Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
213 Cards in this Set
- Front
- Back
Small Home Networks |
Connect a few computers to each other and the Internet |
|
Small Office/ Home Office |
Enables computer within a home or remote office to connect to a corporate network |
|
Medium to Large Networks |
Many locations with hundreds or thousands of interconnected computers |
|
World Wide Networks |
Connects hundreds of millions of computers world wide - such as the Internet |
|
Host or End devices |
Every computer connected to a network is called _______ |
|
Servers |
Computers that provide information to end devices on the network |
|
Clients |
Computers that send requests to the servers to retrieve information such as a web page from a web server or email from an email server |
|
Separate Computers |
Client and server software usually run on _______ |
|
Peer-to-peer networks |
In small business or homes, it is typical for a client to also function as the server |
|
Easy to set up Less complex Lower cost |
Advantages of peer to peer networking |
|
No centralized administration Not as secure Not scalable Slower performance |
Disadvantages of Peer to peer networking |
|
Network |
Can be as simple as a single cable connecting two computers or as complex as a collection of networks that span the globe |
|
Devices Media Services |
Three board categories of network components |
|
End devices |
Where a message originates from or where it is received Data originates here, flows through the network and arrives here |
|
Intermediary devices |
Interconnects end devices in a network
Switches, wireless access points, routers and firewalls |
|
1. Regenerate and retransmit data signals 2. Maintain information about what pathways exist through the network and internetwork 3. Notify other devices of errors and communication failures |
Role of an intermediary device |
|
Metallic wires within cables Fiber optics Wireless transmission |
Three types of media |
|
Network diagrams or topology diagrams |
Use symbols to represent devices within the network |
|
1. Desktop computers 2. Laptop 3. Printer 4. IP phone 5. Wireless Tablet |
End Devices |
|
1. Wireless router 2. LAN switch 3. Router 4. Multilayer Switch 5. Firewall Appliance |
Intermediary Devices |
|
1. Wireless media 2. LAN media 3. WAN media |
Network Media |
|
Local Area Network (LAN) |
Spans a small geographic area owned or operated by an individual or IT department |
|
Wide Area Network (WAN) |
Spans a large geographic area typically involving a telecommunication service provider |
|
Metropolitan Area Network (MAN) Wireless LAN (WLAN) Storage Area Network (SAN) |
Other types of network |
|
LAN |
Provides high speed bandwidth to end and intermediary devices within the network |
|
WAN |
Usually administered by multiple service providers. Provide slower speed links between LANs |
|
Internet |
A worldwide collection of interconnected LANs and WANs. Not owned by any individual or group |
|
IETF ICANN IAB |
Maintain the structure of Internet |
|
Intranet |
A private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations member or others with authorization |
|
Extranet |
An organization might use ________ to provide secure access to their network for individuals who work for a different organization that need access to their data on their network |
|
Broadband cable Broadband digital subscriber line (DSL) Wireless WANs Mobile services |
Popular services for home users and small offices |
|
Business class interconnections |
Usually provides by service providers (SP) and may include: business DSL, leased lines and metro ethernet |
|
Cable |
High BW, always on, internet connection offered by cable television service providers |
|
DSL |
High BW, always on Internet connection that runs over a telephone line |
|
Cellular |
Uses a cellphone network to connect to the internet Only available where you can get a cellular signal |
|
Satellite |
Major benefit to rural are without Internet Service Providers |
|
Dial-up telephone |
An inexpensive low BW option using a model |
|
Dedicated Leased Line |
Reserved circuits within the service provider's network that connect distant offices with private voice and/or data networking |
|
Ethernet WAN |
Extends LAN access technology into the WAN |
|
DSL |
Business DSL is available in various formats including Symmetric Digital Subscriber Lines (SDSL) |
|
Satellite |
Can provide a connection when a wired solution is not available |
|
Packet Tracer |
A fun software program which will help you with your CCNA studies by allowing you to experiment with network behavior, build networks, and find the answers to your "what if" questions. |
|
Traditional Separate Networks |
Each of these networks used different technologies to carry communication signals using a different set of rules and standards |
|
Converged data networks |
Carry multiple services on one link including data, voice and video Can deliver data, voice, and video between different types of devices over the same network infrastructure |
|
Network Architecture |
Refers to the technologies that support the infrastructure that moves data across the network |
|
Fault tolerance Scalability Quality of Service Security |
Four basic characteristics that underlying architectures need to address |
|
Fault Tolerant Network |
Limits the impact of a failure by limiting the number of affected devices Not possible with circuit-like switched networks which establish dedicated ckts |
|
Multiple paths |
Required for Fault tolerance |
|
Redundancy, packet switched network |
In fault tolerance, reliable network provide ___________ by implementing a __________________. |
|
Scalable Network |
Can expand quickly and easily to support new users and applications without impacting the performance of services to existing users |
|
Quality of Service |
The primary mechanism used to ensure reliable delivery of content for all users |
|
Network Infrastructure Security |
Physical security of network devices Preventing unauthorized access to the management software on those devices |
|
Information security |
Protection of the information or data transmitted over the network |
|
1. Confidentiality 2. Integrity 3. Availability |
3 goals of network security |
|
Confidentiality |
Only intended recipients can read the data |
|
Integrity |
Assurance that the data has not be altered with during transmission |
|
Availability |
Assurance of timely and reliable access to data for authorized users |
|
1. BYOD 2. Online Collaboration 3. Video Collaboration 4. Cloud Computing |
New Trends |
|
Cloud computing |
A global trend that allows us to store personal files or backup our data on servers over the internet |
|
Data centers |
Cloud computing is made possible by ___________ |
|
Public Clouds |
Services and applications are made available to the general public through a pay per use model or for free |
|
Private clouds |
Applications and services are intended for a specific organization or entity such as the government |
|
Hybrid clouds |
Made up of two or more cloud types |
|
Smart home technology |
A growing trend that allows technology to be integrated into everyday appliances which allows them to interconnect with other devices |
|
Powerline networking |
Can allow devices to connect to a LAN where data network cables or wireless communications are not a viable option |
|
Network security |
An integral part of networking regardless of the size of the network |
|
1. Viruses, worms and trojan horses 2. Spyware and adware 3. Zero-day attacks /zero-hour attacks 4. Hacker attacks 5. Denial of service attacks 6. Data interception and theft 7. Identity theft |
External threats |
|
Antivirus and antispyware Firewall filtering |
Network security for components for home or small office networks |
|
Access control lists |
Used to further filter access and traffic forwarding |
|
Intrusion prevention systems |
Used to identity fast-spreading threats such as zero-day attacks |
|
Virtual private networks |
Used to provide secure access for remote workers |
|
OS Shell |
Either a command-line interface (CLI) or a graphical user interface (GUI) and enables a user to interface with application |
|
OS Kernel |
Communicates directly with the hardware resources are used to meet software requirements |
|
Hardware |
The physical part of a computer including underlying electronics |
|
Console Port |
Out of band serial port used primarily for management purpose such as the initial configuration of the router |
|
Secure Shell (SSH) |
Inband method for remotely and securely establishing a CLI session over a network |
|
Encrypted |
In SSH, user authentication, password, and commands sent over the network are _____________ |
|
Telnet |
Inband interfaces remotely establishing a CLI session through a virtual interface, over a network |
|
Terminal Emulation Program |
Regardless of access method, a ___________ will be required |
|
PuTTY, Tera Term, SecureCRT and OS X Terminal |
Popular terminal emulation programs |
|
Hierarchical command |
The Cisco IOS modes use a ___________ |
|
User EXEC mode |
Allows only a limited number of basic monitoring commands |
|
View-only |
User EXEC mode is often referred to as ________ mode |
|
Privileged EXEC mode |
Allows the execution of configuration and management commands |
|
Enable mode |
Privileged EXEC mode is often referred to as ___________ because it requires the enable user EXEC command |
|
Global Configuration or global config |
Primary configuration mode |
|
Configure terminal |
Command to access global config |
|
Interface mode |
To configure one of the network interfaces |
|
Line mode |
To configure the console, AUX, Telnet, or SSH access |
|
Enable command |
To move from user EXEC mode to privileged EXEC mode |
|
Disable command |
To return to user EXEC mode |
|
Exit |
Used to move from a specific mode to the previous more general mode, such as from the interface mode to global config |
|
End |
Can used to exit out of the global config mode regardless of which config mode you are in |
|
^z |
Works the same as end |
|
Keyword |
A specific parameter defined in the operating system |
|
Argument |
Not predefined; a value or variable defined by the user |
|
Description string |
The command is used to add a description to an interface |
|
Ping ip address |
The command ping and the user-defined argument is the ip address of the destination device |
|
IOS command syntax check |
The command line interpreter checks an entered command from left to right to determine what action is being requested |
|
Down Arrow |
Allows the user to scroll throught command history |
|
Up arrow |
Allows the user to scroll backward through commands |
|
Tab |
Completes the remainder of a partially entered command |
|
Ctrl A |
Moves to the beginning of the line |
|
Ctrl E |
Move to the end of the line |
|
Ctrl R |
Redisplays a line |
|
Ctrl Z |
Exits the configuration mode and returns to user EXEC |
|
Ctrl C |
Exits the configuration mode or aborts the current command |
|
Ctrl shift c |
Allows the user to interrupt an IOS process |
|
Hostname name global config command |
Used to assign a name |
|
Enable secret password global config command |
Secure privileged EXEC access |
|
Line console 0 password password Login |
Secure user EXEC |
|
Line vty 0 15 Password password Login |
Secure remote Telnet or SSH access |
|
Startup-config and running-config |
Displays most passwords in plaintext. This is a security threat because anyone can see the passwords if the have access to those files |
|
Service password encryption global config command |
Encrypt all passwords It does stop shoulder surfing |
|
Banner |
Messages that are displayed Important part of the legal process |
|
banner motd |
Code to enter a banner |
|
Running configuration |
Stored in RAM Contains the current configuration on a Cisco IOS device Configuration changes are stored in this file If power is interrupted, this will be lost |
|
Show startup config |
Command to display contents of the running configuration |
|
Startup config file |
Stored in the NVRAM Contains the configuration that will be used by the device upon reboot If power is interrupted, it is not lost or erased |
|
Show running-config |
Command to display the content of startup config |
|
Copy running-config startup-config |
Command to save the running configuration |
|
Reload privileged EXEC mode command |
If configuration changes do not have the desired effect, they can be removed individually or the device can be rebooted to the last saved configuration using the ________ |
|
Reload privileged EXEC mode command |
This command restores the startup config |
|
Erase startup config |
If undesired changes were saved to the startup config, it nay be necessary to clear all the configs using _________ |
|
IP Address |
Uniquely indentifies the switch on the network |
|
Subnet Mask |
Identifies the network and host portion in the IP address |
|
Enabled |
Using the no shutdown command |
|
ipconfig |
The IP configuration on a windows host is verified using _________ |
|
Show ip interface brief |
To verify the interfaces and address settigs of intermediary devices like switches and routers |
|
Ping |
Can be used to test the connectivity to another device on the network or a website on the internet |
|
1. Source 2. Destination 3. Channel |
3 elements of communication |
|
Encoding Delivery options Formating and encapsulation Timing Size |
Protocols used in network communications |
|
Message encoding |
Messages are first converted into bits by the sending host |
|
Message formatting and encapsulation |
There is an agreed format for letters and addressing letters which is required for proper delivery |
|
Encapsulation |
Putting the letter into the addressed envelope |
|
Frame |
Each computer message is encapsulated in a specific format called ________ before it is sent over the network Acts like an envelope providing destination address and source address |
|
Message size |
Humans break long messages into smaller parts or sentences |
|
Each piece is sent in a separate frames Each frame has its own addressing information |
Long messages must be broken into smaller pieces: |
|
Access method |
Hosts on a network need to know when to begin sending messages and how to respond when collisions occur |
|
Flow control |
Correct timing to avoid overwhelming rhe destination and ensure information is received |
|
Response timeout |
Specify how long to wait for responses and what action to take if a response timeout occurs |
|
Unicast message |
One to one delivery |
|
Multicast message |
One to many delivery |
|
Broadcast message |
One to all delivery |
|
Protocol suites |
Implemented by hosts and networking devices in software, hardware or both Viewed in terms of layers, wth each higher level service depending on the functionality defined by the protocols shown kng the lower levels |
|
Networking protocols |
Defined a common format and set of rules for exchanging messages between devices |
|
HTTP |
An application protocol that governs the way a web server and a web client interact |
|
TCP |
Transport protocol that manages the individual conversations |
|
IP |
Encapsulates the TCP segments into packets, assigns addresses, and delivers to the destination host |
|
Ethernet |
Allows communication over a data link and the physical transmission of data on the network media |
|
Protocol suite |
A set of protocols that work together to provide comprehensive network communication services May be specified by a standards organization or developed by a vendor |
|
TCP/IP protocol suite |
An open standard, the protocols are freely available, and any vendor is able to implement these protocols on their hardware or in their software |
|
Advanced research projects agency (ARPANET) |
The predecessor to today's internet Funded by the US dept of defense for use by univ and research lab |
|
DNS |
Application layer; Name system |
|
DNS |
Application layer; Name system |
|
BOOTP DHCP |
Application layer; Host Config |
|
SMTP POP IMAP |
Application layer; Email |
|
FTP TFTP |
Application layer; File transfer |
|
HTTP |
Application layer; Web |
|
UDP TCP |
Transport layer |
|
IP NAT |
Internet layer |
|
ICMP |
Internet layer;IP support |
|
OSPF EIGRP |
Internet layer; Routing protocols |
|
ARP PPP Ethernet Interface Drivers |
Network Access Layer |
|
1. Webserver prepares the HTML page, HTTP application layer protocol sends the data to the transport layer 2. Transport layer breaks the data into segments and identifies each 3. The IP source and destination addresses are added, creating an IP packet 4. Ethernet information is then added creating the ethernet frame, or data link frame |
TCP/IP Communication sending process |
|
1. The Ethernet header is removed 2. Then the IP header 3. Then the Transport layer header 4. The HTTP information is processed and sent to the client's web browser |
TCP/IP Communication receiving process |
|
Standards organization |
Usually vendor-neutral, non profit organizations established to develop and promote the concept of open standards |
|
Internet society (SOC) |
Promotes open development and evolution of internet use globally |
|
Internet architecture board (IAB) |
Management and development of internet standards |
|
Internet engineering task force (IETF) |
Develops, updates, and maintains internet and TCP/IP protocols |
|
Internet corporation for assigned name and numbers (ICANN) |
Coordinates IP address allocation and management of domain names |
|
Internet assigned numbers authority (IANA) |
Manages IP address allocation, domain name management, and protocol identifiers for ICANN |
|
Institute of electrical and electronics engineering (IEEE) |
Dedicated to advancing technological innovation and creating standards in a wide area of industries including networking |
|
Electronic industries alliance (EIA) |
Standards related to electrical wiring, connectors and network racks |
|
Telecommunications industry association (TIA) |
Standards for radio equipment, cellular towers, voice over IP (VoIP) devices, and satellite communications |
|
International telecommunications union- telecommunications standards sector (ITU-T) |
Standards for video compression, internet protocol television (IPTV), and broadband comms |
|
Layered model |
Providing a common language to describe networking functions and capabilitied |
|
Application Presentation Session Transport Network Data Link Physical |
OSI Reference Model |
|
Application |
Contains protocols used for process to process comms |
|
Presentation |
Provides for common representation of the data |
|
Session |
Provides services to the presentation layer to organize its dialogue and to manage data exchange |
|
Transport |
Defines services to exchange the individual pieces of data over the network between identified end devices |
|
Data Link |
Provides methods for exchanging data frames between devices over a common media |
|
Physical |
Describes the mechanical, electrical, functional, and procedural means to transmit bits across physical connection |
|
TCP/IP Protocol Model |
Created in the early 1970s for internetwork comms
Open standard |
|
Internet Model |
Other term for TCP/IP Model |
|
OSI Model Application Presentation Session |
TCP/IP Model Application |
|
OSI Model Data Link Physical |
TCP/IP model Network access |
|
Application |
In tcp/ip model, it represents data to the user, plus encoding and dialog cont |
|
Transport |
In tcp/ip model, it supports communication between various devices across direct networks |
|
Internet |
In tcp/ip model, it determines the best parh through the network |
|
Network access |
In tcp/ip model, controls the hardware devices and media that make up |
|
Message segmentation |
Large streams of data are divided into smaller, more manageable pieces to sebd over the network. |
|
Multiplexing |
By sending smalle pieces, mang different conversations can br interleaved on the network called ___________ |
|
Encapsulation process |
As application data is passed down the protocol stack, information is added at each level |
|
Protocol data unit (PDU) |
It is the form that the data taked at each layer |
|
Application layer PDU |
Data |
|
Transport layer PDU |
Segment |
|
Network Layer PDU |
Packet |
|
Data link layer PDU |
Frame |
|
Physical layer PDU |
Bits |
|
1. Data is divided into segments 2. The TCP segment is encapsulated in the IP packet 3. The IP packet is encapsulated in the Ethernet frame |
Encapsulation process |
|
De-encapsulation |
The process used by a receiving device to remove one or more of the protocol headers |
|
Network layer source and destination addresses |
Responsible for delivering the IP packet from the original source to the final destination |
|
Source IP address |
The IP address of the sending device, the original source of the packet |
|
Destination IP address |
The IP address of the receiving device, the final destination of the packet |
|
Data link address |
The purpose of this is to deliver the data link frame from one network interface to another network interface on the same network |
|
Network layer addresses or IP address |
Indicate the original source and final destination |
|
Network portion |
The left most part of the address indicates which network the IP address is a member of |
|
Host portion |
The remaining part of the address identifies a specific device on the network |
|
Source MAC address |
Address of sending device |
|
Destination MAC address |
Address of receiving device |
|
Wireless internet service provider |
An ISP that connects subscribers to designated access point or hotspots |