Chapter 2 - Concepts, Characteristics of Networking Flashcards

1
Q

Network Traffic Types?

A

Broadcast Domain

Collision Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Broads Cast Domain?

A

Consists of all devices receiving a broadcast packet which can originate from any device.

Large # of broadcast last can reduce network bandwidth.

Can effect processing power as the broadcast is heated by every system in the broadcast domain.

Any device stops processing to listen to the broadcast to accept or discard the packet.

A router indicates boundary limit as they discard brackets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collision Domain

A

Network segment where a collision can occur.

Typically Ethernet networks.

Consists of devices connected to a shared media.

If hubs are used they operate they operate at the physical layer, are not aware of addressing and broadcast data across all ports.

A switch operating and the data link layer which is swear of addressing and stops collisions occurring. It uses the MAC address to send data to the receiver only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CSMA/CD

A

Carrier Sense Multiple Access/Collision Detection

Better manages and detects collisions.

Determine how network devices respond when simultaneous requests are made on the same data channel.

Attempts to re send transmission after a time interval to help reduce collision chance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CSMA/CA

A

Detects and avoids collisions on a network.

Listens for collisions prior to transmitting data and informs other devices not to broadcast.

Send dummy packet for collision check.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Segmentation

A

Keeps traffics isolated using segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virtual LAN

A

Use a switch to isolate systems on a network from each other.

If needed devices and communicate between VLANS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trunking

A

Used when needing more than one switch.

It builds a logical connection between two VLANS and allows systems on different sides of switches to be in the same VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tagging Ports

A

Defined by IEEE 802.1Q

Used when multiple VLANS exist per port

Directs traffic to the appropriate VLAN

Not needed if only one switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Port Mirroring

A

Configure switch ports to mirror traffic between ports.

Captures traffic between devices while mirroring
only frames containing SIP/PID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MAC Address Table

A

Dynamically built on the switch using MAC address of frames it receives.

Can determine port forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Address Resolution Protocol (ARP) Table

A

Maps IP Addresses to MAC Address.

Maintains a record of MAC and corresponding IP Addresses

Can implement a switching loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Switching loop

A

Sends a request to other switches if the current switch doesn’t have a MAC address in the ARP Table or is missing the address.

Spanning Tree Protocol can detect a switching loop and stop it if the switch can’t find a correct MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DMZ

A

De Militarised Zone

Uses a firewall which only allows ports to be open to communicate with appropriate system types.

Protects internal systems in the network. Only systems needing to be exposed to the internet are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hub

A

Physical layer device

Connects systems within a LAN or different segments.

It broads casts arriving data across all ports

No swear of addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Switch

A

Network device that filters and forwards packets between LAN segments and hosts.

Operated in the Data Link Layer

Is swear of addressing and only sends data to the receiving device

Isolated network segments using device MAC Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Router

A

Network device that forwards packets between networks.

Operates at the networking layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Routing protocols

A

Enable routers to communicate with each other with respect to the routes they Handel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

RIP

A

Routing Information Protocol

A distance vector protocol

Shares routing information among other networks.

  • Routers maintain a routing table which lists all destinations and is shared to other routers*
  • Distance Vector algorithms determine which path is best to destination.*

Is open source

RIP considers how many routers have to be crosses to the destination via best path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

EIGRP

A

Enchanted Interior Gateway Routing Protocol (EIGRP)

Enables routers to exchange information more efficiently and maintain a copy of neighbouring routing tables.

  • RIP 2 only sends changes to updates of the routing table*
  • RIP doesn’t take into account the state of the fastest path*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Links State Routing Protocol

A

Open Shortest Path First (OSPF)

A routing protocol used to determine the best path for packets.

Replaces RIP

As a router learns of a network change it will multi cast the information to all other OSPF hosts on the network.

  • this updated neighbouring routing tables*
  • also takes into account the state of chosen path. If path is busy it might choose a longer route that’s the most open path.*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Boarder Gateway Protocol (BGP)

A

Manages how packets are routed across the internet

Connects autonomous systems

Combines distance and reach ability and queries if routers are functioning along selected path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IPv6

A

Default IP since vista

128bit

Implemented due IPv4 address shortage.

Supports auto config which helps correct and limitations of IPv4

Converts hexadecimal to binary

16bits of 8bites

1 to 9 for digits and A to F for letters

2001:0CD8:BC20:ED02:0000:0000:0000:0000

Condensed to

2001:CD8:BC20:ED02::

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Dual stack

A

Enables IPv4 and IPv6 to be used at the same time.

Both 4 and 6 are enabled by default

IPv6 is fine tuned to address common communication types like VOIP and Video conferencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
IPv6 Router Advertisement
Allowing client systems to recognise that a router is present *IPv4 required anDHCO to inform client of its IP Address, subnet and default gateway.
26
IPv6 Neiboure Discovery
Performs tasks like Router discovery Duplicates address detection Prefix discovery Tasteless address auto config
27
Traffic/Packet Shaping
Regulates network data transfers Ensures a level of performance and QoS *Prioritises traffic and delays packets deemed less important* Priority examples VOIP Time sensitive data like email over printing Buisness related traffic Internet service provider Tiered internet like regular and standard
28
QoS
Quality of Service Measures overall network performance, transmission and error rates. Can improve traffic shaping like packet prioritisation, Queuing, Application classification
29
DiffServ
Differential Services Protocol Specified and controls network traffic by class Based on class traffic can get precedence like VOIP as it requires an uninterrupted data flow. DiffServ is dependant on compels policy and rules statements when forwarding network packets. *Avoids simple priority tagging as it can be time consuming and take up resources tagging each packet.
30
CoS
Class of Service ``` Groups similar traffic types on a network to manage traffic like Email Video Voice File transfer like large documents ``` *CoS doesn’t guarantee a level of service, only a best effort in terms of Bandwidth and Delivery Time*
31
Main CoS Technilogies
1/ 802.1p for data link layer tagging 2/ Type of Service (TOS) 3/ Differentiated Service (DiffServ) CoS focuses on maintaining best communication possible based on the communication type*
32
NAT
Network Address Translation Used by network devices to assign a public address to a device within a private network. * limits the number of public IPs used by a company* * A private address is only visible to devices on the inside of the router on the private network* * only 1 private address needed to get everyone into the internet* NAT enables packets to be sent to a private address. As packet arrives at the router from inside the network it inserts a public address which is visible to a web server and knows which machine in the private network the data is for.
33
NAT Advantages
Prevents depletion of IPv4 addresses Provide additional layer of security as private addresses can’t be seen from the public network. Increase flexibility connecting to public internet Use private IPv4 addressing system
34
NAT disadvantages
Consumers processor and memory resources Can cause IPv4 communication delays Loss of end device IP trace ability Not comparable with some technologies or network applications Needs to support NAT!
35
PAT
Port Address Forwarding Is a NAT extension Enables multiple network devices to be mapped to a single IP address. Can configure a router or switch to forward data via port # IP address example from public to a device on a private network (public) . (private) 129. 1.2.3:1001 * you state a particular port number to get to a particular system* * more robust routers support more port forwarding rules and are better at maintaining track of connections* * NAT/PAT allow easier access from and to private and public networks*
36
PAT Advantages
Conserve IP addresses Private IP addresses aren’t exposed to public networks Limits attack origination from public network. As they don’t know the IP so can’t launch targeted attacks
37
PAT Disadvantages
More complicated in larger networks. Particularly with remote logins Limited internal table in devices which may run out of unused ports or loose track of connections
38
Port Forwarding
Makes a network device accessible to other devices on the internet even when behind a router. External connections go to the gateway and then to the port # of a requested service. The gateway will then forward the request to the relevant service via its port #. Eg HTTP will use port 80 and data for port 80 is automatically forwarded to the private IP address inside the network. *you don’t have to manually state the uses port. Apps normally use default ports to get data to the correct service*
39
Common use of port forwarding
Online gaming services Peer to peer downloading VOIP apps like Skype, Viber, ooVoo, Zoom
40
Do SOHO router support port forwarding?
Yes You can run internet services from within a SOHO network such as FTP Email Server Web Server Limited number of about 10
41
ACL Koko
Access Control List Determine who and what can use a particular network resource * Router ms and some switches use ACL to restrict data flow to and from and network interface* * Network interfaces are configured to use ACLs to analyse data as it arrives at the Router/Switch* * once data arrives it is compared to the ACL criteria where it’s either denied or permitted* * An external router can provide access to outside network connections*
42
When to use an ACL
1/ To enable basic security for a network. Not a firewall replacement but they can enable protection for network interfaces. 2/ Restrict Updates for Routing from network peers where you can set routers to accept updates from specific routers. 3/ helps to define flow control of network traffic. 4/ Can place ACL rules on external routers to filter traffic from less desirable networks and vulnerable protocols. 5/ To create a DMZ which is a buffer zone between the internal company network and external WAN (internet)
43
DMZ
De Militarised Zone A buffer zone to protect internal network. Only devices that require the internet reside in the DMZ. Like a Web server on DNS server. *Can set up a proxy server which devices go through and use to get internet connection* An external router is set up with a fire wall. The external router normally has less restrictive ACL to allow access. And internal router and fire wall are set with more restrictive ACL to protect the internal network. Commonly configured as explicit allow or deny statements. *ACL along with Firewalls can increase network security*
44
Public IP Addresses
Assigned by an internet service provider to be used by a home or buisness. It differentiates devices connected to the public internet. * must be globally unique* * To access the internet you only need one public address.*
45
Private IP Addresses
Provides internal communication within a private network. * Alleviates IPv4 IP Address exhaustion* * All systems inside your router on the private network can use any IP address configuration* * Configuration can be based on size for example*
46
IANA
Internet Assigned Numbers Authority Reserves certain IP Addresses for private use. Everyone can use these addresses in a private network!
47
Network classes.
A for large networks B for medium networks C for small networks
48
Class A network range
10.0.0.0 to 10.255.255.255
49
Class B Network range
172.16.0.0 to 172.31.255.255
50
Class C network range
192.169.0.0 to 192.168.255.255
51
APIPA
Automatic Private IP Addressing A range of private IP addresses allowing devices to communicate if a DHCP server fails. * implemented if use of a DHCP server. If a device can’t communicate with the DHCP an APIPA is assigned to allow internal communications to continue.* * If you see an IP address starting with 169.254 you know there might be an issue with the DHCP server*
52
APIPA Address Range
169.254.0.0 to 169.254.254.255
53
Loop back Address mi
TCP/IPv4 Is a special address designed for the loop back interface of a machine Packets for the loop back address is used for testing IP software has correctly configured TCP/IP. * not concerned with corrupt drivers or hardware* * ping command can be used to allow a user to perform a test on the loop back address. If you ping 127.0.0.1 and you get a reply it indicates TCP/IP is configured correctly on the machine* * Ping 127.0.0.1 when facing issues with communication*
54
Loop back address range
Always set as 127.0.0.1 Range cane be 127.0.0.0 to 127.255.255.255
55
Reserved addresses
Private Addresses Loop back Addresses APIPA are reserved for Self assignment of a DHCP server goes off line
56
Addresses that can be used for diagnostics
APIPA - indicates issue with DHCP if IP address starts with 169.254 Loop Back Address 127.0.0.1 used to check a machines TCP/IP is correctly configured if you get a response
57
Default Gateway
Allows computers on a network to access the internet * without a gateway devices are isolated from the internet* * Not required to communicate within your private network* * Computer with 2 network adapters can act as a gateway. 1 adapter connects to the subnet and the other connects to the public network (internet)
58
Common Default Gateway IP Addresses
192. 168.0.1 192. 168.1.1 192. 168.0.254 10. 0.0.1 Commonly use the 1st address (# 1) or last address (# 255) of a given subnet.
59
Subnet Mask
Used to determine what subnet an IP Address belongs to.
60
What does an IP Address consist of?
1/ Network Address that identifies the network 2/ Host Address which is a specific network host.
61
IP Address breakdown Class A
255.0.0.0 | 255 = Network and 0.0.0 = Host
62
IP Address breakdown Class B
255. 255.0.0 | 255. 255 = Network and 0.0 = Host
63
IP Address Breakdown Class C
255. 255.255.0 | 255. 255.255 = Network and .0 = Host
64
VIP
Virtual IP Address Is an address that doesn’t correspond to a specific or physical network interface. *Same VIP is used and routed to a server*
65
VIP Common Uses
Servers in a cluster. Which is a group of servers performing the same task. Load balanced servers. Which share performance loads. * Client only needs a single IP Address to access the server cluster, to direct requests to a health server* * each server has its own IP Address*
66
VIP Benefits
Consolidate resources (Load Balancing) Improve Redundancy (Cluster) Virtually unlimited mobility without changing address. (can move the application to another server using Th we same VIP) Shields device led actual IP Address.
67
Address Assignments
DHCP is a client/server protocol that automatically assigns a client with an IP, Subnet and gateway addresses. Allocates from a pool of available IP Addresses. * can be manually or dynamically assigned* * lease for a time period*
68
DHCP Benefits
Reliable IP Address configuration Minimises configuration errors like Typos and duplication conflicts. Centrally managed and automated No need too keep assigned IP address records.
69
How does DHCP assign a IP Address?
Uses DORA Discover - packet send by client to ask for an address. Offer - Sent by Server with addresses Request - Sent by client to request one of the addresses Acknowledge - sent by server acknowledging the requested IP address.
70
Static IP Addressing
Manually assigned to a device as opposed to DHCP this IP Address doesn’t change and remains static
71
Static IP Common use
DNS Server Network printer Website *you don’t want these addresses to change*
72
Static Addressing Advantages
Stability Preferred addresses for servers Remote Access forwarding Reduced down time if DHCP server goes down.
73
Static addressing disadvantages
Security as addresses don’t change Manual configuration open to duplication Additional DHCP server configuration to ensure DHCP pool doesn’t include the static IP Addresses.
74
DHCP Reservations
Permanent address assignment within a scope Is the alternative to static addressing to unequally identify device on a network. A typical reservation includes Reservation time IP Address MAC Address Description