• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/85

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

85 Cards in this Set

  • Front
  • Back

Client/Server Network

Servers run the network services, and clients must request permission for delivery of network resources

Peer-to-Peer (PTP) Network

There are no dedicated servers, each computer acts as both a client and a server

Client/Server Model Advantages

1. Centralized security


2. Dedicated servers


3. Easy accessibility and configuration control


4. Easy to backup

Client/Server Model Disadvantages

1. Dependency upon Administration


2. Complicated Set Up and Maintenance


3. Expensive Servers

Peer-to-Peer (PTP) Model Advantages

1. Small networks


2. Inexpensive


3. Easy Setup


4. Low Maintenance

Peer-to-Peer (PTP) Model Disadvantages

1. Scattered Data


2. Weak Security


3. No Central Administration or Control


4. User training

Hyper Text Transfer Protocol (HTTP)

Contains all of the text, graphics, and animations that will display on a client computer when the web page is downloaded. Resides on web servers and contains the information required to render web pages on client computers.


HTTP port

Port 80

File Transfer Protocol (FTP)

An unsecure protocol. There is no encryption of this protocol, and the traffic can be easily monitored.

FTP port

Ports 20 and 21

Simple Mail Transfer Protocol (SMTP)

Used to transfer emails from client computers to email servers and to transfer mail between two email servers.

SMTP port

Port 25

Post Office Protocol 3 (POP3)

Used to pull messages from an email server

POP3 port

Port 110

Internet Message Access Protocol (IMAP)

The third message delivery type from the server to client. More advanced than POP3

IMAP port

Port 143

Exchange/Outlook client Messaging Application Programming Interface (MAPI) Protocol

The fourth email delivery protocol, is a Microsoft proprietary protocol used between Microsoft Outlook and Exchange

MAPI port

Port 135, then the server and outlook client dynamically assign another port number

Domain Naming Service (DNS)

Resolves IP addresses to fully qualified domain names

DNS port

Port 53

Dynamic Host Control Protocol (DHCP)

Allows client computers to automatically pull their IP address configuration from a centrally managed server

DHCP port

Ports 67 and 68

Server Message Block (SMB) Protocol

Is used by clients to access shared resources

SMB port

Port 445

Telecomunications Network (TelNet)

Is software that allows you to remotely access network systems, allows access to the CLI in Cisco IOS. The client connection is called a Virtual Terminal (VTY) session.

TelNet port

Port 23

User Datagram Protocol (UDP)

Is a very low overhead protocol that works well with higher bandwidth applications like voice and video because of the volume of data being sent across the network. Provides fro a simple, connectionless delivery method.

Transmission Control Protocol (TCP)

Is a connection oriented protocol that incurs over twice the overhead of the other protocol in order to gain additional functionality.

UDP provides

1. Unreliable delivery


2. No error recovery


3. No Flow control


4. No congestion control


5. No ordered delivery


6. No connection establishment

TCP provides

1. Reliable delivery


2. Error recovery


3. Flow control


4. Congestion control


5. Ordered delivery


6. Connection establishment

The command used to view ports being used on a PC

netstat

Well known ports

Ports 0-1023, are reserved for commonly used services and applications

Registered ports

Ports 1024-49151, are primarily ports assigned to applications that a user might decide to install

Dynamic, or private ports

Ports 49152-65535, are usually assigned dynamically to client applications as they initiate connections

How ports are used to establish a Transmission Control Protocol (TCP)

The client computer will use a unique and random port number as the source port (a dynamic port) and request a web page from a server with the destination of a well-known port. The server will establish a connection with its source port and the destination port being the same random port that originated the request for a web page.

Ordered Deliver in relation to the functions of TCP

Provides reliable delivery.

Step one of the Three-Way Handshake

Computer A sends SYNCH, and Computer B receives SYNCH.

Step two of the Three-Way Handshake

Computer B sends ACK and SYNCH, and Computer A ACK received.

Step three of the Three-Way Handshake

Computer A Established, and sends SYNCH.

Reliable Delivery in relation to the functions of TCP

This connection establishment enables it in the three step process known as the TCP three-way handshake.

Port 20

FTP Data, TCP

Port 21

FTP Control, TCP

Port 22

SSH, TCP

Port 23

TelNet, TCP

Port 25

SMTP, TCP

Port 53

DNS, UDP/TCP

Port 67/68

DHCP, UDP

Port 69

TFTP, UDP

Port 80

HTTP, TCP

Port 110

POP3, TCP

Port 161

SNMP, UDP

Port 443

SSL, TCP

Port 16,384-32,767

RTP-Based Voice and Video, UDP

Window Size

Is the amount of data that a source can transmit before an acknowledgment must be received

How TCP dynamically changes to overcome network congestion

The Window Size will flex to fit the quality of the connection and the bandwidth available

Flow Control

Together with Window Size, accounts for congestion control

TCP header size

20 Bytes long

UDP header size

8 Bytes long

Intermediary devices that operate at the Network Layer of the OSI Model

Routers and layer-3 switches

The Three Basic Characteristics of Internet Protocol Version 4 (IPv4)

1. Connectionless


2. A best effort


3. Media independent protocol

Actions a router can take with a packet

1. Forward the packet out the proper interface


2. Send the packet out to its default route if one is programmed


3. Drop the packet

Maximum Transmission Unit (MTU)

Limits the size of the PDU, determined by the data link layer

Valid IPv4 addresses

1. Binary: 11001000.00010100.00010000.00010001


2. Decimal: 200.20.16.17


3. Minimum value for IP 0.0.0.0


4. Maximum value for IP 255.255.255.255

Routing

The process of moving packets through the network

Default Gateway

IP address used by a host to forward IP packets that have destination addresses outside of the local network. Address of the router interface connected to the same local network as the source host. If the computer does not know the destination, it routes the packet through this.

Routing Table

Contains the destination networks, the metric, and the address of the next hop.

Static Routing

Are a way of manually configuring the routing table in routers. Programming of routers by a network administrator with all of the routes that it needs to know about in order to do its job.

Dynamic Routing

Allow routers to learn about other networks from other routers automatically. The routers share their networks with other routers to automatically build and complete topology of the network, and automatically adjust to traffic changes.

Time-to-Live (TTL)

Describes the maximum number of hops the packet can take before it is considered "lost" or undeliverable. This keeps the internet from becoming cluttered by lost packets and creating such issues as routing loops.

Metric

Is a calculated number that is used to determine which route to a destination network is best in the event that a router knows about multiple paths to the same network

Network Address

The first available IP address in the network range. Used to represent the network as a whole. Also known as the Net ID.

Broadcast Address

The last available IP address in the network range. Used to send traffic to all of the devices in the network.

Host Addresses

The rest of the IP addresses that fall between the network and broadcast ID. Usable IP addresses that you can assign to devices within your network.

Class A

1.X.X.X - 126.X.X.X

Class B

128.X.X.X - 191.X.X.X

Class C

191.X.X.X - 223.X.X.X

Class D

225.X.X.X - 239.X.X.X

Private Address

Must rely on Network Address Translation to be routable on the internet. Do not need to be globally unique. IP addresses that are designated for use within a private network.

Public Address

Addresses designated for use in networks that are accessible on the internet. This means that routers will route these outside of your internal network.

Unicast

Point to point communications from one host to another over the network. Most of the IP traffic you will encounter. "one-to-one"

Broadcast

If a computer or network device sends IP traffic to this address, all of the computers and network devices on that IP network will receive the traffic. "one-to-many"

Multicast

When a host sends out a data stream that multiple hosts can receive. "one-to-many"

Ping

Used to test whether or not a path through the network exists to a destination network or computer

Network Address Translation (NAT)

Changes the private space addresses in the IPv4 packet header to a public space address. Regardless of how many devices you have on your private LAN, the internet sees all of your traffic as the (1) public IP address your ISP provided.

Valid Internet Protocol Version 6 (IPv6) addresses

8 fields of 4 hexadecimal numbers per field