authentication and authorization to grant access
-Uses UDP
-Encrypts passwords
-Uses vendor-specific extensions. RADIUS solutions from different vendors might not be compatible.
-When configuring RADIUS, use a single server as RADIUS and make all the remote access servers as RADIUS clients.
TACACS+
+TACACS+ is AAA server(Authentication, Authorization, Account) gives 3 protocols, 1 for authentication, authorization and accounting. This allows for each service to be used by a different server+Uses TCP
+Encrypts packets+
Supports more protocol suits than RADIUS
802.1x
*802.1x originally was used to authorized ports on a ethernet network. It is also now used with wireless networks and other security implementations.
-It uses a connection point (switch or WAP) and authentication server (RADIUS).
-A user connects to the connection point. Authentication credentials are passed to the authentication server. If everything is good the connecting device is allowed access.
-802.1x is a extension of EAP. When a PC authenticates to the authentication server, it might use user names or passwords or certs. It might also use smart cards or biometrics.-Basically 802.1x uses EAP to negotiate the specific type of credentials or the protocol used to exchange the credentials.
-This is used for port based authentication or for wireless device authentication.
MS-CHAP
-MS-CHAP unlike CHAP encrypts the shared secret (password) that is on the devices. If someone where to hack the authentication device they wouldn't be able to use the password to authenticate since it is encrypted.
-MS-CHAP also allows the user to change the password that's stored on the authentication device and do it secretly so that the password change can't be intercepted.
-MS-CHAPv2 adds mutual authentication.
CHAP
-CHAP (Challenge Handshake Authentication Protocol) uses a challenge response mechanism.
-It uses a 3-way handshake authentication process
-First the authenticated device generates a string called a challenge (a string is nothing more than a series characters or digital data) and sends it the device that wants to be authentcated.
-The device that wants to log in takes the challenge string and uses its shared secret (password) as a encryption key and performs a hash on that challenge string.
-The hash value of the challenge key is sent to the authenticator along with the user info
-The authenticator the uses its configured shared secret (password) does the same hash on the challenge string to create a hash value on its end.
-If both hash values match each other, then the device is authenticated.
-If the password is wrong, then it would have resulted in a different hash value.
-In this process, the actual password (shared secret) was never sent, but only the hash value.
EAP
*EAP (Extensible Authentication Protocol) isn't really a authentication protocol itself, but a method of IDing which authentication protocol to use.
-When 2 devices using EAP, they must agree on another protocol to use.
-Using EAP to enable a PC to use many different authentication methods, even methods that haven't been developed yet.
-EAP devices could decide to use smart cards or certs for authentication
Single Sign-On (SSO)
-Single Sign-On (SSO) is when you complete the authentication process once only and the user is then given access to multiple system to which they have given access to.
-It's the ability to log into multiple systems with the same credentials or when you enter a username and password and can access multiple applications.
-This can also be used by having users roaming around to different work stations.
-Nmap
-Nmap (Network mapper) is a tool that discovers devices on the network, then shows those devices in a graphical picture. They use ping scan to discover devices as well a port scanner to ID open ports on those devices
Netstat
Netstat is a windows utility that shows you the open TCP and UDP connections on the PC. It also shows the routing table and some IP stats.
-netstat -a allows you to view all connections, but also the all the open ports on your system that are listening. This is a good way to find a rogue process, like malware.
-netstat -es shows you the PCs ethernet stats for each protocol configured on the network interface.
-netstat -r shows you your routing tables for both IPV4 and 6.