• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/96

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

96 Cards in this Set

  • Front
  • Back
OSI Model

Open Systems Interconnection Model is the primary architectural model for networks. It was created in the late 70's by the International Organization for Standardization (ISO).
Application Layer


Layer 7 of the OSI Reference Model that is in charge of file, print, message, database and application services.




Provides a user interface.

Presentation Layer


Layer 6 of the OSI Reference Model that is in charge of Data encryption, compression, and translation services.




Presents data and handles processing such as encryption.

Session Layer


Layer 5 of the OSI Reference Model that is in charge of Dialog Control.




Keeps different applications' data separate.

Transport Layer


Layer 4 of the OSI Reference model that is in charge of End-to-End connections.




Provides reliable or unreliable delivery and error correction before retransmit.

Network Layer


Layer 3 of the OSI Reference Model that is in charge of Routing.




Provides logical addressing which routers use for path determination.

Data Link Layer


Layer 2 of the OSI Reference Model that is in charge of Framing.




Combines packets into bytes and bytes into frames.




Provides access to media using the MAC address.




Performs error detection but not correction.

Physical Layer


Layer 1 of the OSI Reference Model that is in charge of the physical topology.




Moves bits between devices through cables.

LAN


Stands for Local Area Network




A data network that is restricted to a single geographical location and encompasses small areas such as an office building or school.




LAN's purpose is to interconnect workstation computers for sharing of files and resources.

WAN


Stands for Wide Area Network




A network that spans more than one geographic location, often connecting separated LANs.




Slower than LANs and more expensive due to adding routers, dedicated leased lines and implementation is more complicated.

PAN


Personal Area Network




A LAN created to share data among devices associated with you. AKA Wireless PAN (WPAN).




Connections are via Bluetooth, infrared or near-field communications (NFC).

MAN


Metropolitan-Area Network




A WAN confined to a certain geographic area such as a university campus or city.




Smaller than a WAN but bigger than a LAN.




Utilizes Internet Service Provider (ISP) or Telecommunications (Telco) provider.

SCADA/ICS


Supervisory Control and Data Acquisition/Industrial Control System




Communication between remote equipment of almost anything i.e.: pumping stations, robotic machines, etc.




A typical configuration includes an ICS server, Distributed Control System (DCS) devices creating a closed network, a remote terminal unit and a programmable logic controller.




Often used to analyze data from remote systems in real time.

Medianets


A Cisco architecture that can look at different types of media available and the application types and make a choice about which is the best combination to use.




Useful with Video Teleconferencing (VTC) and often used with Session Initiation Protocol (SIP)

Network Models

Peer-to-Peer and Client/Server
Peer-to-Peer Network

a network where all systems can share resources on their local computers as well as use resources from other systems.




Cheaper and easier to implement but doesn't work well with large numbers. Can have no more than 10 computers connected.




Can't backup files due to lack of centralized data storage.

Client/Server Network


A centralized network management model where a network administrator manages all network services including user management, security and backup procedures.




More expensive because it requires dedicated server hardware and software.




Most widely implemented model in real-world environments.




Client requests data from the server and presents that data to the users.

Centralized vs Distributed Computing


Centralized: one system provides both data storage and processing power for client systems. (i.e.: mainframes and dumb terminals)




Distributed: Process power is distributed between the client systems and the server.

Topology

A network's physical and logical layout.
Bus Topology


uses a trunk or backbone to connect all computers on the network. Uses T connectors or taps to connect systems. Each end of the physical bus must be terminated. No hub or switch is required.




Loose or missing terminators disrupt data transmissions. A break in the systems prevents all systems from accessing the network.




Uses IEEE 802.3 Ethernet standard.

Ring Topology


A logical ring meaning that the data travels in a circular fashion from one computer to another on a network. Also doesn't require a hub or switch.




If one system fails, the whole network fails.

Star topology

All computers and network devices connect to a central device called a hub or switch. Each connected device requires a single cable to be connected to a hub or switch creating a point-to-point connected between the device and hub or switch.




A single break in any cable doesn't cause the network to fail. However if the hub or switch fails the devices can't connect to the network.




Easy to troubleshoot and add or remove devices but more expensive to implement.

Mesh Topology (Wired)


incorporates a unique network design in which each computer on the network connects to every other, creating a point-to-point connection between every device on the network.




Purpose of mesh is to create a high level of redundancy.




One network cable fails, the data always has an alternative path to get to its destination.




Implementation is very complicated and troubleshooting is tricky.

Hybrid Mesh Topology


Creates a redundant point-to-point network connection between only specific network devices (such as the servers).




Most seen in WANs.

Infrastructure Wireless Topology


Used to extend a wired LAN to include wireless devices.




Wireless devices communicate with the wired LAN via an Access Point (AP) aka Wireless Access Point.




APs connect to the wired network.

Ad Hoc Wireless Topology


Devices communicate directly between themselves without an AP.




Connecting devices via Bluetooth is an example of an ad hoc network.

Point-to-Point Network (PtP)


A wireless network where the communication link travels from one node directly to another node.




Often used in wireless backbone systems such as microwave relay communications or as a replacement for a single wired communication cable.

Wireless Bridge

Used to connect two wired networks together over Wi-Fi.
Point-to-Multipoint Network (PtMP)

A wireless connection designed to link multiple wired networks.




Signals travel from a central node such as a base station of a cellular systems, an AP of a WLAN or a satellite.




Used in Wireless Internet Service Providers (WISPs), large corporate campuses, etc.

Wireless LAN (WLAN)

Wireless network that's dependent on a hotspot.




Coffee shops, train statins, restaurants or any public place uses hotspots.




Security is a concern and encryption should be used.

Wireless Mesh Networks


A wireless version of a Mesh topology. Each network node is connected to other nodes on the network.




Signal starts at a wireless base station (access point), attached to a wired network.




Extends the transmission distance by relaying the signal from one computer to another.




Cheaper than a wired mesh network.

Wireless Mesh


Created through the connection of wireless access points installed at each network user's locale.




Data signals in a wireless mesh rely on all nodes to propagate signals.

Advantages of a Wireless Mesh


Self-healing: ability to adapt to network failure and can function if a node is moved from one location to another. Possible due to wireless media and interconnected connections.




Scalable: Possible to add new systems to the network w/o cables.




Reliability: Due to the redundant number of paths for the data to travel ensures the data can reach its destination.




Cost: Self-configuring and doesn't needs cables. Can add, remove or relocate with little cost or disruption to the network.

Hybrid Topology


A combination of the star and bus topologies.




Can also refer to the combination of wired and wireless networks.

Creating a SOHO Network


1. List of requirements: Access to what


2. Device types/requirements: Cost


3. Environment limitations: If there's a wall that can block wireless connections.


4. Equipment limitations: number of ports on a network device.


5. Compatibility requirements: can they work well together?


6. Wired/Wireless considerations: Confirm if the area can go wireless.


7. Security considerations: Primary concern

SOHO Network


Stands for Small Office/Home Office Network




A network that serves 1 to 10 users in a small environment.




Consists of a SOHO router, and either a cable or DSL modem.

Demarcation Point (Demarc)


The point where the service provider stops being responsible for the line and it becomes your responsibility.




A box outside of a home or office located at the splitter nearest where the cable originates.

Media Access Control (MAC) layer

MAC address is defined at this layer. It's burned into the NIC card.

Logical Link Control (LLC) layer

Responsible for the error and flow-control mechanisms of the Data Link layer.

Layer 1 protocols

USB, Ethernet, DSL, ISDN, T-carrier links, GSM and SONET

Layer 2 protocols

High-Level Data Link Control (HDLC), Layer 2 Tunneling Protocol (L2TP), Point-to-Point Protocol (PPP), Point-to-Point Tunneling Protocol (PPTP), Spanning Tree Protocol (STP), & VLANs.

Layer 3 protocols

Routing Information Protocol (RIP), Open Shortest Path First (OSPF), Address Resolution Protocol (ARP), Reverse ARP (RARP), Asynchronous Transfer Mode (ATM), Intermediate System to Intermediate System (IS-IS), IP Security (IPsec) and Multiprotocol Layer Switching (MPLS)

Transport Layer mechanisms

Error checking ensures data is sent correctly



service addressing ensures data is passed to the right service



segmentation breaks data into packets for the lower levels to handle

Layer 4 protocols

User Datagram Protocol (UDP) connectionless



Transmission Control Protocol (TCP) connection-oriented

Data Flow Control (Layer 4)

How the receiving device accepts data in two ways:



Buffering: data is temporarily stored until destination device becomes available.



Windowing: data sent in groups of segments requiring only one acknowledgement.


Layer 5 Protocols

NetBIOS, Network File System (NFS) & Server Message Block (SMB)

Dynamic Host Configuration Protocol (DHCP)
enables ranges of IP addresses, known as scopes, to be defined on a server running a DHCP server application.
Static addressing

method of manually assigning an address from those available to you and allowing the host to always use that address.



DHCP Process


A system configured to use DHCP comes onto the network and broadcasts a special packet called DHCPDISCOVER to look for a DHCP server.




Server sees DHCPDISCOVER packet and picks it up. If it finds a scope for the network from which the packet originated, it chooses an address from the scope, reserves it and sends the address to the client in another packet called DHCPOFFER.




DHCPREQUEST packet notifies the server that the offer has been accepted after the selection process is completed.

DHCP and DNS Suffixes

suffixes define the DNS servers to be used and the order in which to use them. DHCP settings pushes a domain suffix search list to DNS clients.
DHCP Relays

an agent on the router that acts as a go-between for clients and the server. It makes the job of responding to requests easier.
IP Helper
Same as DHCP relay but by default will forward broadcasts for DHCP/BOOTP, TFTP, DNS, TACACS, the time service and the NetBIOS name/datagram service.
Domain Name Service (DNS)
Resolves hostnames to IP addresses
Dynamic DNS (DDNS)
A newer system that enables hosts to be dynamically registered with the DNS server.
DNS Namespace

Space that has logical divisions hierarchically organized such as .com, .gov, .uk, etc.
Fully Qualified Domain Name (FQDN)

includes all the components from the top of the DNS namespace to the host.
Top-Level Domain Names


com - Commercial Organizations


edu- Education Organizations


gov - US Government org


net - Network providers/centers


org - Non profit org


mil - Military


arpa - Reverse DNS lookup


de - country specific domain

Reverse Lookup

DNS performs IP address-to-hostname resolution using pointer (PTR) records.
Types of DNS Entries


A Record (address record) - maps a hostname to an IP address




MX - entries that correspond to mail exchanger systems




CNAME (Canonical Record) - creates alias records for a system.

DNS Records


Start of Authority (SOA) - A record of information containing data on DNS zones and other DNS records.




Name Server (NS): Stores information that identifies the name servers in the domain that store information for that domain.




Canonical Name (CNAME): Stores add'l hostnames or aliases for hosts in the domain.




Pointer (PTR): A pointer to the CNAME used to perform a reverse DNS lookup.




IPv6 Address (AAAA): Stores info for IPv6 addresses.




IPv4 Addresses (A): Stores info for IPv4 addresses.




Mail Exchange (MX): Stores info about there mail for the domain should be delivered.

Windows Internet Name Service (WINS)

a system on Windows networks used to enable NetBIOS names to be resolved to IP addressed.
Simple Network Management Protocol (SNMP)

enables network devices to communication information about their state to a central system.
Components of SNMP


Manager - a central system that acts as the central communication point for all SNMP-enabled devices on the network.




Agent - SNMP software configured with the manager's IP address to manage and monitor each device on the network.




Traps - Occurrences of certain events that the agent can communicate to the SNMP manager.

SNMP Management Systems

A computer running a special piece of software called a Network Management System (NMS). It allows you to monitor all the devices on a network.
SNMP Agent

any device that can run a small software component that facilitates communication with an SNMP manager.
Management Information Bases (MIB)

defines which parameters are accessible, which are read-only and which can be set.

SNMP Communities

Logical groupings of systems.
SNMPv3

The latest version of SNMP that supports authentication and encryption. Not available in the previous versions.
Connection-Oriented Protocol

Guarantees data delivery via the sending device re-sending any packet that the destination device doesn't receive.
Connectionless Protocol

Offers only a best effort delivery mechanism. Information is sent, but the sending device doesn't receive confirmation that it was received. These are popular in applications for streaming audio and video.
Internet Protocol (IP)

Used to transport data from one node on a network to another. It's a connectionless protocol that operates at Layer 3.
Transmission Control Protocol (TCP)
A Layer 4, connection-oriented protocol. It uses the 3-handed handshake where it sends a message called a SYN to the target host. Target host then opens a connection for the request then sends back an acknowledgement message called an ACK. The originating host then sends another ACK saying the ACK has been received and the session is ready to be used to transfer data.
User Datagram Protocol (UDP)

A fire-and-forget protocol that assumes the data sent will reach its destination.

File Transfer Protocol (FTP)

Provides for the uploading and downloading of files from a remote host running FTP server software. A Layer 7 protocol. Operates on Ports 20 & 21.

Secure FTP (SFTP)

Based on secured-shell (SSH) technology that provides robust authentication between sender & receiver, and encryption.
Trivial FTP (TFTP)

Associated with simple downloads. A Layer 7 protocol that uses UDP. Port 69
Simple Mail Transfer Protocol (SMTP)

Defines how mail messages are sent between hosts. Uses TCP. Port 25.
Hypertext Transfer Protocol (HTTP)

Protocol that enables text, graphics, multimedia and other material to be downloaded from an HTTP server. It uses an Uniform Resource Locator (URL) to determine what page should be downloaded from the remote server. Uses Port 80.
Secure HTTP (SHTTP)
Uses Secure Sockets Layer (SSL) which encrypts information sent between client & host. Uses Port 443.

Post Office Protocol version 3(POP3)/Internet Message Access Protocol version 4(IMAP 4)

Mechanisms for downloading, or pulling email from a server. Difference between the two is POP3 transmits passwords in clear text where IMAP uses an authentication system which makes it difficult to determine a password. Ports: POP3 - 110, IMAP - 143.

Telnet

A virtual terminal protocol that enables sessions to be opened on a remote host. Port 23.

Secure Shell (SSH)
A secure alternative to Telnet which encrypts data as it travels between systems. Port 22.
Internet Control Message Protocol (ICMP)

Works with the IP layer to provide error checking and reporting functionality.
Address Resolution Protocol (ARP)/Reverse ARP (RARP)

ARP - Resolves IP addresses to MAC addresses.




RARP - Resolves MAC addresses to IP addresses.

Network Time Protocol (NTP)

Facilitates communication of time between systems. Port 123.
Network News Transfer Protocol (NNTP)

Posts and retrieves messages from news groups. Port 119.
Secure Copy Protocol (SCP)

Provides a secure means to copy files between systems on a network.

Lightweight Directory Access Protocol (LDAP)

Provides a mechanism to access query directory service systems.
Internet Group Management Protocol (IGMP)

Part of the TCP/IP Suite - Manages multicast groups.




Multicasting: groups of network devices who are able to send and receive data between the members of a group at one time.

Transport Layer Security (TLS)

A security protocol designed to ensure privacy between communicating client/server applications. Two Layers of TLS:




TLS Record - Ensures connection made is private using encryption.




TLS Handshake - Used for authentication between client & server.

Voice over Internet Protocol (VoIP)

Enables regular voice conversations to occur by traveling through IP packets and via the Internet.

Session Initiation Protocol (SIP)
Layer 7 protocol designed to establish and maintain multimedia sessions for audio/video conferencing, online gaming & person-to-person communication over the Internet. Uses TCP or UDP. Port 5060 & 5061.

Real-Time Transport Protocol (RTP)

Transports real-time data including audio and video. Ports 5004 and 5005.
Remote Desktop Protocol (RDP)

Used in Windows for remote connections. Port 3389.
Server Message Block (SMB)

Used on network for providing access to resources. Port 445.