basics of internetworking Flashcards

1
Q

Computer Network

A

Groups of computers or other devices that use a set of common communication protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nodes

A

devices

AKA hosts or clients

Common examples of nodes include computers, IP phones, and printers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Links

A

The connections that transfer data between nodes.

wired connections or wireless connections.
example = wired connection would be the Ethernet cable plugged into the back of a computer coming from a router or modem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OSI model

A

allows computer network technicians to visualize how one node talks to another node on a computer network and is helpful when it comes to troubleshooting
problems in network communication when they occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

physical layer (layer 1)

A
  • Media (term for cables)
  • physical layer = cables (hands on)

The network hub will receive input, amplify it, and output it out of all the ports on the network hub regardless of destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Servers

A

provide services to host or client nodes.

Common examples of servers include file servers, mail servers, print servers, and game servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protocols

A

set of rules that determine how data is transmitted and interpreted for a computer network.

protocols include HTTP, FTP, DHCP, DNS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

network hub

A

largely obsolete nowadays, having been replaced by network switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

network switch

A

hardware used to interconnect nodes on a computer network.

perform vital function in Layer 2 Switching to receive and transmit data to a destination node on a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

router

A

perform traffic direction functions from one computer network to a destination computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

bits

A
  • Rapid pulses of activity in the signals
  • Protocol Data Unit (PDU) layer 1 physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The rapid transmission of bits in series is known as a

A

bitstream
each bit has an assigned value of either 1 or 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

data link (layer 2)

A

taking a layer 3 PDU and encapsulating it inside of a layer 2 PDU known as a Frame

common protocol = Ethernet, is used for formatting a standardized logical ordering of bits to create what is known as an
Ethernet frame.

1522 bytes.

Frame Header - a source and destination address.

Frame Footer - trailing series of bits that make up what is known as the Frame Check Sequence (FCS) field which provides a form of error detection.

(MAC) address will populate the source and destination address field in the frame header.
48-bits in length and are unique to each individual Network Interface Card (NIC) for each node on a computer network.

MAC addresses are also expressed in a Hexadecimal Format.

the switch in getting a frame from one node inside a computer network to another node inside the computer network is known as Layer 2 Switching.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

network (layer 3)

A
  • Packet Forwarding- getting packet from one node to another node
  • getting packets from one part of the network to another part of the network

Packets contain a leading series of bits

Packet Header (source address and destination address)

IP provides logical address via IPv4 + IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

transport (layer 4)

A

providing delivery mechanisms to support host-to-host communication for programs

protocols -
-Transmission Control Protocol (TCP)
-User Datagram Protocol (UDP).

If TCP is in use during communication, the layer 4 PDU is referred to as a Segment.

If UDP is in use during communication, the layer 4 PDU is referred to as a Datagram.

address type used at the transport layer is a combination of the layer 3 logical address and a TCP or UDP Port Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

UDP (user datagram protocol)

A

This decreases latency in communication at the cost of decreasing reliability of data transmission

is known as a connectionless-oriented protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

session (layer 5)

A

establish the starting point and ending point of sessions in host to-host communication via protocols.

open an individual session known as a Session Beam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

presentation (layer 6)

A

displaying data to user of an application.

a failure= Protocol Mismatch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

application (layer 7)

A

interfacing with the user and is the briefest in scope.
It is the closest to the end user
and allows user inputs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

bus topology

A

all nodes are connected via a common and shared link

all nodes receive equal priority in generating their own traffic this can causes a problem that is known as collisions

advantages
- simple design + linear architecture
- works well for small computer networks
- easy to extend w a connector or repeater (network hub)

disadvantages
∙ Bandwidth is shared among nodes and performance suffers with more nodes.
∙ All nodes receive the same traffic which causes a security concern.
∙ The entire computer network shuts down when there is a break in the main cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ring topology

A

all nodes are connected to two other nodes in a continual path where traffic passes through each node towards its destination

the traffic can be unidirectional (one way) or bidirectional (two way

token generated

Advantages of a Ring Topology
∙ Performs better than a Bus Topology under heavy load.
∙ Easy to isolate faults.
Disadvantages of a Ring Topology
∙ Latency increases with more nodes.
∙ Adding or replacing nodes can cause issues with traffic on the computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

star topology

A

every node on the computer network connects to a central piece of network equipment (network switch or router)

Advantages of a Star Topology
∙ If one node fails it does not affect the entire computer network.
∙ Nodes can be added or removed without affecting the entire computer network.
∙ Great for large computer networks.
Disadvantages of a Star Topology
∙ Can be expensive due to number of cables required for each node.
∙ The central piece of network equipment is a single point of failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

mesh topology

A

all nodes connect to each other.

Advantages of a Mesh Topology
- Full redundancy means there is no single point of failure.
- Direct pathways for traffic decrease latency.
Disadvantages of a Mesh Topology
- More expensive than a Star Topology
- Requires more administrative oversight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IPv4 addresses

A

IPv4 addresses are 32-bits

Dotted Decimal Notation (DDN). Each octet in an IPv4 address has a value between 0 and 255.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
stateful protocol
requires an additional service to be running, like a server. When a node is configured to obtain an IPv4 address from a server on the computer network, this is considered stateful
26
stateless protocol
requires no previous communication with another service to function node is not configured to do so,it uses Stateless Autoconfiguration to generate - Automatic Private IP Address (APIPA)
27
what does the APIPA being present mean? Automatic Private IP Address (APIPA)
sign that there is a problem on a computer network
28
IPv4 address class
value of first octet = class of the address The class of the address will determine how many octets belong to - Network Field + the Host Field A- 0-126 B- 128-191 C-192-223 D- 224-239 E- 240-255 127 = reserved for loopback each octet of an IPv4 address is 8-bits even though it is written in dotted decimal notation.
29
network field
cannot be altered
30
Internet Assigned Numbers Authority (IANA
values in the octet(s) which make up the network field are assigned by a global standards organization
31
host field
comprised of the octet(s) in an IPv4 address which ***can be altered*** variables and can be changed to create unique IPv4 addresses to assign to nodes on a computer network
32
broadcast address
If all the host bits are represented via binary 1s the rules of the protocol will be used as the destination address for every IPv4 node in the same network
33
network ID or network address
all the host bits are represented via binary 0s
34
host address
combination of both binary 1s and 0s used for assignment for nodes on a computer network
35
subnet mask
- written in dotted-decimal notation - further specify separation between the network field and host field for an IPv4 address The network prefix is written in the context of the IPv4 address being a 32-bit address
36
public IPv4 address
an address that is routable over the public Internet
36
private IPv4 address
not routable over the Internet and is primarily assigned to a node on an internal computer network
37
network address translation (NAT)
allow prviate IP address access to the internet by router
38
class a private IP address range
10-10.255.255.255
39
class b private IP address range
172.16.0.0-172.31.255.255
40
configuration options
DHCP - **dynamically** configuring a node with an IPv4 address on a computer network (stateful protocol) **manually **configure the node (the Default-Gateway IPv4 address, subnet mask, and DNS server)
40
class c private IP address range
192.168.0.0-192.168.255.255
41
IPv6 addresses
IPv6 address are 128-bits in total length 8 octets - 16 bits in length (aka 2-bytes) Each octet max value between 0000 and FFFF. Consecutive zeroes can be replaced with two colons (::)
42
Stateless Autoconfiguration
provides an IPv6 address automatically for itself. known as a Link-Local Address. Hash-Based algorithm = last 64 bits of address is randomly generated
43
dual stacking
mechanism that allows nodes or pieces of network equipment to have both an IPv4 and IPv6 address associated to them.
44
Network Address Translation 64 (NAT64)
used on an external router for a computer network
45
tunneling
obsolete mechanism= encapsulates IPv6 packets inside IPv4 packets
46
protocol stack
Protocols are designed to work with one another
47
Protocol Layering
break up intended function of application across multiple layers of the OSI Reference Model
48
Hypertext Transfer Protocol (HTTP)
a protocol used to display webpages on a browser present at application layer
49
Institute of Electrical and Electronic Engineers (IEEE)
worlds largest focused on education and advancement of telecommunications and computer engineering.
50
International Organization for Standardization (ISO)
people from various national standards organizations that promotes world-wide proprietary and commercial standards. - published the OSI Reference Model.
51
Internet Engineering Task Force (IETF)
-development and standard settings organization for the Internet. - Focused on standards related to the TCP/IP Internet protocol suite
52
secure
used to indicate the protocol includes a form of Encryption in its use
53
non-secure
indicate there is no mechanism for encryption involved in a protocol’s use
54
Internet Control Message Protocol (ICMP)
- used for troubleshooting nodes on a computer network. - utilizes echo reply requests to determine connectivity (**ping)**
55
telnet
non-secure protocol = allows computer network administrator to remotely configure network equipment or network devices (network switch or router usually).
56
Secure Shell (SSH)
****secure protocol** = allows network administrator to remotely configure a network device (network switch or router usually).
57
Simple Network Management Protocol (SNMP)
– is a protocol that provides mechanisms for collecting and organizing information - capability to change configuration options + establish configuration baselines on a computer network
58
Domain Name Server (DNS)
protocol that translates domain names for websites to an IP addresses.
59
Dynamic Host Configuration Protocol (DHCP)
protocol allows node to** request** IPv4 address assignment from an external server
60
Dynamic Host Configuration Protocol version 6 (DHCPv6)
protocol that allows a node on a computer network to request and IPv6 address assignment from an external server.
61
Network Address Translation (NAT)
protocol used to associate a private IPv4 address on a computer network with a public IPv4 address for sending and receiving traffic over the public Internet
62
Hypertext Transfer Protocol (HTTP)
*non-secure* protocol that allows users of Internet browser to request resources in the form of web pages and other content from an external web server
63
Hypertext Transfer Protocol Secure (HTTPS)
*secure* protocol allows users of Internet to request resources in the form of web pages
64
Network Time Protocol (NTP)
protocol designed to synchronize all pieces of network equipment and nodes on a computer network FAST using the same Coordinated Universal Time (UTC).
65
File Transfer Protocol (FTP)
protocol designed to transfer computer files
66
fault tolerance
ithe degree to which our computer networks can suffer degradation in operations due to some type of failure but still maintain mission capable functionality
67
Power Supply Unit (PSU)
component utilized to supply power to a piece of network equipment
68
Uninterruptable Power Supply (UPS)
battery backup unit that will continue to power equipment once the main source of electricity feeding it has suffering an interruption. graceful power downs, and avoiding a complete outage during a short and sudden loss of electricity to a facility. An UPS can be meant to serve just a few computers or multiple network switches, routers, and servers depending on the size and specifications of it.
69
Automatic Transfer Switch (ATS)
These are rack mounted pieces of equipment that provide another layer of fault tolerance to a communications rack setup.
70
high availability
prioritizes maintaining access to a system or resource on a computer network. will deploy multiple and redundant paths to and from nodes on a computer network to ensure access in the event one of the links goes down.
71
backup systems
are employed on a computer network to ensure that in the event a server or critical piece of network equipment happens to experience an outage or failure, the computer network can response and return to normal operations
72
Hot Spares and Hot Swapping
the ability to quickly recover from a failure on a computer network the ability to replace a single circuit card without taking down the equipment completely becomes very beneficial
73
Cold Spares and Cold Swapping
pieces of network equipment that will need to be manually added to replace a piece of network equipment that has ceased to function. - requires you to completely power down a piece of network equipment to replace it
74