CHAPTER SIX: SUPPORTING NETWORK SERVICES Flashcards

(56 cards)

1
Q

Define server

A

The server is the computer that holds files or manages the printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define client

A

The client is any other computer on the network trying to access those files or use the printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define fileshare

A

When a file is made available over the network, it’s called a fileshare. These servers use a client/server architecture—one computer (server) provides, the others (clients) use.

  • Sometimes, special software like File and Print Services for Windows Networks is used.
  • Another way to share files is using FTP (File Transfer Protocol)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Server Message Block (SMB)

A

This is the language (called a protocol) that Windows computers use to talk to each other for file and printer sharing. SMB runs over the internet using something called TCP port 445 (think of this like a numbered doorway into a computer).

The latest version is SMB3—faster and more secure.
Older version SMB1 is outdated and has major security problems, so it’s usually turned off on modern Windows systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define NetBIOS

A

Back in the early days, before the internet as we know it, Windows used something called NetBIOS to let computers recognize each other by name (like calling someone by their nickname). NetBIOS worked before the internet-standard TCP/IP was popular. Later, they created NetBT (NetBIOS over TCP/IP) so it could work over modern networks.

Today, NetBT is old and risky—only turn it on if you’re dealing with super old Windows systems (before Windows 2000).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

File Transfer Protocol (FTP)

A

FTP is like using a mail service between computers—you send or receive files through it.
Uses TCP port 21 to start the conversation between client and server.
It can use port 20 (active mode) or other ports (passive mode) to actually transfer the files.
Commonly used to upload stuff to websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Web Servers

A

A Web Server is a computer that “serves” websites to users. Uses the HTTP (or secure version HTTPS) protocol to send web pages to your browser.
When you type in a website, your browser (the client) asks the web server to give it the page content.
Web servers can be used for public websites or private company pages called intranets (only for insiders) or extranets (for outside partners with permission).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hypertext Transfer Protocol (HTTP)

A

HTTP is the set of rules web browsers and servers follow to exchange web pages.
Runs over TCP port 80 (or 443 for secure HTTPS).
Your browser sends a request like “GET this page.”
The server responds with the page or an error if it’s not there.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hypertext Markup Language (HTML), Forms, and Web Applications

A

HTML is the coding language that web pages are written in.
It tells the browser how to display text, images, videos, and links.
Web pages often contain hyperlinks—clickable links to other pages.
Pages can also include forms so users can send information (like typing into a contact form and clicking submit).
Many modern sites are web applications—they act like programs (think: Gmail or Facebook).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Uniform Resource Locator (URL)

A

A URL is the full address for a website or file online.
It breaks down like this:
1. https = the protocol (how you’re connecting)
2. www.example.com = the host location (can be a domain name or IP address)
3. /folder/page.html = the file path (location of the file on the server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Web Server Deployment

A

To have a website, you need a place to host it:

Small businesses may rent space on a web server from an Internet Service Provider (ISP).

Big companies might run their own servers in data centers.

Some web servers are only used internally (intranets) or for authorized outside users (extranets), not for the public internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hypertext Transfer Protocol Secure (HTTPS)

A

Back in the early days of the internet, websites used something called HTTP to show pages. The problem? HTTP sent everything (like passwords or messages) in plain text — anyone watching could see it! To fix that, a company called Netscape made something called SSL (Secure Sockets Layer) in the 1990s. It made your data private by scrambling it up (encryption).

Later, TLS (Transport Layer Security) came along as the new and improved version of SSL. When TLS is used with HTTP, it becomes HTTPS — the “S” means it’s secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When your browser connects to an HTTPS website:

A

It uses port 443 (instead of port 80, which is used for insecure HTTP).

The website has a digital certificate from a Certificate Authority (CA), a trusted company that says, “Yes, this website is legit.”

The website uses encryption keys — one public key (shared with everyone) and one private key (kept secret).

Your browser uses the public key to safely create an encrypted tunnel.

Only the server with the private key can understand the tunnel data — this keeps hackers out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Simple Mail Transfer Protocol (SMTP)

A

When you send an email, something called the Simple Mail Transfer Protocol (SMTP) handles delivery. Think of SMTP as the mail truck that gets your message from your email provider to the other person’s provider.

Here’s how it works:
Your email app gives the message to an SMTP server.
That server looks up the IP address of the receiver’s email server using DNS records like MX (Mail Exchange).
It then delivers the message to that server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

There are a couple of different ports with SMTP

A

Port 25: for sending email between servers. Not secure.

Port 587: for sending email from your email app. It should use encryption to protect your password and message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Receiving Email

A

Once the mail gets delivered, it sits on a mailbox server until the recipient checks it. To get that email from the mailbox server, we use mailbox access protocols, like:

POP3 (Post Office Protocol version 3)
IMAP (Internet Message Access Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

POP3 (Post Office Protocol version 3)

A

Downloads emails to your computer.
Usually deletes them from the server afterward.
Uses port 110 (not secure) or 995 for secure connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IMAP (Internet Message Access Protocol)

A

Keeps emails on the server.
Lets you view them on multiple devices.
Lets you organize messages in folders, delete them later, etc.
Uses port 143 (unsecure) or 993 for secure (IMAPS) connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What’s Authentication?

A

Before a device (like your laptop) can access important stuff on a network — like files, email, etc. — it must prove who it is. This is called authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What’s a Directory Server?

A

A directory server is like a digital phone book with a list of users and passwords. It helps decide who’s allowed to do what on a network.

Big companies use systems like Active Directory (Microsoft) or OpenLDAP (open source).

They use something called LDAP (Lightweight Directory Access Protocol) to look up or change user info in the directory.
LDAP runs over port 389, and can be made secure using encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Authentication, Authorization, and Accounting (AAA)

A

This is a system to manage who can connect, what they can do, and track what they did. It has three main parts:

Authentication – Prove who you are.
Authorization – What you’re allowed to do.
Accounting – Track what you did.

Here’s how it works:

The device you’re using (the supplicant) asks to join the network.
The network gear (like a Wi-Fi access point or switch) is called a NAS or NAP (network access server/point).
That gear checks with a central AAA server — a brain in the network — to see if you’re allowed.

Instead of storing passwords in each switch or access point (risky and inefficient), these devices forward your credentials to the AAA server, which handles it all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RADIUS

A

a popular protocol used to make this AAA system work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Remote Terminal Access Servers

A

Think of a remote terminal server like a way to control your computer from far away using just a keyboard screen — like teleporting into your computer and using the command line (text commands) from another location.

24
Q

terminal

A

A terminal was originally a physical keyboard and screen (like a typewriter, called a TTY) that connected to a big computer.

Today, we use terminal emulator software to do the same thing on modern computers. It just shows you a command window (black screen, white text).

25
remote terminal emulator
A remote terminal emulator means you’re connecting to another computer’s terminal over the internet or network.
26
Secure Shell (SSH)
SSH (Secure Shell) is the most common and safe way to connect to Linux, UNIX, or other devices like routers or switches from far away using just commands (no mouse, no windows). It encrypts your connection — so no one can snoop on what you’re typing. SSH uses port 22 by default (a port is like a specific "door" into your computer). You can also use SSH to transfer files (SFTP) and do other advanced things. OpenSSH is the most popular tool used for this.
27
Telnet
Telnet is like the older, less secure version of SSH. It lets you type commands into a remote machine. It uses port 23. It does not encrypt anything — so hackers could eavesdrop on what you’re doing. Because of that, people don’t really use Telnet for serious tasks anymore. It’s kind of outdated.
28
Remote Desktop Protocol (RDP)
SSH and Telnet only give you a command line (text-based control). But what if you want to see the desktop with icons, windows, and your mouse? That’s what RDP (Remote Desktop Protocol) is for — it lets you use your mouse and keyboard to control another computer's graphical interface, like you’re sitting in front of it.Made by Microsoft, it uses port 3389. You can use RDP from Windows, Mac, Linux, phones — pretty much any device.
29
Simple Network Management Protocol (SNMP)
SNMP is a tool that helps you monitor and manage all your network devices (like switches, routers, and servers). Each device runs a small helper program called an agent. The agent keeps a MIB (Management Information Base) — this is just a list of statistics about the device (like how much data it’s processing). The agent can also send alerts (called traps) if something bad happens — like a cable gets unplugged. SNMP uses two ports: - UDP 161 for regular info checks - UDP 162 for alerts/traps
30
Syslog
Syslog is a system that helps collect logs (records of events) from many devices into one place. A log is like a diary entry that devices write when something happens (errors, updates, user activity). Instead of checking logs on every single device, a Syslog collector gathers all those logs into one dashboard. Syslog uses port UDP 514 to receive these logs.
31
Internet and Embedded Appliances
Think of your home or office like a tiny network (called a SOHO network, meaning Small Office/Home Office). All your devices—laptops, phones, etc.—connect to the router to get online. But here's the thing: the Internet doesn’t understand your devices' private IP addresses (like 192.168.0.10). That’s where NAT (Network Address Translation) comes in. NAT (especially port-based or overloaded NAT) is like a translator. It hides all your private IPs and shows just one public IP to the Internet (the one your router uses). In big companies (enterprise networks), they can use NAT, but often they use a proxy server instead.
32
Proxy Servers
A proxy server is like a middleman for your Internet requests. Let’s say you want to visit a website. Instead of going straight there, your computer asks the proxy. The proxy checks your request, then sends it to the real website. When the site responds, the proxy checks that too, and gives you the answer. This adds security (since the proxy can filter or block stuff) and can even cache (save) websites to make them faster for next time.
33
Transparent proxy
You don’t need to set anything up—it just works.
34
Non-transparent proxy
you have to tell your computer where the proxy is (IP address and port number, often port 8080).
35
firewalls
Firewalls: Think of these as bouncers—they allow or block traffic based on rules (like who it's from, where it’s going, or what app is being used).
36
IDS
IDS (Intrusion Detection System): Watches traffic for signs of known attacks and alerts someone.
37
IPS
IPS (Intrusion Prevention System): Like an IDS, but it can also block the bad traffic automatically.
38
Antimalware
Antivirus/Antimalware: Scans files moving through your network to catch viruses.
39
Spam Gateway
Spam Gateway: Filters email using things like SPF, DKIM, and DMARC (all tools to prove if an email server is legit). It stops junk or scam emails before they get to your inbox.
40
Content filters
Content Filters: Stop users from going to bad or unauthorized websites
41
DLP
DLP (Data Loss Prevention): Checks for sensitive info trying to leave your network (like someone emailing a customer list) and blocks it if not allowed.
42
UTM
UTM (Unified Threat Management): Combines all of the above tools into one box. Easier to manage than having a bunch of separate tools.
43
Load Balancers
Imagine you have a busy restaurant and one server can’t handle all the customers. You’d send them to different waiters to balance the load. That’s what a load balancer does, but with servers. It takes incoming requests (like people visiting a website) and spreads them across multiple server nodes (copies of the same service). The result? Faster websites, fewer crashes, and smooth service. Load balancers help when you’re running web servers, email servers, video conferencing, or streaming services. Clients see a virtual server (one address), but the load balancer distributes the work behind the scenes.
44
Legacy Systems
A computer or software that’s no longer supported by the company that made it. Maybe the vendor is out of business or stopped updating the product (EOL = End of Life). Companies keep using them because they still work well and would be expensive or risky to replace. BUT—they’re dangerous. If hackers find a way in, there’s no fix because no one's updating them. So we isolate them (keep them separate from the main network) and watch traffic to/from them closely.
45
Internet of Things (IoT) Devices
These are your smart devices—things like smart fridges, smart thermostats, doorbells with cameras, etc. They all connect to the Internet and talk to each other. A hub/control system is like the brain. It could be a smart speaker or an app on your phone. Many of these devices are headless—they don’t have screens or keyboards. So, you use your phone or voice to control them. Smart devices are little computers (often using Linux or Android), which means they can be hacked if not secured. Hackers could use their cameras or mics to spy on you if they break in. Devices talk over Wi-Fi, or other low-power tech like Z-Wave or Zigbee. These use less battery and are designed for small, cheap devices.
46
Troubleshooting Wired Connectivity (Cabled Internet Problems)
Assuming only your computer is affected (not everyone else’s), we follow the network "path" and test each part of it. Here's what the path usually looks like in an office: 1. Your computer’s NIC (Network Interface Card) – this is the physical port on your computer where you plug in the Ethernet cable. 2. A patch cord – the Ethernet cable that runs from your computer to the wall. 3. Structured cabling – wiring hidden in the walls that connects that wall jack to a central hub (the switch). 4. Another patch cord from the wall's patch panel to the switch. 5. The switch, which connects all devices to the wider network. Let’s fix things by testing each part.
47
Troubleshooting Wired Connectivity
Step 1: Check Patch Cords These are the visible Ethernet cables. If your connection is bad: Unplug the cable and plug it back in. Wiggle gently. Try replacing the cable with one that you know works (a known good cable). You can also use a cable tester (a tool that tells you if the cable is damaged or wired wrong). Step 2: Check the Transceivers The transceiver is the part of your switch or computer that actually sends and receives network signals. If you think the port (where the cable plugs in) is bad: You can test it with a loopback tool, which plugs into the port and sends a signal back to itself to see if it works. Or, if you don’t have one, you can plug in another working computer to the same cable and see if that works. Step 3: Check the In-the-Wall Cables (Structured Cabling) If both cables and devices are fine, the issue might be in the structured cabling (wiring inside the walls). Use a cable tester to check: Whether the wires are damaged. Whether the wires are properly connected at each end (called termination). Some testers, called certifiers, give a full report on how good or bad the cables are, including whether they suffer from interference (electrical noise from nearby devices). Step 4: Check Ethernet Speed and Duplex Settings Your computer and the switch need to “speak the same language” in terms of speed and duplex: Speed = how fast data moves (e.g., 100 Mbps or 1 Gbps). Duplex = whether both sides can talk at the same time (full duplex) or only one at a time (half duplex). These should be set to auto-negotiate — that means the devices figure it out themselves. If something goes wrong here, speeds can drop a lot. You might also want to update your NIC driver (the software that controls the network card).
48
Troubleshooting Network Speed Issues
Step 1: What Are You Actually Doing? Is it slow while browsing, downloading, or just when logging in? Use a tool to check how fast the data is moving. Don’t rely on just how fast websites load — test the actual transfer rate. Step 2: Check for Interference If one specific cable seems slow, it might have interference — electrical noise that messes up the signal. This can come from: - Power lines - Fluorescent lights - Motors or generators It might also be crosstalk, where wires inside the cable interfere with each other because they were untwisted too much at the ends. A network tap (like a traffic monitor) or your switch’s software might show lots of damaged frames (corrupted data), which is a red flag. Step 3 & 4: Check the NIC Driver The network adapter driver on your computer might be outdated or buggy. Try updating it. If others using the same NIC model and driver version have problems too, it’s probably the driver’s fault. Step 5: Malware or Bad Software Slow speed could also be from malware or a bad app on your computer. Unplug the computer from the network and scan it. If plugging in another computer fixes the issue, you know it’s something wrong with the original machine
49
Troubleshooting Wireless Issues
Wi-Fi problems are like wired issues, but you also have to worry about radio signals and distance. Common Wi-Fi Problems: Can't connect. Connection drops. Internet is super slow. First things to try: 1. Move closer to the access point (the device that gives off Wi-Fi). 2. Make sure your Wi-Fi settings (like security key, password, or encryption) are entered correctly
50
Received Signal Strength Indicator (RSSI)
Your wireless device (like a laptop or phone) measures how strong the Wi-Fi signal is, and this is called RSSI. If the signal isn’t strong enough, the device will slow down the connection speed to stay connected. Example: A device that could work at 144 Mbps (super fast) might slow down to 11 Mbps (pretty slow) if the signal is weak. If the signal is too weak, the device may disconnect and try to connect to a different Wi-Fi.
51
Flapping
If two weak Wi-Fi networks are nearby, your device might keep jumping back and forth between them, which is called "flapping."
52
Troubleshooting Wireless Signal Issues
If you're close enough to the router but the signal is still bad, something might be interfering with the signal. Other devices like baby monitors or microwaves can mess with Wi-Fi because they use the same radio frequencies. - Try changing the channel your Wi-Fi uses—just like switching to a less crowded station on a radio. Physical stuff can block Wi-Fi signals too: - Thick walls, metal, concrete, mirrors, or even foil-backed insulation can mess it up. - You can use Wi-Fi analyzer software to: - See how strong nearby Wi-Fi signals are (measured in dBm, where -30 is excellent, and -90 is terrible). - See what channel each network is using, and switch to one with less competition.
53
Troubleshooting VoIP (Voice over Internet Protocol) Issues
VoIP is just using the internet to make voice calls, like Skype or Zoom. Problems in VoIP calls can be: - Dropouts (voice cuts out) - Echo - Glitches or lag Unlike normal downloads (which are "bursty" and don’t care about timing), VoIP needs things to arrive: On time In the correct order
54
Two big problems for VoIP are:
1. Latency – Delay in how long it takes for your voice to reach the other person. - Good latency: under 150 milliseconds (ms). - It gets worse if data has to travel far or through busy routers. 2. Jitter – The variation in how fast each packet of data arrives. - VoIP can handle up to 30 ms of jitter without messing up. - Caused by network congestion (when your network is too busy). To fix this, networks use QoS (Quality of Service): It’s like a VIP lane for VoIP traffic. The network gives VoIP calls top priority. Big businesses can set this up across their whole system. At home, you can often set QoS rules in your router settings to make calls smoother.
55
Troubleshooting Limited Connectivity (Can’t Get Online)
If your computer says "limited connectivity", it means: You're plugged into the network, but you didn’t get a proper IP address from the DHCP server (the thing that gives devices their addresses). So your device gives itself a temporary address starting with 169.254.x.y, which can’t get you online.
56
Troubleshooting Limited Connectivity
Here’s how to fix it: 1. Check if it’s just you or everyone: If multiple devices are affected, the problem is probably the DHCP server. Maybe it’s down, full (ran out of addresses), or misconfigured. 2. Check your cables and connections: Make sure the wall port is connected to the right switch port through the patch panel (basically, all the physical plugs and wires are in the right spots). 3. Check VLAN configuration: A VLAN is a way of splitting up networks. If your device is on the wrong VLAN, it’s like being in the wrong room—no access to the right services like DHCP, DNS, or even the internet.