2.1-2.8 Terms Flashcards

1
Q

Connection-oriented– A formal connection setup and close “Reliable” delivery– Recovery from errors– Can manage out-of-order messages or retransmissions. Flow control– The receiver can manage how much data is sent.

A

TCP Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Connectionless - No formal open/close to the connection. Unreliable” delivery– No error recovery– No reordering of data or retransmissions. No flow control– Sender determines the amount of data transmitted.

A

UDP – User Datagram Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Transfers files between systems
Authenticates with a username and password– Some systems use a generic/anonymous login
Full-featured functionality - List, add, delete, etc.

A

FTP - File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encrypted communication link - tcp/22

A

SSH - Secure Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Simillar to SSH. Telecommunication Network - tcp/23.Login to devices remotely– Console access. In-the-clear communication– Not the best choice for production systems

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Server to Server email transfer- tcp/25. Also used to send mail from a device to a mail server– Commonly configured on mobile devices and email clients
Other protocols.

A

SMTP - Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Converts names to IP addresses - udp/53– www.professormesser.com = 162.159.246.164. These are very critical resources– Usually multiple DNS servers are in production.

A

DNS - Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Automated configuration of IP address, subnet mask and
other options - udp/67, udp/68– – Server, appliance, integrated into a SOHO router, etc. Dynamic / pooled– IP addresses are assigned in real-time from a pool– Each system is given a lease and must renew at set intervals. Addresses are assigned by MAC address in the DHCP server– Manage addresses from one location.

A

DHCP - Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Communication in the browser– And by other applications In the clear or encrypted– Supported by nearly all web servers and clients

A

HTTP & HTTPS (Hypertext transfer protocol).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Store and retrieve information in a network directory.

A

LDAP (Lightweight Directory Access Protocol) - tcp/389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Graphical display of remote devices

A

RDP ( Remote DesktopProtocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Receive email into a email client

A

(POP3) Post Office Protocol version 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Receive alert from network devices

A

Simple Network Management Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Windows file transfers and printer sharing

A

Server Message Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Windows connection-oriented data transfer

A

NetBIOS session service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Register, remove, and find Windows services by name

A

NetBIOS name service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A newer email client protocol

A

Internet Message Access Protocol v4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Directs traffic between IP subnets and connects diverse network types like LAN, WAN, Copper, and fiber.

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Bridging done in hardware. Forwards traffic based on a data link address.

A

Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Very few configuration options. Fixed configuration. Very little integration with other devices. Low price point. Simple is less expensive.

A

Unmanaged switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

VLAN support. Traffic prioritization. Redundancy support, Spanning Tree Protocol (STP). Port mirroring. External management.

A

Managed Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Not a wireless router. Extends the wired network onto the wireless network. Makes forwarding decisions based on MAC address.

A

Access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Combination of punch-down blocks and
RJ-45 connectors. Runs from desks are made once. Does not need to use special tools pr existing cables to make a change.

A

Patch Panels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Filters traffic by port number. Can encrypt traffic into/out of the network. Can proxy traffic. Most of these can be layer 3 devices (routers).

A

Firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

One wire for both network and electricity.
Phones, cameras, wireless access points.
Useful in difficult-to-power area. Power provided at the switch.Built-in power Endspans. In-line power injector. Midspans

A

Power over Ethernet (PoE). (Provided on Ethernet Cable).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Commonly marked on the switch or interfaces.

A

PoE switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The original PoE specification.Now part of the 802.3 standard.15.4 watts DC power, 350 mA max current.

A

PoE: IEEE 802.3af-2003

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Now also part of the 802.3 standard
25.5 watts DC power, 600 mA max current

A

PoE+: IEEE 802.3at-2009

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

51 W (Type 3), 600 mA max current
71.3 W (Type 4), 960 mA max current
PoE with 10GBASE-T

A

PoE++: IEEE 802.3bt-2018

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

“Multi-port repeater”.Traffic going in one port is repeated to every other port Everything is half-duplex Becomes less efficient as network traffic increases
10 megabit / 100 megabit. Difficult to find today.

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Transmission across multiple frequencies Different traffic types. Data on the “cable” network– DOCSIS (Data Over Cable Service Interface Specification), High-speed networking– Speeds up to 1 Gigabit/s are available. Multiple services– Data, voice, video.

A

Cable Modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

ADSL (Asymmetric Digital Subscriber Line)– Uses telephone lines. Download speed is faster than the upload
speed (asymmetric)– ~10,000 foot limitation from the central office (CO)– 52 Mbit/s downstream / 16 Mbit/s upstream are common– Faster speeds may be possible if closer to the CO

A

DSL Modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Fiber to the premises. Connect the ISP fiber network to the copper network. Line of responsibility.One side of the box is the ISP, Other side of the box is your network.

A

Optical network terminal (ONT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The fundamental network device. Computers, servers, printers, routers, switches, phones, tablets, cameras, etc. Specific to the network type. Built into the motherboard. Many options, Single port, multi-port, copper, fiber.

A

Network Interface Card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Data Control, and management planes. Extend functionality and management of a single device. Made for the Cloud. Process the network frames and packets– Forwarding, trunking, encrypting. Control layer / Control plane. Application layer / Management plane.

A

SDN (Software Defined Networking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

One of the original 802.11 wireless standards released October 1999. Operates in 5Ghz range. 54 megabits per second (Mbit/s). Not commonly seen today.

A

802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Approved in January 2014,Significant improvements over 802.11n. Operates in the 5 GHz band– Less crowded, more frequencies (up to 160 MHz
channel bandwidth). Increased channel bonding - Larger bandwidth usage. Faster data transfers. Eight MU-MIMO downlink streams, Twice as many streams as 802.11n, Nearly 7 gigabits per second.

A

802.11ac (Wi-Fi 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Also an original 802.11 standard released October 1999. Operates in the 2.4 GHz range. 11 megabits per second (Mbit/s). Better range than 802.11a, less absorption problems. More frequency conflict,Baby monitors, cordless phones, microwave ovens, Bluetooth.Not commonly seen today.

A

802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

An “upgrade” to 802.11b - June 2003. Operates in the 2.4 GHz range. 54 megabits per second (Mbit/s) Similar to 802.11a. Backwards-compatible with 802.11b. Same 2.4 GHz frequency conflict problems as 802.11b.

A

802.11G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Update to 802.11g, 802.11b, and 802.11a released in October 2009. Operates at 5 GHz and/or 2.4 GHz. 40 MHz channel Widths. Multiple-input multiple-output– Multiple transmit and receive antennas.

A

802.11n (Wi-Fi 4)

38
Q

Approved in February 2021,The successor to 802.11ac/Wi-Fi 5. Operates at 5 GHz and/or 2.4 GHz,20, 40, 80, and 160 MHz channel widths. 1,201 megabits per second per channel. Orthogonal frequency-division multiple access (OFDMA).

A

802.11ax (Wi-Fi 6)

39
Q

Wireless access point in a house with the stock antennas. Outdoors, Minimal signal absorption or bounce. Directional antennas– Focused, point-to-point connection, Unlicensed 2.4 GHz or 5 GHz frequencies,Additional frequencies may be available, Additional licensing may be required. Indoor and outdoor power is usually regulated.

A

Long-range fixed wireless

40
Q

Used by access badges, inventory assembly line tracking, pet/animal identification or anything that needs to be tracked or any radar technology.

A

RFID (Radio Frequency Identification).

41
Q

Two-way wireless connection. Used by payment systems for credit cards and online wallets. Helps with Bluetooth Pairing. Helps with access token identity “card:. Short range with encryption support.

A

NFC (Near field communication).

42
Q

2.4 Ghz or 5GHz (sometimes both).

A

Frequency.

43
Q

Groups of frequencies numbered by the IEEE. Non overlapping works best.

A

Channels.

44
Q

Most countries have these to manage frequency use. Manage spectrum use, power output, interference requirements.

A

Regulations.

45
Q

Removes use of Wires (headsets, speakers, ketboards/mice). Uses 2.4 Ghz range. Operates short range (10 meters). Industrial version can communicate over 100 meters.

A

Bluetooth.

46
Q

Respond to browser requests. Use browser protocols HTTP/HTTPS. Pages are built with HTML, and HTML5. Pages stored in here

A

File Server

47
Q

Centralzied management for login to resources.

A

Authentication server

48
Q

Unsolicited messages in emails or forums. Can appear in content such as commercial advertising, non-commercial proselytizing, phishing attempts. Poses security concerns, and takes resources to manage.

A

Spam

49
Q

Unsolicited email. Stop it at the gateway before it reaches the user. On-site or cloud-based

A

Spam Gateways.

50
Q

Next-generation firewall, Unified Threat
Management (UTM) / Web security gateway.URL filter / Content inspection. Malware inspection. Spam filter. CSU/DSU. Router, Switch. Firewall. IDS/IPS.Bandwidth shaper. VPN endpoint.

A

All-in-one security appliance

51
Q

Distribute the load.Multiple servers.Invisible to the end-user.Large-scale implementations.Web server farms, database farms. Fault tolerance.Server outages have no effect.Very fast convergence

A

Load balancers

52
Q

Configurable load - Manage across servers. TCP offload - Protocol overhead. SSL offload - Encryption/Decryption.Caching - Fast response. Caching - Fast response. Content switching - Application-centric balancing.

A

Load balancer features

53
Q

An immediate server. Client makes request to the server and the server performs the request. Server provides results back to client. Has access control, caching, URL filtering, and content scanning.

A

Proxy Server.

54
Q

PC manages equipment– Power generation, refining,
manufacturing equipment– Facilities, industrial, energy, logistics. Distributed control systems– Real-time information– System control– Requires extensive segmentation– No access from the outside.

A

Supervisory Control & data acquisition system/ Large Scale multi-site industrial control systems (ICS).

55
Q

Another expression for “really old”

A

Legacy systems

56
Q

Purpose-built device– Not usual to have direct access to
the operating system– Alarm system, door security, time card system.

A

Embedded system

57
Q

Appliances– Refrigerators. Smart devices– Smart speakers respond to voice commands.
Air control– Thermostats, temperature control. Access– Smart doorbells. May require a segmented network.

A

IoT (Internet of Things) devices

58
Q

Primary Protocol for everything we do.

A

IPv4

59
Q

Now part of all major operating systems and is backbone of internet infrastructure.

A

IPv6

60
Q

OSI layer 3 address

A

Internet protocol Version 4.

61
Q

340,282,366,920,938,463,463,374,607,431,768,211,456
addresses (340 undecillion)– 6.8 billion people could each have
5,000,000,000,000,000,000,000,000,000 addresses,

A

Internet Protocol v6-128 bit address.

62
Q

Translates human-readable names
into computer-readable IP addresses. Hierarchical– Follow the path. Many Servers. Distributed database.

A

Domain name system (DNS)

63
Q

Resource records, Over 30 record types– IP addresses, certificates, host alias names, etc.These are important and critical configurations– Make sure to check your settings, backup, and test!

A

DNS records

64
Q

Determines the host name for the mail server this isn’t an IP address; it’s a name.

A

Mail exchanger record (MX)

65
Q

Human readable information. Useful public information. Was originally designed for
informal information. Can be used for verification purposes. Commonly used for email security.

A

Text records (TXT)

66
Q

A list of all servers authorized to send emails
for this domain.Prevent mail spoofing.Mail servers perform a check to see if incoming mail really did come from an authorized host

A

Sender Policy Framework (SPF)

67
Q

Digitally sign a domain’s outgoing mail
Validated by mail servers, not usually
seen by the end user the public key is in the DKIM TXT record.

A

Domain Keys Identified Mail (DKIM).

68
Q

Prevent unauthorized email use (spoofing)
An extension of SPF and DKIM.You decide what external email servers should do with
emails that don’t validate through SPF or DKIM.

A

DMARC

69
Q

Grouping of IP addresses.Each subnet has its own scope– 192.168.1.0/24– 192.168.2.0/24– 192.168.3.0/24.

A

DHCP pools.

70
Q

DHCP server has a big pool of addresses to give out– Addresses are reclaimed after a lease period.

A

Dynamic assignment

71
Q

Similar to dynamic allocation– DHCP server keeps a list of past assignments– You’ll always get the same IP address.

A

Automatic assignment

72
Q

Address reservation– Administratively configured.Table of MAC addresses– Each MAC address has a matching IP address
Other names– Static DHCP Assignment, Static DHCP, Static Assignment, IP Reservation.

A

DHCP address allocation

73
Q

Leasing your address– It’s only temporary– But it can seem permanent Allocation– Assigned a lease time by the DHCP server– Administratively configured Reallocation– Reboot your computer– Confirms the lease
Workstation can also manually release the IP address

A

DHCP leases

74
Q

Check in with the lending DHCP server to renew the IP address– 50% of the lease time (by default)

A

T1 timer

75
Q

If the original DHCP server is down, try rebinding
with any DHCP server– 87.5% of the lease time (7/8ths)

A

T2 timer

76
Q

A group of devices in the same broadcast domain.Separated logically instead of physically.

A

Virtual LANs (Virtual Land Area Networks).

77
Q

Encrypted (private) data traversing a public network.Concentrator– Encryption/decryption access device– Often integrated into a firewall.Many deployment options– Specialized cryptographic hardware.

A

VPN (Virtual Private Network).

78
Q

On-demand access from a remote device– Software connects to a VPN concentrator
Some software can be configured as always-on

A

Client-to-Site VPNs.

79
Q

Non-terrestrial communication. High cost relative to terrestrial networking– 50 Mbit/s down, 3 Mbit/s up are common– Remote sites, difficult-to-network sites.High latency– 250 ms up, 250 ms down– Starlink advertises 40 ms and is working on 20 ms. High frequencies - 2 GH.

A

Satellite networking.

80
Q

Buisness and home use.High speed data communication– Frequencies of light. Higher installation cost than copper– Equipment is more costly– More difficult to repair– Communicate over long distances. Large installation in the WAN core– Supports very high data rates– SONET, wavelength division multiplexing.

A

Fiber.

81
Q

Transmission across multiple frequencies– Different traffic type.

A

Broadband

82
Q

Connect rural or remote locations
Internet access for everyone.Many different deployment technologies.Meshed 802.11
5G home internet.Proprietary wireless
Need an outdoor antenna.Speeds can range from ~ 10 to 1,000 megabits per second.

A

WISP (Wireless Internet Service Provider.).

83
Q

Spans the globe. Generally connects LANs across a distance.And generally much slower than the LAN.Many different technologies. Point-to-point serial, MPLS, etc.Terrestrial and non-terrestrial.

A

WAN (Wide area network).

84
Q

A network in your city.Larger than a LAN, often smaller than a WAN. Common to see government ownership.They “own” the right-of-way.

A

MAN (Metropolitan area network).

85
Q

Looks and feels like a local storage device.Block-level access.Very efficient reading and writing.Requires a lot of bandwidth.May use an isolated network and high-speed.network technologie

A

Storage Area Network (SAN)

86
Q

Within a building
In a limited geographical area
Expand coverage with additional access points.Downtown area.Large campus

A

Wireless LAN (WLAN)

87
Q

“Pinch” the connector onto a wire,Coaxial, twisted pair, fiber.Connect the modular connector to the Ethernet cable
The final step of the process.Metal prongs are pushed through the insulation The plug is also permanently pressed onto the cable sheat.

A

Cable crimper

88
Q

Wireless networks are
incredibly easy to monitor.Everyone “hears” everything. Purpose-built hardware or
mobile device add-on– Specializes in 802.11 analysis. Identify errors and interference– Validate antenna location and installation.

A

WiFi analyzer

89
Q

Puts an analog sound on the wire.

A

Tone generator

90
Q

Doesn’t need to touch the copper.Hear through a small speaker.

A

Inductive probe

91
Q

“Punch” a wire into a wiring block– 66 block, 110 block, and others.Can be tedious– Every wire must be individually punched.Trims the wires during the punch.

A

Punch-down tools

92
Q

elatively simple– Continuity test.Can identify missing pins– Or crossed wires. Not usually used for frequency testing– Crosstalk, signal loss.

A

Cable testers

93
Q

Useful for testing physical ports– Or fooling your applications. Serial / RS-232 (9 pin or 25 pin).Network connections– Ethernet, T1, Fiber.These are not cross-over cables

A

Loopback plugs

94
Q

Send a copy to a packet capture device

A

Intercept network traffic

95
Q

Physical Taps

A

Disconnect the link, put a tap in the middle– Can be an active or passive tap.

96
Q

Port redirection, SPAN (Switched Port ANalyzer)– Software-based tap– Limited functionality, but can work well in a pinch

A

Port mirror