• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/109

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

109 Cards in this Set

  • Front
  • Back
What is the OSI Model?
Describes the data communication processes; consists of 7 layers.
What are the 7 layers of the OSI model?
7- Application
6- Presentation
5- Session
4- Transport
3- Network
2- Data Link
1- Physical
According to the OSI model, how does information flow?
Information flows from Layer 7, the application layer, to Layer 1, where it's placed on the physical network circuits. After it arrives at the next device, it will flow up and down the layers as needed.
What Layer of the OSI model do data switches typically look at to make switching decisions?
Data switches typically only look at information at layer 2.
What layer, on the OSI model, do routers look at?
Layer 3
What layers do clients and servers use on the OSI model?
Clients and servers make use of all seven layers.
What does OSI stand for?
Open Systems Interconnection
What does the OSI model help you do?
It helps you verify the success of the communication process at various layers or levels of the model; it also helps you locate the point of failure.
What is the focus of Layers 1 and 2 of the OSI model?
Communication over the "wire"
What are 5 ways you can troubleshoot OSI layers 1 and 2?
1- View the contents of your ARP cache
2- NETSTAT- program that can be used to determine local area network physical connectivity
3- Protocol Analyzer- used to diagnose a physical network problem
4- Link status and activity counters
5- Link Lights
Using netstat -e, how would you know that you're having a problem with your Ethernet activity?
When you netstat -e, wait a few minutes and do it again, you should see a change in the number. If you do, you are communicating.
What's the only issue with ARP?
The ARP cache is often empty because old entries disappear on a regular schedule.
What is ARP?
ARP is a process used to locate other devices on your local network to get their Media Access Control (MAC) address. If you have entries in your ARP cache, you are communicating with other devices.
When checking link status for a router or a switch, how would you know if there's a problem?
would say 'Ethernet 0/0 is down, line protocol is down.'
If you don't have any problems at Layers 1 and 2, what should you do?
start looking for the problem at layer 3.
When troubleshooting Layer 3, what do you need to determine?
You need to determine if your address is correct and that the network will actually route your traffic to other devices.
What are 6 ways to troubleshoot OSI layer 3?
1- IPCONFIG
2- Ping
3- Tracert/Traceroute
4- Pathping
5- Internet Communications MNGT Protocol (ICMP) Messaging
6- Protocol Analyzer
What's the first step in troubleshooting OSI Layer 3?
Making sure we have proper addresses on a windows device through IPCONFIG.
What does IPCONFIG show?
Shows the IP address, mask, and default gateway info that is currently in use on the device
What does ipconfig/all show?
shows all the configuration details- address of the DNS server, the DHCP server if used, the DNS domain info, etc.
Under ipconfig/all, what do you need to verify?
that the IP address, the subnet mask, the default gateway, and the DNS server address are correct for the subnet in which you are located.
What does ping test?
your connectivity in the network
You can ping by...
IP address or domain name
Why would you ping other workstations on your local network?
to see if there's a local connectivity problem.
What does it mean if you can't ping your default gateway?
you don't have connectivity to the router and won't be able to access any devices that aren't on your LAN.
What is tracert?
a command used to display the addresses of the routers used to go between your device and the device you wish to trace the route to.
What is Pathping?
does the same initial process as tracert but then goes on to calculate more precise network times for each "hop" in the route
What's the difference between using tracert and pathping?
Tracert gives you results in a hurry; if you have more time and need more detailed throughput numbers, pathping might be more useful.
What is ICMP?
Internet Communications Management Protocol (ICMP); provides details as to why a communication pathway is not available.
What does the transport layer (OSI 4) deal with?
moving information between client and server applications; you'll need to know what applications are available.
What is telnet?
Application program that was designed for terminal emulation.
What is the telnet command?
tenlet serverIP Port#
What are 3 ways to troubleshoot OSI layer 4?
1) Telnet
2) Port scanning
3) Protocol Analyzer
What does a Port Scanner do?
sends probing messages to the server in question and sees if the server responds; shows what applications are available on the server
What does Protocol Analyzer show you for OSI layer 4?
Shows each element of the datagram and each part of the associated protocols.
What does Layer 7 of the OSI model do?
Provides services for user applications to employ; defines the interfaces for communication and data transfer; provides and support services such as job transfer, handles network access, email, supports user apps and error recovery.
Define HTTP.
Hypertext Transfer Protocol- protocol that operates at the application layer
What are the protocols on Layer 7 and what do they do?
FTP, DNS, SNMP, SMTP, FINGER, TELNET, TFTP, BOOTP, and SMB; enables various functions at this layer.
What is Layer 6 responsible for?
The presentation layer translates the data from application to the network format; responsible for the protocol conversion, encryption, decryption, and data compression; is a best layer for cryptography.
What network device operates on Layer 6?
gateway network device
What is Layer 5 responsible for?
Session Layer- establishes and manages the session between the 2 users at difft ends in a network; manages who can transfer the data in a certain amount of time and for how long; reports and logs any upper layer errors.
What protocols work on Layer 5?
NetBIOS, Mail Slots, Names Pipes, RPC
What network device is used in Layer 5?
Gateway
What is Layer 4 responsible for?
Transport Layer: manages end-to-end message delivery in a network and provides the error checking and hence guarantees that no duplication or errors are occurring in the data transfers across the network.
What protocols work on Layer 4?
TCP, SPX, NetBIOS, ATP, and NWLINK
What network devices are used on Layer 4?
Brouter, Gateway, and Cable Tester
What is Layer 3 responsible for?
Network Layer: determines how data transmits between the network devices; translates the logical address into the physical address, e.g. computer name into MAC address; defines the route, manages the network problems and addressing; routes the packets according to hte unique network addresses; router works as the post office and network layer stamps the letter (data)
What protocols work on Layer 3?
IP, ICMP, ARP, RIP, OSI, IPX, and OSPF
What network devices are used on Layer 3?
Router, Brouter, Frame Relay device, and ATM switch devices
What is Layer 2 responsible for?
Data Link Layer- define procedures for operating the communication links, frames packets, detects and corrects packets, transmits errors.
What protocols work on Layer 2?
Logical Link Control, Error Correction and Flow Control, Media Access Control
What network devices are used on Layer 2?
Bridge Switch, ISDN Router, Intelligent Hub, NIC, Advanced Cable Tester
What is Layer 1 responsible for?
Physical Layer: defines cables, network cards, and physical aspects; defines raw bit stream on the physical media; provides the interface b/w network and network communication devices; checks the # of bits transmitted per second and 2 way or 1 way transmission.
What protocols work on Layer 1?
ISDN, IEEE 802 and IEEE 802.2
What network devices are used on Layer 1?
Hubs, Repeaters, Oscilloscope, and Amplifier
What are the different types of networks?
1) Peer to Peer
2) Client/Server
3) Centralized
What is a peer-to-peer network?
A network that lacks a dedicated server; every computer acts as both a client and a server; good solution when there are 10 or less users that are in close proximity to each other; can be a security nightmare
What is a client/server network?
a network that's designed to support a large number of users and uses dedicated server(s) to accomplish this; clients log into the server in order to run applications or obtain files; can be managed by one or more administrators.
What is a centralized server?
a client/server based model that is most often seen in UNIX environments but the clients are "dumb terminals"; security is very high.
Define the 6 network topologies.
1) Bus
2) Star
3) Ring
4) Hybrid
5) Mesh
6) Wireless
Describe the Bus Network topology.
Each of the computers on the network are daisy-chained to each other; creates excess traffic, must pass information from one to the other.
What are the advantages and disadvantages of the Bus network topology?
Advantages: cheap, simple to set up
Disadvantages: excess network traffic, a failure may affect many users, problems are difficult to troubleshoot.
Describe the Star Network Topology.
Uses twisted pair (10baseT or 100baseT) cabling and requiring that all devices are connected to a hub.
What are the advantages/disadvantagees of the Star Network Topology?
Advantages: centralized monitoring, failures do not affect others unless it is the hub, easy to modify; Disadvantages- if the hub fails, then everything connected to it is down.
Describe the Ring Network Topology.
Looks the same as the Star, except it uses special hubs and ethernet adapters.
What are the advantages/disadvantages of the Ring Topology?
Advantages: equal access
Disadvantages: Difficult to troubleshoot, network changes affect many users, failures affect many users.
Describe the Hybrid Network Topology.
Combinations of the Bus, Star and Ring and are common on very large networks.
Describe the Mesh Network Topology.
Every node has a connection to every other node in the network.
What are the advantages and disadvantages fo the Mesh Network?
Advantage: Provides redundancy in case of a failure b/w links
Disadvantage: Can be very expensive.
Describe the Wireless Network Topology.
allow computers to communicate without the use of cables; IEEE 802.11b defines 2 pieces of equipment, a wireless station, which is usually a PC or a laptop with a wireless network interface card (NIC), and an Access Point (AP), which acts as a bridge b/w the wireless station and Distribution System (DS) or wired network.
Describe the modes an 802.11b wireless network adapter can operate in.
2 modes: 1) Ad Hoc, 2) Infrastructure. Infrastructure mode: all traffic passes through a wireless access point; Ad-Hoc mode: Computers talk directly to each other and do not need an access point at all.
What are the advantages and disadvantages of the Wireless Network Topology?
Advantage: world-wide acceptance, rnages over 150 feet, freedom to move about and no cables; Disadvantages: Susceptible to interference form objects such as microwave ovens and cordless phones.
What is the Standard, Cable Type, Connect, Max. Length, and Speed of the 10 Base-T cable?
Standard: 802.3i, Cable Type: Category 3 or better UTP cable, Connector: RJ-45, Max. Length: 100 meters (328 ft), Speed: 10 mbps
What is the Standard, Cable Type, Connector, Max. Length, and Speed of the 10Base-FL cable?
Standard: 802.3j, Cable Type: Fiber Optic cable, Connector: ST, Max. Length: 2000 meters, Speed: 10 mbps
What is the Standard, Cable Type, Connector, Max. Length, and Speed of the 100 Base-TX cable?
Standard: 802.3u, Cable Type: Cat 5 twistered pair, Connector: RJ-45, Max. Length: 100 meters (328 ft), Speed: 100 mpbs
What is the Standard, Cable Type, Connector, Max. Length, and Speed of the 100Base-FX cable?
Standard: 802.3u, Cable Type: Fiber Optic, Connector: ST, SC, Max. Length: 2000 meters, Speed: 100 mbps
What is the Standard, Cable Type, Connector, Max. Length, and Speed of the 1000Base-T cable?
Standard: 802.3ab, Cable Type: CAT5e or higher, Connector: RJ-45, Max. Length: 100 meters (328 ft), Speed: 1 gbps
What is the Standard, Cable Type, Connector, Max. Length, and Speed of the 1000 Base-LX cable?
Standard: 802.3z, Cable Type: Laser over fiber, Connector: SC, Max. Length: Up to 5,000 meters, Speed: 1 gbps
What is the Standard, Cable Type, Connector, Max. Length, and Speed of the 1000Base-SX cable?
Standard: 802.3z, Cable Type: short wavelength laser over fiber, Connector: SC, Max. Length: Up to 550 meters, Speed: 1 gbps
What is the Standard Cable Type, Connector, Max. Length and Speed of the 1000 BASE-CX cable?
Standard: 802.3z, Cable Type: Twinax or short haul copper, Connector: 9-Pin Shileded D-subminiature connector, or 8-pin ANSI fiber channel type 2 (HSSC) connector, Max Length: 25 meters, Speed: 1 gbps
What is the Standard, Cable Type, Connector, Max. Length, and Speed of the 10 GBASE-LR cable?
Standard: ?, Cable Type: Laser over single mode fiber optics, Connector: ?, Max Length: 2000 meters, Speed: 10 Gbps
What is the Standard, Cable Type, Connector, Max. Length, and Speed of the 10 GBASE-SR cable?
Standard: 802.3ae, Cable Type: short wave laser over multi-mode fiber optics, Connector: ?, Max. Length: 300 meters, Speed: 10 Gbps
What is the Standard, Cable Type, Connector, Max. Length, and Speed of the 10GBASE-ER cable?
Standard: ?, Cable Type: Laser over eithe rsingle or multi-mode fiber, Connector: ?, Max. Length: 40,000 meters, Speed: 10 Gbps
What's the difference between a shielded twisted pair (STP) and a UTP?
a shielded twisted pair (STP) has a foil jacket that helps preent crosstalk.
Define crosstalk.
Crosstalk is signal overflow from an adjacent wire.
What is the 5-4-3 rule?
States that a 10base 2 network can have 5 cable segments connected with 4 repeaters, but only 3 of these segments can be occupied by computers; there's a max. of 30 computers per segment.
Describe plenum grade cabling.
Plenum grade cabling is required if the cabling will be run between the ceiling and the next floor (pleum), resistant to fire and does not emit poisionous gasses when burned.
Describe the security in fiber optic cabling.
Has a built-in security as you can't intercept data as you can with other cable mediums.
What is the frequency, description, Max. Length, and speed of the 802.11b WiFi wireless technology?
Frequency: 2.4 Ghz, Description: wireless networking commonly used in homes and SOHO environments, uses a wireless access point (WAP) to connect to other wireless computers, Speed: 11 mbps
What is the frequency, description, Max. Length, and speed of the 802.11g WiFi wireless technology?
Frequency: 2.4 GHz, Description: commonly used in homes and SOHO environemnts, uses a wireless access point (WAP) to connect to other wireless computers; backward compatible with 802.11b, Max. Length: 150+ feet, Speed: 54 mpbs
What is the frequency, description, Max. Length, and speed of the Infrared- IrDA wireless technology?
Frequency: uses light, not radio frequencies, Description: uses line of signt connections making it useful for sharing data between personal devices, Max. Length: 150+ feet, Speed: usually 16 mpbs- high powered beams can reach 10 Gbps
What is the frequency, description, Max. Length, and speed of the Bluetooth wireless technology?
Frequency: 2.4 GHz, Descrption: is a specification for wireless personal area networks that facilitates the exchange of data between electronic devices.
Define infrared-IrDA.
A short range line of sight technology which means that there cannot be obstructions between 2 devices that are trying to communicate.
Why was bluetooth developed?
Out of a demand to create networks that were easy to install, configure and use without using the standard cabling.
Fill in the blank: The higher the network device is in the OSI layer, ________________
the more intelligent the device is.
What is NIC?
Network Interface Card (NIC): an expansion board you insert into a computer so the computer can be connected to a network.
How are NICs designed?
Most NICs are designed for a particular type of network, protocol and media.
What is a hub?
used to connect computers on an ethernet network.
What is a repeater?
boosts signals in order to allow a signal to travel farther and prevent attentuation; repeaters do not filter packets and will forward broadcasts; cannot connect unlike network segments.
Define attentuation.
the degradation of a signal as it travels farther from its origination.
What is a bridge?
Functions the same as a repeater, but can also divide a network in order to reduce traffic problems; can also connect unlike network segments; create routing tables based ont he source address.
Identify 3 bridging methods.
1) Transparent- only one bridge is used; 2) Source Route- bridging address tables are stored on each PC on the network, 3) Spanning Tree- prevents looping where there exists more than one path b/w segments.
What is a switch?
prevents traffic jams by ensuring that data goes straight from its origin to its proper destination, w/ no wandering in b/w. Switches remember the address of every node on the network & anticipate where data needs to go; only operates w/ computers on the same LAN.
What is a router?
similar to a switch but can also connect difft logical networks or subnets and enable traffic that is destined for networks on the other side of the router to pass through; can connect networks that use dissimilar protocols.
What is a gateway?
Used as a connection to a mainframe or the internet; enable communications b/w difft protocols, data types and environments.
What is a file server?
a very fast computer with a large amount of RAM and storage space, along with a fast NIC (Network Interface Card).
What does a file server do?
controls the communication of information between the nodes on a network; stores alot of information and shares it very quickly.
What are the minimum requirements for a file server?
- 800 MHz or faster processor
- fast HD with at least 120 gb
- a RAID (Redundant Array of Inexpensive Disks) to preserver data after a disk casualty
- a tape back up unit (DAT, JAZ, Zip,or CD-RW d\rive)
- numerous expansion slots
- fast NIC
- at least 512 MB of RAM
What is a NIC?
Network Interface Card- provides the physical connection between the network and the computer workstation; most are internal and determine the speed and performance of a network.