Network Infrastructure Concepts Flashcards

1
Q

Definition of a Network

A

Network: In its most simple form, a network consists of two or more computers connected to each other by an appropriate transmission medium that allows them to share data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give all types of networks

A

Types: LANs, WANs, MANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of a network?

A

Purpose: Provide services and resources to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the modern forms of networks?

A

Modern: web applications, social networking, VoIP, multimedia conferencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What historically would share data over a network?

A

Historically: files, folders, printers, email, databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are LANs based upon

A

Ethernet (networking product)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who developed Ethernet

A

DIX consortium( Digital Equipment Corporatio[DEC],Intel and Xerox)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who maintains Ethernet standards

A

Maintained by IEEE [Institute of Electrical and Electronics Engineers] (802.3 standards)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give all types of Ethernet

A

Types:
10 Mbps (10BASE)
Fast Ethernet (100BASE)
Gigabit Ethernet (1000BASE)
10G Ethernet (10GBASE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False
Ethernet is not flexible, self-contained, scalable

A

False
Ethernet is flexible, self-contained, scalable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is complementary to IEEE 802.11 standards (Wi-Fi)

A

WLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two classes of LANs

A

SOHO and Enterprise Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Definition of SOHO

A

SOHO: business network with server and clients, using single Internet appliance as an access point, Ethernet switch, Internet modem, Internet router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Definition of Enterprise Network

A

Enterprise network: usually dedicated single-function connectivity appliances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Definition of SME

A

Small and Medium-Sized Enterprise (SME): network supporting tens of users; multiple switches, access points, routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Definition of Enterprise LAN

A

Enterprise LAN: hundreds or thousands of servers and clients; multiple enterprise-class switches, access points, and routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Definition of CAN

A

Campus Area Network (CAN) = LAN spanning multiple nearby buildings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Definition of UTP

A

UTP: Unshielded Twisted Pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Features of UTP

A

Most widely used
Four copper conductor pairs
Insulating sheath
Twisted to reduce crosstalk and EMI
Paired wires carry equal/opposite signals
PVC jacket
Works well in low interference; has limited range, may exhibit attenuation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the standards for CAT 5

A

Frequency: 100 MHz
Capacity: 100 Mbps
Max Distance : 100m (328 ft)
Network Applications: 100BASE-TX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the standards for CAT 5e

A

Frequency: 100 MHz
Capacity: 1 Gbps
Max Distance : 100m (328 ft)
Network Applications: 1000BASE-T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the standards for CAT 6

A

Frequency: 250 Mhz
Capacity: 1 Gbps or 10 Gbps
Max Distance : 100m(328 ft) or 55m(180 ft)
Network Applications: 1000BASE-T or 10G BASE-T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the standards for CAT 6A

A

Frequency: 500 Mhz
Capacity: 10 Gbps
Max Distance : 100m(328 ft)
Network Applications: 10GBASE-T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Definition of STP

A

STP: Shielded Twisted Pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Features of STP

A

Shielded Twisted Pair (STP)
Originally used the braided shield to reduce interference and crosstalk; can be bulky, difficult to install.
Modern STP uses screened cables; shield positioned around all pairs.
Shielded Cat 53/6/6A:
F/UTP (also ScTP)
U/FTP
Modern STP solutions incorporate grounding in each element.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Definition of Plenum

A

Plenum: An air handling space, including ducts and other parts of the HVAC system in a building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Features of Plenum Space

A

Typically a false ceiling, maybe raised floor.
May be used for communications wiring.
Can be the conduit for fire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What does general-purpose(non-plenum) use

A

General-purpose non-plenum cable uses PVC; marked CMG/MMG or CM/MP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

True or False
Plenum cable must not emit smoke, must self-extinguish, meet other fire safety standards.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Features of Plenum

A

Uses treated PVC or FEP; can be less flexible, does not affect bandwidth.
Marked CMP/MMP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

For what modular does twisted pair cabling for Ethernet terminated

A

RJ-45 connectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Features of Ethernet twisted pair terminated with RJ-45 connectors

A

8P8C (8-position/8-contact)
Color-coded (Blue, Orange, Green, Brown)
1st conductor in pair has white/stripes
2nd conductor in pair is a solid color

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Features of ANSI/TIA/EIA 568 termination

A

T568A is shown
T568B:
Pin 1=Orange/White; Pin 2=Orange; Pin 3=Green/White; Pin 4=Green

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What cable has the same termination at both ends?

A

Normal (straight-through) cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Wiring Standards for Twisted Pair:

Features of crossover cable that has T568A at one end, T568B at the other.

A

Previously used for direct connections.
Now Gigabit Ethernet interfaces can automatically cross over with standard cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Wiring Standards for Twisted Pair:

Why should you avoid mixing standards

A

Both are common.
T568A mandated for US government and by TIA 570 residential cabling standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

True or False
Gigabit Ethernet has no more than 100 m of cable between switch and computer

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Features of solid cabling

A

Single thick wire for permanent links, aka “drop cables”
Links RJ-45 port on a wall plate with patch panel
Terminates in IDC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Features of patch cord connects RJ-45 port on the panel to port on the switch

A

Stranded cable; flexible, less efficient
5 m maximum length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Definition of wire stripper/cutter

A

Wire stripper/cutter: for cutting wire and stripping insulation and cable jackets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Definition of punch-down tool

A

Punch-down tool: fixes conductors into an IDC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Definition of crimper

A

Crimpers: fix a jack into a cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What should you do when you cable test.

A

Cable testing:
Verify wiring installation and termination just after making connections, with access to cable runs.
Simpler than during user device setup.
Consider:
Patch cord between PC and wall.
Wall port and wall cabling.
The port on the patch panel and a patch cord to the switch port.
Test with a known good cable.
Various troubleshooting devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Definition of Multumeter

A

Multimeter: basic cable testing tool; tests for copper wire continuity, the existence of short, the integrity of terminator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Definition of Wire Map Tester

A

Wire map tester: identifies transpositions and reverse pairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Definition of Advance Testers

A

Advanced testers: show cable’s physical/electrical properties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Definition of Certifiers

A

Certifiers: test and certify installation to a category.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Definition of Loopback plug

A

Tests a port
Connects pin 1 to pin 3 and pin 2 to pin 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What are electrical signals on copper wire subjects too?

A

To interference/attenuation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What does light signals on fiber optic cable resist

A

Interference, eavesdropping, attenuation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What does fiber optic cables support

A

Supports higher bandwidth, longer cable runs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is SMF

A

Single-Mode Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is MMF

A

Multi-Mode Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Features of SMF

A

Small core, long-wavelength, near-infrared signal generated by the laser.
Data rates up to 10 Gbps or more; cable runs of many kilometers (suitable for WANs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Features of MMF

A

Larger core, shorter wavelength.
Less expensive optics, less expensive deployment.
Lower signaling speeds, shorter distances (suitable for LANs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What are the types of connectors for fiber optic cabling

A

Straight Tip (ST), Subscriber Connector (SC), Lucent/Local Connector (LC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

True or False
Patch cords can have the same or mixed connectors.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

True or False
Connectors damage easily; plug/unplug only when needed.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Features of Coaxial Cabling

A

Two conductors share the same axis.
Signal conductor insulated; second wire mesh conductor acts as EMI shield and as ground.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is coaxial cabling available as

A

Coax is also available with tri- or quad-shielding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is RG(Radio Graded) standard categorize by

A

categorizes cable by thickness and impedance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Types of Coaxial Cabling by the RG standard

A

RG-6: thicker core, better quality, often used as drop/patch cable in modern CATV and broadband.
RG-59: thinner core; drop cable for older CATV/cable modems; used in CCTV.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What is coaxial cabling shielding is also available?

A

Coax is also available with tri- or quad-shielding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What connectors are at the ends of coaxial cabling?

A

BNC connectors at cable end in most cases.
Also screw-down F-connectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What connects coaxial cables

A

BNC couplers can connect cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What cable types must the impedance of the coaxial cable match.

A

50 or 75 ohm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What do 10BASE-5/Thicknet and 10BASE-2/Thinnet support

A

Supported 10 Mbps, up to 500 m and 185 m, respectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Coax is now obsolete for LANs but what is it used for.

A

In use for CCTV and drop cables for CATV and Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What does a Hybrid Fiber Coax (HFC) do?

A

Coax links fiber trunk in street to a customer cable modem.
Less attenuation than TP but bulkier, harder to install.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Definition of NIC

A

Network Interface Card (NIC) port provides a connection to network media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Features of NIC

A

Data signals must come in regular units with a consistent format.
Each node must be able to address other nodes.
Ethernet data link protocol provides addressing, framing functions.
Various encoding mechanisms; NIC transceiver transmits and sends in agreed frame format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Where is the NIC in a PC

A

Usually onboard the motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Features of NIC

A

Maybe PCIe expansion board.
All onboard cards support copper-based Ethernet with RJ-45 ports.
Expansion cards may support:
Fiber optic.
Multiple port types.
Multiple ports of the same type (can be bonded for higher-speed links).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Defintion of a MAC adresss

A

MAC address: unique address for each Ethernet adapter port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What does a MAC address provide

A

Provides value for frame source and destination fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

How many bytes does a MAC address contain

A

48 bits/6 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

How is a MAC address shown

A

Shown as 12 hex digits:
May have colon, hyphen, or no separator.
Examples: 00:60:8c:12:3a:bc or 00608c123abc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What does a LED status show?

A

Show connection status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Features of a LED that’s part of an Ethernet NIC

A

Link light shows if the network signal is present.
Activity light flickers when packets are received/sent.
Speed light possible on multi-speed adapters.
Dual-color LEDs combine functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Give all legacy networking appliances and definitions

A

Legacy appliances include:
Hub: center of Ethernet star topology, works as a multiport repeater.
Repeater: retransmits the signal to overcome distance limitations.
Bridge: divides the network into segments (collision domains) to reduce contention and collision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

True or False
A switch is not an appliance at the core of modern networks.

A

False
A switch is an appliance at the core of modern networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

In a modern network what does act like.

A

Ethernet switch in the modern network acts like a hub, repeater, and bridge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Features of micro-segmentation

A

Switches have up to 48 ports.
Multiple switches can connect to the switched fabric with thousands of ports.
Each port is a separate collision domain.
Establishes point-to-point link (virtual circuit) between any two nodes.
Collisions only occur if the port is half-duplex (attached to a legacy card or node).
Collisions only affect that segment, not the whole network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Features of an unmanaged switch

A

Unmanaged switch:
Performs micro-segmentation without configuration.
May be found in small networks (4 or 8 port switches).
Embedded in most ISP’s Internet routers/modems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Features of a managed switch

A

Managed switch:
For larger workgroups and corporate networks.
Unmanaged out of the box, but can be configured administratively.
Can provide thousands of access ports by linking switches.
Can divide into virtual LANs (VLANs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Definition of Power over Internet

A

Supplies power from a switch port over Cat 5 or better to a powered device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Features of PoE

A

PoE-enabled switches are called end-span/end-point PSE.
A power injector can be used if the switch does not support PoE.
The switch detects if the connected device is PoE-enabled.
More efficient than powering each device through a wall socket.
Network-management software can control devices, apply power schemes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Give all the two standards for PoE

A

Two IEEE standards (both now in 802.3-2012):
802.3af
802.3at (PoE+)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Features of Ethernet of Power

A

SOHO networks are unstructured, use a single router, incorporate smart appliances.
Wireless is an obvious solution; WLAN bandwidth may be adequate.
There may be interference issues or appliances may not support Wi-Fi.
Ethernet over Powerline uses building power circuits; overlays carrier signal to transfer Ethernet frames.
The adapter plugs into an electrical outlet; provides RJ-45 ports.
No configuration is needed, but security can be configured.
Standards defined by IEEE 1901, managed by HomePlug Powerline Alliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What is Wireless Networking?

A

A range of connectivity products and devices.
Personal area networking to Internet connectivity.
Usually uses radio waves for transmission, tuned to a specific frequency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

What is the range of RF

A

RF ranges from 3 KHz to 300 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Give all features of wireless frequencies and channels

A

Subdivided into bands (FM radio and TV are VHF band)
Radio spectrum use regulated by governments
Standardized by ITU
Frequency use requires a license
Some unregulated frequencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

What standard does Wifi equal?

A

IEEE 802.11 standards = Wi-Fi
(Transfer rates for optimal installation; frequencies lack penetration; may be interference; data rate may drop with distance.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

What is the max transfer rate and band for 802.11a (1999)

A

Maximum Transfer Rate
54 Mbps

Band
5 GHz

95
Q

What is the max transfer rate and band for 802.11b (1999)

A

Maximum Transfer Rate
11 Mbps

Band
2.4 GHz

96
Q

What is the max transfer rate and band for 802.11g (2003)

A

Maximum Transfer Rate
54 Mbps

Band
2.4 GHz

97
Q

What is the max transfer rate and band for 802.11n (2009)

A

Maximum Transfer Rate
288.8 Mbps/stream (Single Channel)
600 Mbps/stream (Bonded Channels)

Band
2.4/5 GHz

98
Q

What is the max transfer rate and band for 802.11ac (2013)

A

Maximum Transfer Rate
1.7 Gbps (at time of writing)

Band
5 GHz

99
Q

What is the features of 2.4 GHz frequency bands in 802.11

A

2.4 GHz:
Longer wavelength, longer range, propagates better through solids
Does not support many individual channels; is often congested
Increased risk of interference
Achievable data rates less than 5 GHz

100
Q

What is the features of 5 GHz frequency bands in 802.11

A

5 GHz:
Less effective at solid surface penetration
Lower range than 2.4 GHz
More individual channels; less congestion
Higher data rates

101
Q

Give a descrpition of the range of wireless frequencies

A

Range:
2.4 GHz: maximum indoor range ~30-45 m (100–150 ft).
5 GHz: maximum indoor range up to ~30 m.
Absolute range less important than number of clients to support and wall/ceiling construction.

102
Q

Give the channels and description of wireless frequiencies

A

Channels:
2.4 GHz: up to 14 channels, considerable overlap, co-channel interference.
Special codes distinguish pattern of each node.
Channel can become saturated.
5 GHz: 23 non-overlapping channels:
More WANs in same area or access points closer together, higher client device density.

103
Q

True or False
802.11a/b/g considered legacy standards, limited to old equipment

A

True

104
Q

Give a full description of 802.11n

A

More bandwidth than legacy standards.
Multiplexes 2-4 antennas using MIMO.
AxB:C notation (transmit antennas, receive antennas, simultaneous streams).
Can use 2.4 GHz or 5 GHz band (preferred).
Can use channel bonding in 5 GHz band to deliver more bandwidth.
Nominal data rates 288.8 Mbps (single channel) and 600 Mbps (bonded channels).

105
Q

Give a full description of 802.11ac

A

Continues development of 802.11n.
Works in 5 GHz range.
Can use 2.4GHz range for legacy standards in mixed mode.
Aims for throughput comparable to Gigabit Ethernet.
Supports channel bonding to 80 or 160 MHz channels; 8 special streams vs. 4; denser modulation.
Needs high-end equipment for sufficient antennas for 8 streams.
Theoretical data rate with 8 streams and 160 MHz channel bonding ~6.93 Gbps.

106
Q

True or False
Most Wi-Fi networks are Infrastructure mode

A

True

107
Q

How does a client connect to a network

A

Each client connects with an Access Point (AP)

108
Q

What is BSS

A

Basic Service Set

109
Q

What is the MAC address of a AP called

A

BSSID

110
Q

What is an AP

A

AP is bridge between wired/wireless network (Distribution System)
AP connects to network like a host computer

111
Q

What is a WDS

A

Wireless Distribution System (WDS)

112
Q

What tasks does a AP complete

A

Extends network without a cabled backbone.
Bridge mode and repeater mode.
Can be complex; can be compatibility issues with different vendors’ devices.

113
Q

True or False
Range extender is simpler residential solution; can work with powerline adapter.

A

True

114
Q

What is the description of a configuration called Ad-hoc and Wi-Fi Direct

A

Stations configured to make direct peer-to-peer connections.
Older standards: ad-hoc mode.
Modern approach: Wi-Fi Direct.

115
Q

What is the description of a configuration called
Wireless Mesh Network (MSN)

A

Part of 802.11s standard.
Nodes (Mesh Stations) can discover each other and make peer connections to form Mesh Basic Service Set.
Mesh stations perform path discovery and forwarding.
Routing protocol such as Hybrid Wireless Mesh Protocol (HWMP).

116
Q

What is the description of a configuration called
Personal Area Network (PAN)

A

Using wireless connectivity to connect to devices with a few meters.
Printers, smartphones, headsets, etc.

117
Q

Features of wireless network card

A

Each Wi-Fi network station needs network adapter compatible with 802.11 standard in use on network.
Onboard adapters; expansion boards; USB-connected adapters.
Link-layer MAC address like Ethernet cards.

118
Q

Defintion of Internet Backbone

A

Internet backbone: high-bandwidth backbones connecting Internet eXchange Points (IXPs).

119
Q

Who created internet connections

A

Created by telecommunications companies and academic institutions .
Organized nationally and internationally.

120
Q

What do business and home networks use to connect to the internet

A

ISP( Internet Service Provider)

121
Q

What does an ISP allocate

A

ISP allocates IP addresses, registers domain names, hosts email and websites.

122
Q

What do Enterprise ISP offer

A

Enterprise ISPs offer high bandwidth through fiber optic cable.

123
Q

Features of a ISP

A

Network connects to ISP’s Point of Presence (PoP).
Dial-up, broadband (DSL, FTTx, cable), wireless connections.
Most use PSTN (aka POTS, “local loop,” “last mile”).

124
Q

Give a description of a broadband internet access

A

A range of technologies
“Always on”
Data transfer rates much higher than dial-up

125
Q

Give a description of DSL

A

DSL uses high frequencies in digital phone line for communications.
Filter separates DSL signals from voice traffic.
Advanced modulation and echo cancelling enable high-bandwidth, full-duplex.
DSL “modem” connects to phone system (usually router/modem/AP appliance).
Phone line connects to DSL modem bank (DSLAM).
PPP over ATM (PPPoA) or PPP over Ethernet (PPPoE).

126
Q

Give a full description of DSL type Asymmetrical DSL (ADSL)

A

Consumer version; fast downlink, slow uplink
Various iterations
ADSL2+: downlink rates up to ~24 Mbps; uplink rates up to ~1.4 Mbps
Providers may restrict data download
Cable quality, number of users may affect speed
Max range ~2 miles/3 km

127
Q

Give a full description of DSL type Symmetric DSL

A

Same uplink and downlink speeds
Useful for businesses, branch offices

128
Q

Give a full description of DSL type Very High Bitrate DSL (VDSL)

A

High bit rate at expense of range
Symmetric and asymmetric modes
Asymmetric: 52 Mpbs downstream/6 Mpbs upstream over 300 m/1000 ft
Symmetric: 26 Mbps in both directions
VDSL2: 100 Mpbs bi-directional rates for very short range

129
Q

Give all features of Fiber Optic Internet Access

A

Higher bandwidth, a longer distance than copper cable
Has replaced copper as core of telecommunications networks
Being extended to individual homes and businesses
Two principal types of fiber optic network services:
Cable TV providers
Telecom providers

130
Q

What is HFC

A

Hybrid Fiber Coax (HFC)/Cable (“broadband cable” “cable”): Connection through CATV service, combines fiber core with coax to customer.

131
Q

How does a Cable modem connect to a local network

A

The cable modem connects to the local network through an Ethernet adapter.

132
Q

What does DOCSIS v3 allow

A

DOCSIS v3 allows multiplexed channels for higher bandwidth.

133
Q

What can a coax do when it’s on a premises

A

Coax links all premises in a street with CMTS to ISP PoP via fiber backbone.

134
Q

Give the upload and download speed of DOCSIS

A

DOCSIS: Downlink up to 38 Mbps (North America) or 50 Mbps (Europe); and uplink up to 27 Mbps.

135
Q

Give a description of Fiber to the X (FTTx)

A

Solutions where fiber replaces copper in the “last mile”

136
Q

Give a description of Fiber to the Premises (FTTP)/
Fiber to the Home (FTTH)

A

Most expensive, not widespread
Fiber link terminated at customer premises equipment

137
Q

Give a description of Fiber to the Node (FTTN)
Fiber to the Curb/Cabinet (FTTC)

A

Fiber to communications cabinet at street
Similar to HFC, but consumer link uses VDSL over phone wiring (not coax)

138
Q

Give a full description of Dial-Up Internet Access

A

Telephone connection between computers.
Uses entire frequency range; not efficient, low bandwidth.
Phone charges apply; lines cannot be used for voice at the same time.
Modems at each end convert digital-analog (MOdulation/DEModulation).

139
Q

What are the disadvantages of Dial-Up Internet Access

A

Disadvantages: low data transfer, time to establish connection, errors

140
Q

What is the fastest modem of Dial-Up Internet Access

A

Fastest modems ~33.6 Kbps; speed limit of the phone line
Theoretical maximum downlink ~56 Kbps

141
Q

What are Dial-up Internet Access still used for

A

Has been superseded; still in use as a backup or for areas without other support

142
Q

How can Dial-up Internet Access speed be increased

A

Compression may improve data transfer

143
Q

Give a full description of ISDN Internet Access

A

Digital circuit-switched technology for voice, video, data.
Uses copper telephone wiring if of sufficient quality.
Uses digital signatures for both voice and data; no analog conversions.
Dial-up service billed by line rental and usage; establishes a connection in ~1 second.
Used to connect LANs and for remote workers.
Remains in use for telecom core; superseded by DSL/cable for subscribers.
Terminal Adapter connects to PC or router; to a network via NT1 device.

144
Q

What are the two classes of ISDN Internet Access and give a full description of each?

A

Two classes:
BRI: two 64 Kbps “B” data channels for data and one 16 Kbps “D“ control channel.
PRI: 23 or 30 “B” channels, one 24 Kpbx “D” channel.

145
Q

Where is fixed wireless internet access used?

A

Wired broadband may not be available:
In rural areas
In older buildings where not possible to run new cable

146
Q

What are the options for the fixed wireless internet access used?

A

Two options:
Satellite
Line of Sight (LoS) Wireless Internet Provider (WISP)

147
Q

Give a description of the satellite which gives fixed-wireless internet access

A

Large coverage area with VSAT microwave antenna aligned to the orbital satellite.
Super High-Frequency range (3-30 GHz).
Satellite television receivers for domestic use; use growing for businesses, especially rural.
Transfer rates vary: 6 Mbps / 15-20 Mbps down typical.
Can be severe latency problems.
Dish at customer aligned with satellite; connects via coax to DVB-S modem.

148
Q

Give a description of the LoS WISP

A

Ground-based microwave antennas aligned with each other; transmit if no physical obstruction (usually atop tall buildings).
Spans great distances; no cabling infrastructure; lower latency than satellite.
Hard to maintain a line of sight; expensive.
WISP may use Wi-Fi or proprietary equipment.
The range of frequencies; may be affected by 5G cellular phone service deployment.

149
Q

Give a full description of Cellular Radio Networks

A

Wi-Fi bands have a restricted range; fixed wireless requires a large antenna.
Cellular radio wireless networking allows long-distance communications over smartphone devices.
Also used by IoT devices.
Connects to nearest transmitter; base station range of up to 5 miles.
The transmitter connects the phone to mobile/landline networks.
850 / 1900 MHz bands (Americas); 900 / 1800 MHz bands (rest of world).

150
Q

Give a full description of 2G

A

GSM phones using a SIM card; international, and AT&T in the US
TIA/EIA IS-95 (cdmaOne) handsets managed by a provider with CDMA; Sprint and Verizon
Data access built on top of existing voice network using CSD
Must establish a data connection to the base station, incurring charges; maximum ~14.4 Kbps

151
Q

Give a full description of 3G

A

Deployed packet-switched technology to mobiles
GPRS/EDGE; HSPA+; CDMA2000/Evolution Data Optimized (EV-DO)

152
Q

Give a full description of 4G

A

LTE: converged 4G standard supported by all network providers, requires a SIM. Maximum 150 Mbps down; 20 Mpbs real-world
LTE-A: Intended to provide 300 Mbps down; 40 Mbps current real-world

153
Q

Give a full description of 5G

A

Target is for 1 Gbps if stationary or slow-moving; 100 Mbps if fast-moving
Available in trial areas; commercially in ~2020
70 Gpbs in test conditions

154
Q

True or False
Routers use the logical network and host IDs.

A

True

155
Q

Give two different types of routers and definitions of both routers

A

LAN router: divides a physical network into logical networks.
WAN (edge/border) router: joins separate networks (i.e.; LAN to the Internet).

156
Q

True or False
Route/path to the destination is selected either dynamically or statically; the packet moves by hops along the path to the target.
At target, the hardware address determines the destination node.

A

True

157
Q

Give all the ways that routers and modems connect to the internet and also what happens when they are connected to the internet

A

Routers and modems both connect to the Internet:
Modem makes a physical link (like a switch).
The router makes logical forwarding decisions.
Often bundled in one device.

158
Q

Give a solution to the following problem:

Switched enterprise networks can have thousands of ports; inefficient to treat as one logical network.

A

Use VLANs on managed switches to group ports into logical subnets.
VLANs communicate through routers.
Also provides filtering and monitoring to improve security.

159
Q

Definition of a Protocol

A

Protocol: Rules and formats enabling systems to exchange data.

160
Q

Definition of a Protocol Suite

A

Protocol Suite: A collection of several protocols used for networking are designed to work together.

161
Q

Give all the characteristics of a TCP/IP Protocol

A

Networks have converged on the use of TCP/IP protocol suite
Originally developed by US DoD; now an open standard
IETF working groups implement development
RFCs are published standards
Packet-based protocols
Routers select the path for packets
Main protocols handle addressing and transport
Divided into a four-layer model

162
Q

Give a full description of Link/Network Interface Layer

A

Puts frames on the physical network
Not TCP/IP protocols as such; networking products and media (Ethernet, Wi-Fi)
Communications on the local network
Data packaged in frames
Nodes identified by MAC address

163
Q

Give a full description of the Network Layer(IP Protocol)

A

IP provides packet addressing and routing
Best-effort delivery; unreliable, connectionless

164
Q

Give a full description of the Transport Layer (TCP/UDP protocol)

A

TCP guarantees orderly packet transmission
UDP provides non-guaranteed packet transfer but is faster

165
Q

Give a full description of Application Layer

A

Numerous protocols for network configuration, management, services; use TCP/UDP ports
ARP: Finds MAC address associated with IP address
ICMP: delivers status and error messages (used by ping and tracert)

166
Q

Give a description of the Source IP address

A

Identifies the sender of the datagram by IP address.

167
Q

Give a description of the Destination IP address

A

Identifies the destination of the datagram by IP address.

168
Q

Give a description of Protocol

A

Indicates whether data should be passed to TCP or UDP at the destination.

169
Q

Give a description of Checksum

A

Verifies the packet’s integrity at the destination.

170
Q

Give a description of Time to Live

A

The number of hops the datagram can stay on the network before it is discarded; avoids endless looping of undeliverable packets.
Each router decreases the TTL value by at least one.

171
Q

What digits can only be used in binary?

A

In binary, a digit can only be 0 or 1

172
Q

What power is the value of the digits?

A

Values of the digits are powers of 2

173
Q

Give a full description of subnet masks

A

IP address encodes both network ID and host ID.
A subnet mask separates them by “masking” the host.
Binary 1 in the mask = address digit is part of the network ID.
The size of the network portion of the subnet mask determines how many networks and hosts are allowed in a given addressing scheme.
Expressed in dotted-decimal or as network prefix (contiguous number of 1s in the mask).

Hosts communicate directly if on the same network
IP protocol uses subnet mask to compare source/destination network ID
If on the same network, delivers locally
If on a different network, sends to the router

174
Q

What should a host always have?

A

The host must have an IP address and subnet mask; should have other parameters for proper network/Internet communication.

175
Q

Give a description of the parameter IPv4 address subnet mask.

A

Both are required for every interface; can be set manually.
Address: dotted-decimal notation; identifies host and network.
The subnet mask determines if other hosts are local or remote.

176
Q

Give a description of the parameter default gateway

A

The IP address of a router to send packets outside of the local network.
If no gateway, the host can only communicate on a local network.

177
Q

Give a description of the parameter client DNS

A

The IP address of the DNS server to provide host/domain name resolution and locate Internet resources.
DNS is also used on most local networks.
Often the gateway address; often a second server address provided for redundancy.

178
Q

Give a description of static addressing

A

Static addressing:
The administrator manually configures each host.
Must update manually if host changes subnet.
Must track address allocations to avoid duplication.
Can be time-consuming and error-prone.
Only used for systems with dedicated functionality.

179
Q

Give a description of dynamic addressing

A

The DHCP server allocates addresses.

180
Q

Give a full description of DHCP

A

DHCP client contacts server on boot and requests address.
Also provides other parameters (subnet mask, default gateway).
Limited time leases.
Information configured on a server; client updated when lease renewed.

181
Q

Give a full description of Link-local
APIPA

A

The fallback mechanism for DHCP client if DHCP server is unavailable.
Host self-configures with an address on 169.254.x.x network.
“Link-local” is a generic term; “APIPA” is a Microsoft term.
Communication with other APIPA hosts on the same network only.

182
Q

Give a full description of the DHCP reservation

A

For hosts that need the same address each time.
Configure DHCP server with reserved host address per MAC address.
Centralized, easier to implement than static addressing.

183
Q

What must each host address be and who allocates a host address.

A

On the Internet, each host address must be unique; usually allocated by ISP.
(Few organizations have enough individual addresses; various methods to overcome this issue.)

184
Q

What addresses do internal hosts use?

A

Internal hosts can use addresses in a Class A, B, or C private range defined by RFC 1918 (10.0.0.0 to 10.255.255.255; 172.16.0.0 to 172.31.255.255; 192.168.0.0 to 192.168.255.255).

185
Q

What gives internet access to a private address host.

A

Internet access is provided for private-address hosts through:
A router using NAT.
A proxy server.

186
Q

Give an explanation of a NAT

A

In NAT, the router converts the internal private IP address to a valid public address.

187
Q

Give an explanation of a NAT address pool

A

NAT address pool itself will be limited; multiple private addresses will use a single public address.

188
Q

Give an explanation of IP configuration

A

IP configuration is simpler and internal clients are not directly accessible from the Internet.

189
Q

Explain the NAPT mapping

A

The mapping provided by NAPT, aka PAT, aka NAT overloading.
Each outgoing connection is assigned TCP or UDP port.
Returning traffic mapped back to address/client port.

190
Q

Give a definition of a VPN and a full description of all its specifitifications

A

VPN: connects two private networks over a public network (the Internet).
Internet is a cost-effective way to connect users and networks but is not private.
VPN protocols create tunnels through the public network to authenticate, encrypt, and secure private communications.

191
Q

Give the size of IPv4.

A

The IPv4 address pool is large but limited.

192
Q

Give the size of IPv6.

A

IPv6 uses 128-bit addresses, massively increasing the address pool.

193
Q

Give all improvements to IPv6

A

Improvements: simplified address headers, hierarchical addressing, support for time-sensitive traffic, new unicast address structure.
A large string of characters in binary or even decimal; affects clarity and accuracy.
Uses hexadecimal notation (0-9, A-F):

194
Q

How is binary IPv6 address divided?

A

Binary IPv6 address divided into eight double-byte values using hex notation:
2001:0db8:0000:0000:0abc:0000:def0:1234

195
Q

What can be ignored in an IPv6 binary address?

A

Leading zeros can be ignored, and a contiguous series of zeroes can be replaced by a double colon place marker:

2001:db8::abc:0:def0:1234

196
Q

Give the size and the designations of different parts of the IPv6 address.

A

The first 64 bits are network ID, second 64 bits designate the interface

197
Q

True or False
Is the IPv6 fixed in size = no subnet mask; /nn = length of routing prefix in bits.

A

True

198
Q

Give the IPv6 global unicast address format

A

Global Routing Prefix: 3-bit(001) and 45( Network ID)

Subnet: 16 bit

Interface ID: 64 bit

199
Q

How are IPv6 blocks assigned

A

IPv6 address blocks are assigned hierarchically by routers; logical address space

200
Q

Give all the characteristics of IPv6

A

IPv6 link-local addresses used for housekeeping
Span single subnet
Nodes on the same link are called “neighbors”
Start with fe80::
Equivalent of APIPA
The IPv6 host always has a link-local address

201
Q

What all the general characteristics of UDP and TCP ports

A

Transport-layer protocols ensure effective delivery; the content of packets is significant.
Identifies network application types by assigning a port number (0-65535).
Data from upper layers is packaged in segments, tagged with port numbers.
Passed to the network layer for delivery.
Simultaneous segment transmissions are multiplexed onto the network link; de-multiplexed at receiving host.
Can use TCP or UDP.

202
Q

What is the characteristic of well-known ports?

A

Port: unique ID for a service using TCP or UDP for transport.
Might be persistent (for servers) or ephemeral (for clients).
IANA assigns standard (“well-known”) port numbers to services.
See course text for examples.
IANA defines ephemeral port range (49152 to 65535); some OSes use different values.
Firewalls must-have ports enabled or disabled to allow only valid traffic.

203
Q

Give a description of DNS?

A

Hierarchical system for resolving names to IP addresses.
The database is distributed among many name servers; distributes maintenance and protects against server loss.
Root (.) at the top; then 13 TLDs (generic, sponsored, or country code); then domains.
Domain names are managed by ICANN and registered with the appropriate Domain Name Registry for the TLD.
Records are traced from root down; each server level has information about servers below in the hierarchy.

204
Q

What is FQDN

A

FQDN shows hierarchy from most specific on left to least specific on right.

205
Q

What does the domain name identify?

A

The domain name portion identifies the company, organization, or individual; must be unique and officially registered.

206
Q

What does the hostname identify?

A

Host name identifies a particular server or server alias.

207
Q

Describe the Authoritative name server

A

Holds domain records and can respond authoritatively about hosts in the domains it manages.
Required for Active Directory.
If the private domain, is not available outside the LAN; on Internet, published to name servers hosted by ISPs.

208
Q

Describe the Recursive resolver

A

Resolves names for clients.
Client contacts resolver; resolver contacts name servers until the record is located or request times out.
DNS clients are configured with a resolver address.
Listens on UDP 53.

209
Q

Definition of the web server

A

Web server: A server that provides client access using HTTP (defaults to port 80) or its secure version HTTPS (defaults to port 443).

210
Q

Description of Web server

A

Organizations may lease from ISP; host directly; or use private servers (intranets)
Provides HTML pages (text files with tags), interpreted by browsers
Extended by scripts and web applications

211
Q

Give the structure of a URL

A

1 Protocol
2 FQDN
3 File path
1 2 3
http://store.gtslearning.com/comptia/index.htm

212
Q

Give the disadvantages of HTTPS

A

HTTP lacks security; data is sent unencrypted, with no authentication.

213
Q

What is SSL/TLS used for?

A

SSL/TLS can be used to encrypt TCP/IP applications that use TCP connections, including HTTPS.

214
Q

What do servers use to prove identity?

A

Servers use digital certificates from Certification Authorities to prove the identity of the server and to provide encryption.

215
Q

What can emails be sent and what is used to encode emails?

A

Email can send text and file attachments encoded using MIME.

216
Q

What is the process of mail servers?

A

The client sends a message to the server; the server queues messages for an SMTP session (port 25).

SMTP server uses DNS to resolve the address of the recipient’s mail server.

SMTP delivers messages; usually several “hops.”

A message is placed in store on the recipient’s server; client software connects with the mailbox using POP3 (port 110) or IMAP (port 143).

POP3 is more widely used; IMAP has more features.

217
Q

What does email require

A

An email account requires a username, password, email address, incoming and outgoing server addresses, and protocol types.

218
Q

What general occurrences could occur when using mail servers?

A

Mailto URL scheme: username@domainname (domain may be a company or ISP).
Different systems allow different characters; not usually treated as case-sensitive.
Mail may be rejected if incorrectly addressed if identified as spam if the mailbox is full.
Only one of many network communication types.

219
Q

Give the characteristics of File and Printer Sharing

A

Core network functions.
May be accomplished by proprietary protocols (i.e., File and Print Services for Windows).
May use standard protocols (i.e., FTP), but may not have as much functionality.

220
Q

Give a description of SMB

A

Underpins file and printer sharing on Windows networks; currently SMB2, but legacy clients are supported.
TCP port 445; also NetBIOS over TCP/IP (UDP and TCP port range 137-139).
Implemented as Samba on Linux.

221
Q

Give a description of AFP

A

Performs similar function to SMB for Apple/Mac OS.
UDP or TCP port 427 (Service Location Protocol)—not required by OS X or later.
TCP port 548.

222
Q

Give a description of FTP

A

Early TCP/IP protocol; widely used for file transfers; flexible; easy to maintain.
TCP port 21 for connection; port 20 for active transfer or server-assigned port if passive.
Client options:
Command line
Dedicated GUI
Browsers

223
Q

What is an Authentication Server

A

Used on enterprise networks to ensure only authorized users can access accounts.
On the Windows domain, Active Directory provides authentication based on Kerberos.
AAA server consolidates authentication across multiple devices.
RADIUS is an AAA protocol.

224
Q

What is a DHCP
DNS

A

DCHP assigns IP addresses to hosts when they connect.
DNS allows hosts to access resources by hostname and FQDN by resolving names to IP.

225
Q

What is an LDAP

A

Network resources are recorded as objects in a directory database.
X.500 standards allow directories to interact; full standards required a complex protocol.
LDAP allows X.500-compliant queries and updates over TCP/IP.
Widely supported; TCP/UDP 389.
Uses Distinguished Names and Relative Distinguished Names as identifiers.

226
Q

What is a NetBIOS/NetBT

A

NetBIOS first Windows network software; provided name discovery, and addressing.
NetBT runs NetBIOS over TCP and UDP ports 137-139 (name services, datagram transmission, session services).
Should be disabled unless supporting legacy Windows systems or appliances.

227
Q

What is SNMP

A

Framework for managing/monitoring network devices.
Management system and agents.
Agent process runs on network device; maintains MIB; can initiate trap for a notable event.
System software provides oversight location, monitors agents, displays information.
Device queries=UDP 161; traps=UDP 162.

228
Q

What is Endpoint Managment

A

Facilitates Defense in Depth security policies that require hardening to workstation level.
Can apply OS and anti-virus updates; catalog software; apply security policies; analyze logs; monitor performance and alerts.
Example: Microsoft’s SCCM.

229
Q

What is a syslog

A

Helpful to consolidate separate device logs.
Prior to Windows 7, Windows logs were local; 3rd-party tools were used to consolidate.
Windows event subscription can forward log events to the central system.
UNIX and Linux equivalent is Syslog.
Client-server model for event collection; open format; de facto standard.

230
Q

What is Embedded

A

Designed for a specific function.
Range from individual microcontrollers to complex industrial control systems.
May have been designed for a closed network, without connectivity.
Special design and security considerations when interacting with a data network.
Risk for maintenance and troubleshooting; require specialist knowledge.

231
Q

What is Legacy

A

No longer supported by the vendor.
May be retained on networks to support existing services that are not practical to migrate.
Security risks.
Should be isolated from the network.
Like embedded systems, the risk for maintenance and troubleshooting; requires specialist knowledge.

232
Q

What is IDS/NIDS

A

Software and/or hardware that monitors for and quickly detects malicious behavior.
Can also analyze and alert administrators to infrastructure problems.
Can comprise sensors, detection software, and management software; each implementation is unique.

233
Q

Give the definition of IPS/NIDS

A

An inline security device that monitors for and blocks suspicious network and system traffic.
May drop packets, reset connections, sound alerts; at times quarantine intruders.
Examines packet contents.
UTM appliance combines firewall, A-V scanner, and IDS.

234
Q

Give the definition of Proxy Server

A

Used on enterprise networks as an alternative to NAT.
Checks and forwards HTTP, email, or other requests from internal hosts to the Internet; returns reply to the client.
It May be transparent (no client configuration) or non-transparent (client must be configured with proxy’s IP address and port, typically 8080).