• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/213

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

213 Cards in this Set

  • Front
  • Back

Small Home Networks

Connect a few computers to each other and the Internet

Small Office/ Home Office

Enables computer within a home or remote office to connect to a corporate network

Medium to Large Networks

Many locations with hundreds or thousands of interconnected computers

World Wide Networks

Connects hundreds of millions of computers world wide - such as the Internet

Host or End devices

Every computer connected to a network is called _______

Servers

Computers that provide information to end devices on the network

Clients

Computers that send requests to the servers to retrieve information such as a web page from a web server or email from an email server

Separate Computers

Client and server software usually run on _______

Peer-to-peer networks

In small business or homes, it is typical for a client to also function as the server

Easy to set up


Less complex


Lower cost

Advantages of peer to peer networking

No centralized administration


Not as secure


Not scalable


Slower performance

Disadvantages of Peer to peer networking

Network

Can be as simple as a single cable connecting two computers or as complex as a collection of networks that span the globe

Devices


Media


Services

Three board categories of network components

End devices

Where a message originates from or where it is received



Data originates here, flows through the network and arrives here

Intermediary devices

Interconnects end devices in a network



Switches, wireless access points, routers and firewalls

1. Regenerate and retransmit data signals


2. Maintain information about what pathways exist through the network and internetwork


3. Notify other devices of errors and communication failures

Role of an intermediary device

Metallic wires within cables


Fiber optics


Wireless transmission

Three types of media

Network diagrams or topology diagrams

Use symbols to represent devices within the network

1. Desktop computers


2. Laptop


3. Printer


4. IP phone


5. Wireless Tablet

End Devices

1. Wireless router


2. LAN switch


3. Router


4. Multilayer Switch


5. Firewall Appliance

Intermediary Devices

1. Wireless media


2. LAN media


3. WAN media

Network Media

Local Area Network (LAN)

Spans a small geographic area owned or operated by an individual or IT department

Wide Area Network (WAN)

Spans a large geographic area typically involving a telecommunication service provider

Metropolitan Area Network (MAN)


Wireless LAN (WLAN)


Storage Area Network (SAN)

Other types of network

LAN

Provides high speed bandwidth to end and intermediary devices within the network

WAN

Usually administered by multiple service providers.


Provide slower speed links between LANs

Internet

A worldwide collection of interconnected LANs and WANs.



Not owned by any individual or group

IETF


ICANN


IAB

Maintain the structure of Internet

Intranet

A private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations member or others with authorization

Extranet

An organization might use ________ to provide secure access to their network for individuals who work for a different organization that need access to their data on their network

Broadband cable


Broadband digital subscriber line (DSL)


Wireless WANs


Mobile services

Popular services for home users and small offices

Business class interconnections

Usually provides by service providers (SP) and may include: business DSL, leased lines and metro ethernet

Cable

High BW, always on, internet connection offered by cable television service providers

DSL

High BW, always on


Internet connection that runs over a telephone line

Cellular

Uses a cellphone network to connect to the internet


Only available where you can get a cellular signal

Satellite

Major benefit to rural are without Internet Service Providers

Dial-up telephone

An inexpensive low BW option using a model

Dedicated Leased Line

Reserved circuits within the service provider's network that connect distant offices with private voice and/or data networking

Ethernet WAN

Extends LAN access technology into the WAN

DSL

Business DSL is available in various formats including Symmetric Digital Subscriber Lines (SDSL)

Satellite

Can provide a connection when a wired solution is not available

Packet Tracer

A fun software program which will help you with your CCNA studies by allowing you to experiment with network behavior, build networks, and find the answers to your "what if" questions.

Traditional Separate Networks

Each of these networks used different technologies to carry communication signals using a different set of rules and standards

Converged data networks

Carry multiple services on one link including data, voice and video



Can deliver data, voice, and video between different types of devices over the same network infrastructure

Network Architecture

Refers to the technologies that support the infrastructure that moves data across the network

Fault tolerance


Scalability


Quality of Service


Security

Four basic characteristics that underlying architectures need to address

Fault Tolerant Network

Limits the impact of a failure by limiting the number of affected devices



Not possible with circuit-like switched networks which establish dedicated ckts

Multiple paths

Required for Fault tolerance

Redundancy, packet switched network

In fault tolerance, reliable network provide ___________ by implementing a __________________.

Scalable Network

Can expand quickly and easily to support new users and applications without impacting the performance of services to existing users

Quality of Service

The primary mechanism used to ensure reliable delivery of content for all users

Network Infrastructure Security

Physical security of network devices



Preventing unauthorized access to the management software on those devices

Information security

Protection of the information or data transmitted over the network

1. Confidentiality


2. Integrity


3. Availability

3 goals of network security

Confidentiality

Only intended recipients can read the data

Integrity

Assurance that the data has not be altered with during transmission

Availability

Assurance of timely and reliable access to data for authorized users

1. BYOD


2. Online Collaboration


3. Video Collaboration


4. Cloud Computing

New Trends

Cloud computing

A global trend that allows us to store personal files or backup our data on servers over the internet

Data centers

Cloud computing is made possible by ___________

Public Clouds

Services and applications are made available to the general public through a pay per use model or for free

Private clouds

Applications and services are intended for a specific organization or entity such as the government

Hybrid clouds

Made up of two or more cloud types

Smart home technology

A growing trend that allows technology to be integrated into everyday appliances which allows them to interconnect with other devices

Powerline networking

Can allow devices to connect to a LAN where data network cables or wireless communications are not a viable option

Network security

An integral part of networking regardless of the size of the network

1. Viruses, worms and trojan horses


2. Spyware and adware


3. Zero-day attacks /zero-hour attacks


4. Hacker attacks


5. Denial of service attacks


6. Data interception and theft


7. Identity theft

External threats

Antivirus and antispyware


Firewall filtering

Network security for components for home or small office networks

Access control lists

Used to further filter access and traffic forwarding

Intrusion prevention systems

Used to identity fast-spreading threats such as zero-day attacks

Virtual private networks

Used to provide secure access for remote workers

OS Shell

Either a command-line interface (CLI) or a graphical user interface (GUI) and enables a user to interface with application

OS Kernel

Communicates directly with the hardware resources are used to meet software requirements

Hardware

The physical part of a computer including underlying electronics

Console Port

Out of band serial port used primarily for management purpose such as the initial configuration of the router

Secure Shell (SSH)

Inband method for remotely and securely establishing a CLI session over a network

Encrypted

In SSH, user authentication, password, and commands sent over the network are _____________

Telnet

Inband interfaces remotely establishing a CLI session through a virtual interface, over a network

Terminal Emulation Program

Regardless of access method, a ___________ will be required

PuTTY, Tera Term, SecureCRT and OS X Terminal

Popular terminal emulation programs

Hierarchical command

The Cisco IOS modes use a ___________

User EXEC mode

Allows only a limited number of basic monitoring commands

View-only

User EXEC mode is often referred to as ________ mode

Privileged EXEC mode

Allows the execution of configuration and management commands

Enable mode

Privileged EXEC mode is often referred to as ___________ because it requires the enable user EXEC command

Global Configuration or global config

Primary configuration mode

Configure terminal

Command to access global config

Interface mode

To configure one of the network interfaces

Line mode

To configure the console, AUX, Telnet, or SSH access

Enable command

To move from user EXEC mode to privileged EXEC mode

Disable command

To return to user EXEC mode

Exit

Used to move from a specific mode to the previous more general mode, such as from the interface mode to global config

End

Can used to exit out of the global config mode regardless of which config mode you are in

^z

Works the same as end

Keyword

A specific parameter defined in the operating system

Argument

Not predefined; a value or variable defined by the user

Description string

The command is used to add a description to an interface

Ping ip address

The command ping and the user-defined argument is the ip address of the destination device

IOS command syntax check

The command line interpreter checks an entered command from left to right to determine what action is being requested

Down Arrow

Allows the user to scroll throught command history

Up arrow

Allows the user to scroll backward through commands

Tab

Completes the remainder of a partially entered command

Ctrl A

Moves to the beginning of the line

Ctrl E

Move to the end of the line

Ctrl R

Redisplays a line

Ctrl Z

Exits the configuration mode and returns to user EXEC

Ctrl C

Exits the configuration mode or aborts the current command

Ctrl shift c

Allows the user to interrupt an IOS process

Hostname name global config command

Used to assign a name

Enable secret password global config command

Secure privileged EXEC access

Line console 0


password password


Login

Secure user EXEC

Line vty 0 15


Password password


Login

Secure remote Telnet or SSH access

Startup-config and running-config

Displays most passwords in plaintext.


This is a security threat because anyone can see the passwords if the have access to those files

Service password encryption global config command

Encrypt all passwords


It does stop shoulder surfing

Banner

Messages that are displayed


Important part of the legal process

banner motd

Code to enter a banner

Running configuration

Stored in RAM



Contains the current configuration on a Cisco IOS device



Configuration changes are stored in this file



If power is interrupted, this will be lost

Show startup config

Command to display contents of the running configuration

Startup config file

Stored in the NVRAM



Contains the configuration that will be used by the device upon reboot



If power is interrupted, it is not lost or erased

Show running-config

Command to display the content of startup config

Copy running-config startup-config

Command to save the running configuration

Reload privileged EXEC mode command

If configuration changes do not have the desired effect, they can be removed individually or the device can be rebooted to the last saved configuration using the ________

Reload privileged EXEC mode command

This command restores the startup config

Erase startup config

If undesired changes were saved to the startup config, it nay be necessary to clear all the configs using _________

IP Address

Uniquely indentifies the switch on the network

Subnet Mask

Identifies the network and host portion in the IP address

Enabled

Using the no shutdown command

ipconfig

The IP configuration on a windows host is verified using _________

Show ip interface brief

To verify the interfaces and address settigs of intermediary devices like switches and routers

Ping

Can be used to test the connectivity to another device on the network or a website on the internet

1. Source


2. Destination


3. Channel

3 elements of communication

Encoding


Delivery options


Formating and encapsulation


Timing


Size

Protocols used in network communications

Message encoding

Messages are first converted into bits by the sending host

Message formatting and encapsulation

There is an agreed format for letters and addressing letters which is required for proper delivery

Encapsulation

Putting the letter into the addressed envelope

Frame

Each computer message is encapsulated in a specific format called ________ before it is sent over the network



Acts like an envelope providing destination address and source address

Message size

Humans break long messages into smaller parts or sentences

Each piece is sent in a separate frames


Each frame has its own addressing information

Long messages must be broken into smaller pieces:

Access method

Hosts on a network need to know when to begin sending messages and how to respond when collisions occur

Flow control

Correct timing to avoid overwhelming rhe destination and ensure information is received

Response timeout

Specify how long to wait for responses and what action to take if a response timeout occurs

Unicast message

One to one delivery

Multicast message

One to many delivery

Broadcast message

One to all delivery

Protocol suites

Implemented by hosts and networking devices in software, hardware or both



Viewed in terms of layers, wth each higher level service depending on the functionality defined by the protocols shown kng the lower levels

Networking protocols

Defined a common format and set of rules for exchanging messages between devices

HTTP

An application protocol that governs the way a web server and a web client interact

TCP

Transport protocol that manages the individual conversations

IP

Encapsulates the TCP segments into packets, assigns addresses, and delivers to the destination host

Ethernet

Allows communication over a data link and the physical transmission of data on the network media

Protocol suite

A set of protocols that work together to provide comprehensive network communication services



May be specified by a standards organization or developed by a vendor

TCP/IP protocol suite

An open standard, the protocols are freely available, and any vendor is able to implement these protocols on their hardware or in their software

Advanced research projects agency (ARPANET)

The predecessor to today's internet



Funded by the US dept of defense for use by univ and research lab

DNS

Application layer; Name system

DNS

Application layer; Name system

BOOTP


DHCP

Application layer; Host Config

SMTP


POP


IMAP

Application layer; Email

FTP


TFTP

Application layer; File transfer

HTTP

Application layer; Web

UDP


TCP

Transport layer

IP


NAT

Internet layer

ICMP

Internet layer;IP support

OSPF


EIGRP

Internet layer; Routing protocols

ARP


PPP


Ethernet


Interface Drivers

Network Access Layer

1. Webserver prepares the HTML page, HTTP application layer protocol sends the data to the transport layer



2. Transport layer breaks the data into segments and identifies each



3. The IP source and destination addresses are added, creating an IP packet



4. Ethernet information is then added creating the ethernet frame, or data link frame

TCP/IP Communication sending process

1. The Ethernet header is removed


2. Then the IP header


3. Then the Transport layer header


4. The HTTP information is processed and sent to the client's web browser

TCP/IP Communication receiving process

Standards organization

Usually vendor-neutral, non profit organizations established to develop and promote the concept of open standards

Internet society (SOC)

Promotes open development and evolution of internet use globally

Internet architecture board (IAB)

Management and development of internet standards

Internet engineering task force (IETF)

Develops, updates, and maintains internet and TCP/IP protocols

Internet corporation for assigned name and numbers (ICANN)

Coordinates IP address allocation and management of domain names

Internet assigned numbers authority (IANA)

Manages IP address allocation, domain name management, and protocol identifiers for ICANN

Institute of electrical and electronics engineering (IEEE)

Dedicated to advancing technological innovation and creating standards in a wide area of industries including networking

Electronic industries alliance (EIA)

Standards related to electrical wiring, connectors and network racks

Telecommunications industry association (TIA)

Standards for radio equipment, cellular towers, voice over IP (VoIP) devices, and satellite communications

International telecommunications union- telecommunications standards sector (ITU-T)

Standards for video compression, internet protocol television (IPTV), and broadband comms

Layered model

Providing a common language to describe networking functions and capabilitied

Application


Presentation


Session


Transport


Network


Data Link


Physical

OSI Reference Model

Application

Contains protocols used for process to process comms

Presentation

Provides for common representation of the data

Session

Provides services to the presentation layer to organize its dialogue and to manage data exchange

Transport

Defines services to exchange the individual pieces of data over the network between identified end devices

Data Link

Provides methods for exchanging data frames between devices over a common media

Physical

Describes the mechanical, electrical, functional, and procedural means to transmit bits across physical connection

TCP/IP Protocol Model

Created in the early 1970s for internetwork comms



Open standard

Internet Model

Other term for TCP/IP Model

OSI Model


Application


Presentation


Session

TCP/IP Model


Application

OSI Model


Data Link


Physical

TCP/IP model


Network access

Application

In tcp/ip model, it represents data to the user, plus encoding and dialog cont

Transport

In tcp/ip model, it supports communication between various devices across direct networks

Internet

In tcp/ip model, it determines the best parh through the network

Network access

In tcp/ip model, controls the hardware devices and media that make up

Message segmentation

Large streams of data are divided into smaller, more manageable pieces to sebd over the network.

Multiplexing

By sending smalle pieces, mang different conversations can br interleaved on the network called ___________

Encapsulation process

As application data is passed down the protocol stack, information is added at each level

Protocol data unit (PDU)

It is the form that the data taked at each layer

Application layer PDU

Data

Transport layer PDU

Segment

Network Layer PDU

Packet

Data link layer PDU

Frame

Physical layer PDU

Bits

1. Data is divided into segments


2. The TCP segment is encapsulated in the IP packet


3. The IP packet is encapsulated in the Ethernet frame

Encapsulation process

De-encapsulation

The process used by a receiving device to remove one or more of the protocol headers

Network layer source and destination addresses

Responsible for delivering the IP packet from the original source to the final destination

Source IP address

The IP address of the sending device, the original source of the packet

Destination IP address

The IP address of the receiving device, the final destination of the packet

Data link address

The purpose of this is to deliver the data link frame from one network interface to another network interface on the same network

Network layer addresses or IP address

Indicate the original source and final destination

Network portion

The left most part of the address indicates which network the IP address is a member of

Host portion

The remaining part of the address identifies a specific device on the network

Source MAC address

Address of sending device

Destination MAC address

Address of receiving device

Wireless internet service provider

An ISP that connects subscribers to designated access point or hotspots