Network Infrastructure Concepts Flashcards

1
Q

Definition of a Network

A

Network: In its most simple form, a network consists of two or more computers connected to each other by an appropriate transmission medium that allows them to share data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give all types of networks

A

Types: LANs, WANs, MANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of a network?

A

Purpose: Provide services and resources to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the modern forms of networks?

A

Modern: web applications, social networking, VoIP, multimedia conferencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What historically would share data over a network?

A

Historically: files, folders, printers, email, databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are LANs based upon

A

Ethernet (networking product)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who developed Ethernet

A

DIX consortium( Digital Equipment Corporatio[DEC],Intel and Xerox)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who maintains Ethernet standards

A

Maintained by IEEE [Institute of Electrical and Electronics Engineers] (802.3 standards)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give all types of Ethernet

A

Types:
10 Mbps (10BASE)
Fast Ethernet (100BASE)
Gigabit Ethernet (1000BASE)
10G Ethernet (10GBASE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False
Ethernet is not flexible, self-contained, scalable

A

False
Ethernet is flexible, self-contained, scalable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is complementary to IEEE 802.11 standards (Wi-Fi)

A

WLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two classes of LANs

A

SOHO and Enterprise Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Definition of SOHO

A

SOHO: business network with server and clients, using single Internet appliance as an access point, Ethernet switch, Internet modem, Internet router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Definition of Enterprise Network

A

Enterprise network: usually dedicated single-function connectivity appliances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Definition of SME

A

Small and Medium-Sized Enterprise (SME): network supporting tens of users; multiple switches, access points, routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Definition of Enterprise LAN

A

Enterprise LAN: hundreds or thousands of servers and clients; multiple enterprise-class switches, access points, and routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Definition of CAN

A

Campus Area Network (CAN) = LAN spanning multiple nearby buildings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Definition of UTP

A

UTP: Unshielded Twisted Pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Features of UTP

A

Most widely used
Four copper conductor pairs
Insulating sheath
Twisted to reduce crosstalk and EMI
Paired wires carry equal/opposite signals
PVC jacket
Works well in low interference; has limited range, may exhibit attenuation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the standards for CAT 5

A

Frequency: 100 MHz
Capacity: 100 Mbps
Max Distance : 100m (328 ft)
Network Applications: 100BASE-TX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the standards for CAT 5e

A

Frequency: 100 MHz
Capacity: 1 Gbps
Max Distance : 100m (328 ft)
Network Applications: 1000BASE-T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the standards for CAT 6

A

Frequency: 250 Mhz
Capacity: 1 Gbps or 10 Gbps
Max Distance : 100m(328 ft) or 55m(180 ft)
Network Applications: 1000BASE-T or 10G BASE-T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the standards for CAT 6A

A

Frequency: 500 Mhz
Capacity: 10 Gbps
Max Distance : 100m(328 ft)
Network Applications: 10GBASE-T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Definition of STP

A

STP: Shielded Twisted Pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Features of STP
Shielded Twisted Pair (STP) Originally used the braided shield to reduce interference and crosstalk; can be bulky, difficult to install. Modern STP uses screened cables; shield positioned around all pairs. Shielded Cat 53/6/6A: F/UTP (also ScTP) U/FTP Modern STP solutions incorporate grounding in each element.
26
Definition of Plenum
Plenum: An air handling space, including ducts and other parts of the HVAC system in a building.
27
Features of Plenum Space
Typically a false ceiling, maybe raised floor. May be used for communications wiring. Can be the conduit for fire.
28
What does general-purpose(non-plenum) use
General-purpose non-plenum cable uses PVC; marked CMG/MMG or CM/MP
29
True or False Plenum cable must not emit smoke, must self-extinguish, meet other fire safety standards.
True
30
Features of Plenum
Uses treated PVC or FEP; can be less flexible, does not affect bandwidth. Marked CMP/MMP.
31
For what modular does twisted pair cabling for Ethernet terminated
RJ-45 connectors
32
Features of Ethernet twisted pair terminated with RJ-45 connectors
8P8C (8-position/8-contact) Color-coded (Blue, Orange, Green, Brown) 1st conductor in pair has white/stripes 2nd conductor in pair is a solid color
33
Features of ANSI/TIA/EIA 568 termination
T568A is shown T568B: Pin 1=Orange/White; Pin 2=Orange; Pin 3=Green/White; Pin 4=Green
34
What cable has the same termination at both ends?
Normal (straight-through) cable
35
Wiring Standards for Twisted Pair: Features of crossover cable that has T568A at one end, T568B at the other.
Previously used for direct connections. Now Gigabit Ethernet interfaces can automatically cross over with standard cable.
36
Wiring Standards for Twisted Pair: Why should you avoid mixing standards
Both are common. T568A mandated for US government and by TIA 570 residential cabling standard
37
True or False Gigabit Ethernet has no more than 100 m of cable between switch and computer
True
38
Features of solid cabling
Single thick wire for permanent links, aka “drop cables” Links RJ-45 port on a wall plate with patch panel Terminates in IDC
39
Features of patch cord connects RJ-45 port on the panel to port on the switch
Stranded cable; flexible, less efficient 5 m maximum length
40
Definition of wire stripper/cutter
Wire stripper/cutter: for cutting wire and stripping insulation and cable jackets.
41
Definition of punch-down tool
Punch-down tool: fixes conductors into an IDC.
42
Definition of crimper
Crimpers: fix a jack into a cable.
43
What should you do when you cable test.
Cable testing: Verify wiring installation and termination just after making connections, with access to cable runs. Simpler than during user device setup. Consider: Patch cord between PC and wall. Wall port and wall cabling. The port on the patch panel and a patch cord to the switch port. Test with a known good cable. Various troubleshooting devices.
44
Definition of Multumeter
Multimeter: basic cable testing tool; tests for copper wire continuity, the existence of short, the integrity of terminator.
45
Definition of Wire Map Tester
Wire map tester: identifies transpositions and reverse pairs.
46
Definition of Advance Testers
Advanced testers: show cable’s physical/electrical properties.
47
Definition of Certifiers
Certifiers: test and certify installation to a category.
48
Definition of Loopback plug
Tests a port Connects pin 1 to pin 3 and pin 2 to pin 6
49
What are electrical signals on copper wire subjects too?
To interference/attenuation.
50
What does light signals on fiber optic cable resist
Interference, eavesdropping, attenuation.
51
What does fiber optic cables support
Supports higher bandwidth, longer cable runs.
52
What is SMF
Single-Mode Fiber
53
What is MMF
Multi-Mode Fiber
54
Features of SMF
Small core, long-wavelength, near-infrared signal generated by the laser. Data rates up to 10 Gbps or more; cable runs of many kilometers (suitable for WANs).
55
Features of MMF
Larger core, shorter wavelength. Less expensive optics, less expensive deployment. Lower signaling speeds, shorter distances (suitable for LANs).
56
What are the types of connectors for fiber optic cabling
Straight Tip (ST), Subscriber Connector (SC), Lucent/Local Connector (LC).
57
True or False Patch cords can have the same or mixed connectors.
True
58
True or False Connectors damage easily; plug/unplug only when needed.
True
59
Features of Coaxial Cabling
Two conductors share the same axis. Signal conductor insulated; second wire mesh conductor acts as EMI shield and as ground.
60
What is coaxial cabling available as
Coax is also available with tri- or quad-shielding.
61
What is RG(Radio Graded) standard categorize by
categorizes cable by thickness and impedance.
62
Types of Coaxial Cabling by the RG standard
RG-6: thicker core, better quality, often used as drop/patch cable in modern CATV and broadband. RG-59: thinner core; drop cable for older CATV/cable modems; used in CCTV.
63
What is coaxial cabling shielding is also available?
Coax is also available with tri- or quad-shielding.
64
What connectors are at the ends of coaxial cabling?
BNC connectors at cable end in most cases. Also screw-down F-connectors.
65
What connects coaxial cables
BNC couplers can connect cables.
66
What cable types must the impedance of the coaxial cable match.
50 or 75 ohm
67
What do 10BASE-5/Thicknet and 10BASE-2/Thinnet support
Supported 10 Mbps, up to 500 m and 185 m, respectively.
68
Coax is now obsolete for LANs but what is it used for.
In use for CCTV and drop cables for CATV and Internet.
69
What does a Hybrid Fiber Coax (HFC) do?
Coax links fiber trunk in street to a customer cable modem. Less attenuation than TP but bulkier, harder to install.
70
Definition of NIC
Network Interface Card (NIC) port provides a connection to network media.
71
Features of NIC
Data signals must come in regular units with a consistent format. Each node must be able to address other nodes. Ethernet data link protocol provides addressing, framing functions. Various encoding mechanisms; NIC transceiver transmits and sends in agreed frame format.
72
Where is the NIC in a PC
Usually onboard the motherboard.
73
Features of NIC
Maybe PCIe expansion board. All onboard cards support copper-based Ethernet with RJ-45 ports. Expansion cards may support: Fiber optic. Multiple port types. Multiple ports of the same type (can be bonded for higher-speed links).
74
Defintion of a MAC adresss
MAC address: unique address for each Ethernet adapter port.
75
What does a MAC address provide
Provides value for frame source and destination fields.
76
How many bytes does a MAC address contain
48 bits/6 bytes.
77
How is a MAC address shown
Shown as 12 hex digits: May have colon, hyphen, or no separator. Examples: 00:60:8c:12:3a:bc or 00608c123abc.
78
What does a LED status show?
Show connection status
79
Features of a LED that's part of an Ethernet NIC
Link light shows if the network signal is present. Activity light flickers when packets are received/sent. Speed light possible on multi-speed adapters. Dual-color LEDs combine functions.
80
Give all legacy networking appliances and definitions
Legacy appliances include: Hub: center of Ethernet star topology, works as a multiport repeater. Repeater: retransmits the signal to overcome distance limitations. Bridge: divides the network into segments (collision domains) to reduce contention and collision.
81
True or False A switch is not an appliance at the core of modern networks.
False A switch is an appliance at the core of modern networks.
82
In a modern network what does act like.
Ethernet switch in the modern network acts like a hub, repeater, and bridge.
83
Features of micro-segmentation
Switches have up to 48 ports. Multiple switches can connect to the switched fabric with thousands of ports. Each port is a separate collision domain. Establishes point-to-point link (virtual circuit) between any two nodes. Collisions only occur if the port is half-duplex (attached to a legacy card or node). Collisions only affect that segment, not the whole network.
84
Features of an unmanaged switch
Unmanaged switch: Performs micro-segmentation without configuration. May be found in small networks (4 or 8 port switches). Embedded in most ISP’s Internet routers/modems.
85
Features of a managed switch
Managed switch: For larger workgroups and corporate networks. Unmanaged out of the box, but can be configured administratively. Can provide thousands of access ports by linking switches. Can divide into virtual LANs (VLANs).
86
Definition of Power over Internet
Supplies power from a switch port over Cat 5 or better to a powered device.
87
Features of PoE
PoE-enabled switches are called end-span/end-point PSE. A power injector can be used if the switch does not support PoE. The switch detects if the connected device is PoE-enabled. More efficient than powering each device through a wall socket. Network-management software can control devices, apply power schemes.
88
Give all the two standards for PoE
Two IEEE standards (both now in 802.3-2012): 802.3af 802.3at (PoE+)
89
Features of Ethernet of Power
SOHO networks are unstructured, use a single router, incorporate smart appliances. Wireless is an obvious solution; WLAN bandwidth may be adequate. There may be interference issues or appliances may not support Wi-Fi. Ethernet over Powerline uses building power circuits; overlays carrier signal to transfer Ethernet frames. The adapter plugs into an electrical outlet; provides RJ-45 ports. No configuration is needed, but security can be configured. Standards defined by IEEE 1901, managed by HomePlug Powerline Alliance.
90
What is Wireless Networking?
A range of connectivity products and devices. Personal area networking to Internet connectivity. Usually uses radio waves for transmission, tuned to a specific frequency.
91
What is the range of RF
RF ranges from 3 KHz to 300 GHz
92
Give all features of wireless frequencies and channels
Subdivided into bands (FM radio and TV are VHF band) Radio spectrum use regulated by governments Standardized by ITU Frequency use requires a license Some unregulated frequencies
93
What standard does Wifi equal?
IEEE 802.11 standards = Wi-Fi (Transfer rates for optimal installation; frequencies lack penetration; may be interference; data rate may drop with distance.)
94
What is the max transfer rate and band for 802.11a (1999)
Maximum Transfer Rate 54 Mbps Band 5 GHz
95
What is the max transfer rate and band for 802.11b (1999)
Maximum Transfer Rate 11 Mbps Band 2.4 GHz
96
What is the max transfer rate and band for 802.11g (2003)
Maximum Transfer Rate 54 Mbps Band 2.4 GHz
97
What is the max transfer rate and band for 802.11n (2009)
Maximum Transfer Rate 288.8 Mbps/stream (Single Channel) 600 Mbps/stream (Bonded Channels) Band 2.4/5 GHz
98
What is the max transfer rate and band for 802.11ac (2013)
Maximum Transfer Rate 1.7 Gbps (at time of writing) Band 5 GHz
99
What is the features of 2.4 GHz frequency bands in 802.11
2.4 GHz: Longer wavelength, longer range, propagates better through solids Does not support many individual channels; is often congested Increased risk of interference Achievable data rates less than 5 GHz
100
What is the features of 5 GHz frequency bands in 802.11
5 GHz: Less effective at solid surface penetration Lower range than 2.4 GHz More individual channels; less congestion Higher data rates
101
Give a descrpition of the range of wireless frequencies
Range: 2.4 GHz: maximum indoor range ~30-45 m (100–150 ft). 5 GHz: maximum indoor range up to ~30 m. Absolute range less important than number of clients to support and wall/ceiling construction.
102
Give the channels and description of wireless frequiencies
Channels: 2.4 GHz: up to 14 channels, considerable overlap, co-channel interference. Special codes distinguish pattern of each node. Channel can become saturated. 5 GHz: 23 non-overlapping channels: More WANs in same area or access points closer together, higher client device density.
103
True or False 802.11a/b/g considered legacy standards, limited to old equipment
True
104
Give a full description of 802.11n
More bandwidth than legacy standards. Multiplexes 2-4 antennas using MIMO. AxB:C notation (transmit antennas, receive antennas, simultaneous streams). Can use 2.4 GHz or 5 GHz band (preferred). Can use channel bonding in 5 GHz band to deliver more bandwidth. Nominal data rates 288.8 Mbps (single channel) and 600 Mbps (bonded channels).
105
Give a full description of 802.11ac
Continues development of 802.11n. Works in 5 GHz range. Can use 2.4GHz range for legacy standards in mixed mode. Aims for throughput comparable to Gigabit Ethernet. Supports channel bonding to 80 or 160 MHz channels; 8 special streams vs. 4; denser modulation. Needs high-end equipment for sufficient antennas for 8 streams. Theoretical data rate with 8 streams and 160 MHz channel bonding ~6.93 Gbps.
106
True or False Most Wi-Fi networks are Infrastructure mode
True
107
How does a client connect to a network
Each client connects with an Access Point (AP)
108
What is BSS
Basic Service Set
109
What is the MAC address of a AP called
BSSID
110
What is an AP
AP is bridge between wired/wireless network (Distribution System) AP connects to network like a host computer
111
What is a WDS
Wireless Distribution System (WDS)
112
What tasks does a AP complete
Extends network without a cabled backbone. Bridge mode and repeater mode. Can be complex; can be compatibility issues with different vendors’ devices.
113
True or False Range extender is simpler residential solution; can work with powerline adapter.
True
114
What is the description of a configuration called Ad-hoc and Wi-Fi Direct
Stations configured to make direct peer-to-peer connections. Older standards: ad-hoc mode. Modern approach: Wi-Fi Direct.
115
What is the description of a configuration called Wireless Mesh Network (MSN)
Part of 802.11s standard. Nodes (Mesh Stations) can discover each other and make peer connections to form Mesh Basic Service Set. Mesh stations perform path discovery and forwarding. Routing protocol such as Hybrid Wireless Mesh Protocol (HWMP).
116
What is the description of a configuration called Personal Area Network (PAN)
Using wireless connectivity to connect to devices with a few meters. Printers, smartphones, headsets, etc.
117
Features of wireless network card
Each Wi-Fi network station needs network adapter compatible with 802.11 standard in use on network. Onboard adapters; expansion boards; USB-connected adapters. Link-layer MAC address like Ethernet cards.
118
Defintion of Internet Backbone
Internet backbone: high-bandwidth backbones connecting Internet eXchange Points (IXPs).
119
Who created internet connections
Created by telecommunications companies and academic institutions . Organized nationally and internationally.
120
What do business and home networks use to connect to the internet
ISP( Internet Service Provider)
121
What does an ISP allocate
ISP allocates IP addresses, registers domain names, hosts email and websites.
122
What do Enterprise ISP offer
Enterprise ISPs offer high bandwidth through fiber optic cable.
123
Features of a ISP
Network connects to ISP’s Point of Presence (PoP). Dial-up, broadband (DSL, FTTx, cable), wireless connections. Most use PSTN (aka POTS, “local loop,” “last mile”).
124
Give a description of a broadband internet access
A range of technologies “Always on” Data transfer rates much higher than dial-up
125
Give a description of DSL
DSL uses high frequencies in digital phone line for communications. Filter separates DSL signals from voice traffic. Advanced modulation and echo cancelling enable high-bandwidth, full-duplex. DSL “modem” connects to phone system (usually router/modem/AP appliance). Phone line connects to DSL modem bank (DSLAM). PPP over ATM (PPPoA) or PPP over Ethernet (PPPoE).
126
Give a full description of DSL type Asymmetrical DSL (ADSL)
Consumer version; fast downlink, slow uplink Various iterations ADSL2+: downlink rates up to ~24 Mbps; uplink rates up to ~1.4 Mbps Providers may restrict data download Cable quality, number of users may affect speed Max range ~2 miles/3 km
127
Give a full description of DSL type Symmetric DSL
Same uplink and downlink speeds Useful for businesses, branch offices
128
Give a full description of DSL type Very High Bitrate DSL (VDSL)
High bit rate at expense of range Symmetric and asymmetric modes Asymmetric: 52 Mpbs downstream/6 Mpbs upstream over 300 m/1000 ft Symmetric: 26 Mbps in both directions VDSL2: 100 Mpbs bi-directional rates for very short range
129
Give all features of Fiber Optic Internet Access
Higher bandwidth, a longer distance than copper cable Has replaced copper as core of telecommunications networks Being extended to individual homes and businesses Two principal types of fiber optic network services: Cable TV providers Telecom providers
130
What is HFC
Hybrid Fiber Coax (HFC)/Cable (“broadband cable” “cable”): Connection through CATV service, combines fiber core with coax to customer.
131
How does a Cable modem connect to a local network
The cable modem connects to the local network through an Ethernet adapter.
132
What does DOCSIS v3 allow
DOCSIS v3 allows multiplexed channels for higher bandwidth.
133
What can a coax do when it's on a premises
Coax links all premises in a street with CMTS to ISP PoP via fiber backbone.
134
Give the upload and download speed of DOCSIS
DOCSIS: Downlink up to 38 Mbps (North America) or 50 Mbps (Europe); and uplink up to 27 Mbps.
135
Give a description of Fiber to the X (FTTx)
Solutions where fiber replaces copper in the “last mile”
136
Give a description of Fiber to the Premises (FTTP)/ Fiber to the Home (FTTH)
Most expensive, not widespread Fiber link terminated at customer premises equipment
137
Give a description of Fiber to the Node (FTTN) Fiber to the Curb/Cabinet (FTTC)
Fiber to communications cabinet at street Similar to HFC, but consumer link uses VDSL over phone wiring (not coax)
138
Give a full description of Dial-Up Internet Access
Telephone connection between computers. Uses entire frequency range; not efficient, low bandwidth. Phone charges apply; lines cannot be used for voice at the same time. Modems at each end convert digital-analog (MOdulation/DEModulation).
139
What are the disadvantages of Dial-Up Internet Access
Disadvantages: low data transfer, time to establish connection, errors
140
What is the fastest modem of Dial-Up Internet Access
Fastest modems ~33.6 Kbps; speed limit of the phone line Theoretical maximum downlink ~56 Kbps
141
What are Dial-up Internet Access still used for
Has been superseded; still in use as a backup or for areas without other support
142
How can Dial-up Internet Access speed be increased
Compression may improve data transfer
143
Give a full description of ISDN Internet Access
Digital circuit-switched technology for voice, video, data. Uses copper telephone wiring if of sufficient quality. Uses digital signatures for both voice and data; no analog conversions. Dial-up service billed by line rental and usage; establishes a connection in ~1 second. Used to connect LANs and for remote workers. Remains in use for telecom core; superseded by DSL/cable for subscribers. Terminal Adapter connects to PC or router; to a network via NT1 device.
144
What are the two classes of ISDN Internet Access and give a full description of each?
Two classes: BRI: two 64 Kbps "B" data channels for data and one 16 Kbps "D“ control channel. PRI: 23 or 30 “B” channels, one 24 Kpbx “D” channel.
145
Where is fixed wireless internet access used?
Wired broadband may not be available: In rural areas In older buildings where not possible to run new cable
146
What are the options for the fixed wireless internet access used?
Two options: Satellite Line of Sight (LoS) Wireless Internet Provider (WISP)
147
Give a description of the satellite which gives fixed-wireless internet access
Large coverage area with VSAT microwave antenna aligned to the orbital satellite. Super High-Frequency range (3-30 GHz). Satellite television receivers for domestic use; use growing for businesses, especially rural. Transfer rates vary: 6 Mbps / 15-20 Mbps down typical. Can be severe latency problems. Dish at customer aligned with satellite; connects via coax to DVB-S modem.
148
Give a description of the LoS WISP
Ground-based microwave antennas aligned with each other; transmit if no physical obstruction (usually atop tall buildings). Spans great distances; no cabling infrastructure; lower latency than satellite. Hard to maintain a line of sight; expensive. WISP may use Wi-Fi or proprietary equipment. The range of frequencies; may be affected by 5G cellular phone service deployment.
149
Give a full description of Cellular Radio Networks
Wi-Fi bands have a restricted range; fixed wireless requires a large antenna. Cellular radio wireless networking allows long-distance communications over smartphone devices. Also used by IoT devices. Connects to nearest transmitter; base station range of up to 5 miles. The transmitter connects the phone to mobile/landline networks. 850 / 1900 MHz bands (Americas); 900 / 1800 MHz bands (rest of world).
150
Give a full description of 2G
GSM phones using a SIM card; international, and AT&T in the US TIA/EIA IS-95 (cdmaOne) handsets managed by a provider with CDMA; Sprint and Verizon Data access built on top of existing voice network using CSD Must establish a data connection to the base station, incurring charges; maximum ~14.4 Kbps
151
Give a full description of 3G
Deployed packet-switched technology to mobiles GPRS/EDGE; HSPA+; CDMA2000/Evolution Data Optimized (EV-DO)
152
Give a full description of 4G
LTE: converged 4G standard supported by all network providers, requires a SIM. Maximum 150 Mbps down; 20 Mpbs real-world LTE-A: Intended to provide 300 Mbps down; 40 Mbps current real-world
153
Give a full description of 5G
Target is for 1 Gbps if stationary or slow-moving; 100 Mbps if fast-moving Available in trial areas; commercially in ~2020 70 Gpbs in test conditions
154
True or False Routers use the logical network and host IDs.
True
155
Give two different types of routers and definitions of both routers
LAN router: divides a physical network into logical networks. WAN (edge/border) router: joins separate networks (i.e.; LAN to the Internet).
156
True or False Route/path to the destination is selected either dynamically or statically; the packet moves by hops along the path to the target. At target, the hardware address determines the destination node.
True
157
Give all the ways that routers and modems connect to the internet and also what happens when they are connected to the internet
Routers and modems both connect to the Internet: Modem makes a physical link (like a switch). The router makes logical forwarding decisions. Often bundled in one device.
158
Give a solution to the following problem: Switched enterprise networks can have thousands of ports; inefficient to treat as one logical network.
Use VLANs on managed switches to group ports into logical subnets. VLANs communicate through routers. Also provides filtering and monitoring to improve security.
159
Definition of a Protocol
Protocol: Rules and formats enabling systems to exchange data.
160
Definition of a Protocol Suite
Protocol Suite: A collection of several protocols used for networking are designed to work together.
161
Give all the characteristics of a TCP/IP Protocol
Networks have converged on the use of TCP/IP protocol suite Originally developed by US DoD; now an open standard IETF working groups implement development RFCs are published standards Packet-based protocols Routers select the path for packets Main protocols handle addressing and transport Divided into a four-layer model
162
Give a full description of Link/Network Interface Layer
Puts frames on the physical network Not TCP/IP protocols as such; networking products and media (Ethernet, Wi-Fi) Communications on the local network Data packaged in frames Nodes identified by MAC address
163
Give a full description of the Network Layer(IP Protocol)
IP provides packet addressing and routing Best-effort delivery; unreliable, connectionless
164
Give a full description of the Transport Layer (TCP/UDP protocol)
TCP guarantees orderly packet transmission UDP provides non-guaranteed packet transfer but is faster
165
Give a full description of Application Layer
Numerous protocols for network configuration, management, services; use TCP/UDP ports ARP: Finds MAC address associated with IP address ICMP: delivers status and error messages (used by ping and tracert)
166
Give a description of the Source IP address
Identifies the sender of the datagram by IP address.
167
Give a description of the Destination IP address
Identifies the destination of the datagram by IP address.
168
Give a description of Protocol
Indicates whether data should be passed to TCP or UDP at the destination.
169
Give a description of Checksum
Verifies the packet’s integrity at the destination.
170
Give a description of Time to Live
The number of hops the datagram can stay on the network before it is discarded; avoids endless looping of undeliverable packets. Each router decreases the TTL value by at least one.
171
What digits can only be used in binary?
In binary, a digit can only be 0 or 1
172
What power is the value of the digits?
Values of the digits are powers of 2
173
Give a full description of subnet masks
IP address encodes both network ID and host ID. A subnet mask separates them by “masking” the host. Binary 1 in the mask = address digit is part of the network ID. The size of the network portion of the subnet mask determines how many networks and hosts are allowed in a given addressing scheme. Expressed in dotted-decimal or as network prefix (contiguous number of 1s in the mask). Hosts communicate directly if on the same network IP protocol uses subnet mask to compare source/destination network ID If on the same network, delivers locally If on a different network, sends to the router
174
What should a host always have?
The host must have an IP address and subnet mask; should have other parameters for proper network/Internet communication.
175
Give a description of the parameter IPv4 address subnet mask.
Both are required for every interface; can be set manually. Address: dotted-decimal notation; identifies host and network. The subnet mask determines if other hosts are local or remote.
176
Give a description of the parameter default gateway
The IP address of a router to send packets outside of the local network. If no gateway, the host can only communicate on a local network.
177
Give a description of the parameter client DNS
The IP address of the DNS server to provide host/domain name resolution and locate Internet resources. DNS is also used on most local networks. Often the gateway address; often a second server address provided for redundancy.
178
Give a description of static addressing
Static addressing: The administrator manually configures each host. Must update manually if host changes subnet. Must track address allocations to avoid duplication. Can be time-consuming and error-prone. Only used for systems with dedicated functionality.
179
Give a description of dynamic addressing
The DHCP server allocates addresses.
180
Give a full description of DHCP
DHCP client contacts server on boot and requests address. Also provides other parameters (subnet mask, default gateway). Limited time leases. Information configured on a server; client updated when lease renewed.
181
Give a full description of Link-local APIPA
The fallback mechanism for DHCP client if DHCP server is unavailable. Host self-configures with an address on 169.254.x.x network. “Link-local” is a generic term; “APIPA” is a Microsoft term. Communication with other APIPA hosts on the same network only.
182
Give a full description of the DHCP reservation
For hosts that need the same address each time. Configure DHCP server with reserved host address per MAC address. Centralized, easier to implement than static addressing.
183
What must each host address be and who allocates a host address.
On the Internet, each host address must be unique; usually allocated by ISP. (Few organizations have enough individual addresses; various methods to overcome this issue.)
184
What addresses do internal hosts use?
Internal hosts can use addresses in a Class A, B, or C private range defined by RFC 1918 (10.0.0.0 to 10.255.255.255; 172.16.0.0 to 172.31.255.255; 192.168.0.0 to 192.168.255.255).
185
What gives internet access to a private address host.
Internet access is provided for private-address hosts through: A router using NAT. A proxy server.
186
Give an explanation of a NAT
In NAT, the router converts the internal private IP address to a valid public address.
187
Give an explanation of a NAT address pool
NAT address pool itself will be limited; multiple private addresses will use a single public address.
188
Give an explanation of IP configuration
IP configuration is simpler and internal clients are not directly accessible from the Internet.
189
Explain the NAPT mapping
The mapping provided by NAPT, aka PAT, aka NAT overloading. Each outgoing connection is assigned TCP or UDP port. Returning traffic mapped back to address/client port.
190
Give a definition of a VPN and a full description of all its specifitifications
VPN: connects two private networks over a public network (the Internet). Internet is a cost-effective way to connect users and networks but is not private. VPN protocols create tunnels through the public network to authenticate, encrypt, and secure private communications.
191
Give the size of IPv4.
The IPv4 address pool is large but limited.
192
Give the size of IPv6.
IPv6 uses 128-bit addresses, massively increasing the address pool.
193
Give all improvements to IPv6
Improvements: simplified address headers, hierarchical addressing, support for time-sensitive traffic, new unicast address structure. A large string of characters in binary or even decimal; affects clarity and accuracy. Uses hexadecimal notation (0-9, A-F):
194
How is binary IPv6 address divided?
Binary IPv6 address divided into eight double-byte values using hex notation: 2001:0db8:0000:0000:0abc:0000:def0:1234
195
What can be ignored in an IPv6 binary address?
Leading zeros can be ignored, and a contiguous series of zeroes can be replaced by a double colon place marker: 2001:db8::abc:0:def0:1234
196
Give the size and the designations of different parts of the IPv6 address.
The first 64 bits are network ID, second 64 bits designate the interface
197
True or False Is the IPv6 fixed in size = no subnet mask; /nn = length of routing prefix in bits.
True
198
Give the IPv6 global unicast address format
Global Routing Prefix: 3-bit(001) and 45( Network ID) Subnet: 16 bit Interface ID: 64 bit
199
How are IPv6 blocks assigned
IPv6 address blocks are assigned hierarchically by routers; logical address space
200
Give all the characteristics of IPv6
IPv6 link-local addresses used for housekeeping Span single subnet Nodes on the same link are called “neighbors” Start with fe80:: Equivalent of APIPA The IPv6 host always has a link-local address
201
What all the general characteristics of UDP and TCP ports
Transport-layer protocols ensure effective delivery; the content of packets is significant. Identifies network application types by assigning a port number (0-65535). Data from upper layers is packaged in segments, tagged with port numbers. Passed to the network layer for delivery. Simultaneous segment transmissions are multiplexed onto the network link; de-multiplexed at receiving host. Can use TCP or UDP.
202
What is the characteristic of well-known ports?
Port: unique ID for a service using TCP or UDP for transport. Might be persistent (for servers) or ephemeral (for clients). IANA assigns standard (“well-known”) port numbers to services. See course text for examples. IANA defines ephemeral port range (49152 to 65535); some OSes use different values. Firewalls must-have ports enabled or disabled to allow only valid traffic.
203
Give a description of DNS?
Hierarchical system for resolving names to IP addresses. The database is distributed among many name servers; distributes maintenance and protects against server loss. Root (.) at the top; then 13 TLDs (generic, sponsored, or country code); then domains. Domain names are managed by ICANN and registered with the appropriate Domain Name Registry for the TLD. Records are traced from root down; each server level has information about servers below in the hierarchy.
204
What is FQDN
FQDN shows hierarchy from most specific on left to least specific on right.
205
What does the domain name identify?
The domain name portion identifies the company, organization, or individual; must be unique and officially registered.
206
What does the hostname identify?
Host name identifies a particular server or server alias.
207
Describe the Authoritative name server
Holds domain records and can respond authoritatively about hosts in the domains it manages. Required for Active Directory. If the private domain, is not available outside the LAN; on Internet, published to name servers hosted by ISPs.
208
Describe the Recursive resolver
Resolves names for clients. Client contacts resolver; resolver contacts name servers until the record is located or request times out. DNS clients are configured with a resolver address. Listens on UDP 53.
209
Definition of the web server
Web server: A server that provides client access using HTTP (defaults to port 80) or its secure version HTTPS (defaults to port 443).
210
Description of Web server
Organizations may lease from ISP; host directly; or use private servers (intranets) Provides HTML pages (text files with tags), interpreted by browsers Extended by scripts and web applications
211
Give the structure of a URL
1 Protocol 2 FQDN 3 File path 1 2 3 http://store.gtslearning.com/comptia/index.htm
212
Give the disadvantages of HTTPS
HTTP lacks security; data is sent unencrypted, with no authentication.
213
What is SSL/TLS used for?
SSL/TLS can be used to encrypt TCP/IP applications that use TCP connections, including HTTPS.
214
What do servers use to prove identity?
Servers use digital certificates from Certification Authorities to prove the identity of the server and to provide encryption.
215
What can emails be sent and what is used to encode emails?
Email can send text and file attachments encoded using MIME.
216
What is the process of mail servers?
The client sends a message to the server; the server queues messages for an SMTP session (port 25). SMTP server uses DNS to resolve the address of the recipient’s mail server. SMTP delivers messages; usually several “hops.” A message is placed in store on the recipient’s server; client software connects with the mailbox using POP3 (port 110) or IMAP (port 143). POP3 is more widely used; IMAP has more features.
217
What does email require
An email account requires a username, password, email address, incoming and outgoing server addresses, and protocol types.
218
What general occurrences could occur when using mail servers?
Mailto URL scheme: username@domainname (domain may be a company or ISP). Different systems allow different characters; not usually treated as case-sensitive. Mail may be rejected if incorrectly addressed if identified as spam if the mailbox is full. Only one of many network communication types.
219
Give the characteristics of File and Printer Sharing
Core network functions. May be accomplished by proprietary protocols (i.e., File and Print Services for Windows). May use standard protocols (i.e., FTP), but may not have as much functionality.
220
Give a description of SMB
Underpins file and printer sharing on Windows networks; currently SMB2, but legacy clients are supported. TCP port 445; also NetBIOS over TCP/IP (UDP and TCP port range 137-139). Implemented as Samba on Linux.
221
Give a description of AFP
Performs similar function to SMB for Apple/Mac OS. UDP or TCP port 427 (Service Location Protocol)—not required by OS X or later. TCP port 548.
222
Give a description of FTP
Early TCP/IP protocol; widely used for file transfers; flexible; easy to maintain. TCP port 21 for connection; port 20 for active transfer or server-assigned port if passive. Client options: Command line Dedicated GUI Browsers
223
What is an Authentication Server
Used on enterprise networks to ensure only authorized users can access accounts. On the Windows domain, Active Directory provides authentication based on Kerberos. AAA server consolidates authentication across multiple devices. RADIUS is an AAA protocol.
224
What is a DHCP DNS
DCHP assigns IP addresses to hosts when they connect. DNS allows hosts to access resources by hostname and FQDN by resolving names to IP.
225
What is an LDAP
Network resources are recorded as objects in a directory database. X.500 standards allow directories to interact; full standards required a complex protocol. LDAP allows X.500-compliant queries and updates over TCP/IP. Widely supported; TCP/UDP 389. Uses Distinguished Names and Relative Distinguished Names as identifiers.
226
What is a NetBIOS/NetBT
NetBIOS first Windows network software; provided name discovery, and addressing. NetBT runs NetBIOS over TCP and UDP ports 137-139 (name services, datagram transmission, session services). Should be disabled unless supporting legacy Windows systems or appliances.
227
What is SNMP
Framework for managing/monitoring network devices. Management system and agents. Agent process runs on network device; maintains MIB; can initiate trap for a notable event. System software provides oversight location, monitors agents, displays information. Device queries=UDP 161; traps=UDP 162.
228
What is Endpoint Managment
Facilitates Defense in Depth security policies that require hardening to workstation level. Can apply OS and anti-virus updates; catalog software; apply security policies; analyze logs; monitor performance and alerts. Example: Microsoft’s SCCM.
229
What is a syslog
Helpful to consolidate separate device logs. Prior to Windows 7, Windows logs were local; 3rd-party tools were used to consolidate. Windows event subscription can forward log events to the central system. UNIX and Linux equivalent is Syslog. Client-server model for event collection; open format; de facto standard.
230
What is Embedded
Designed for a specific function. Range from individual microcontrollers to complex industrial control systems. May have been designed for a closed network, without connectivity. Special design and security considerations when interacting with a data network. Risk for maintenance and troubleshooting; require specialist knowledge.
231
What is Legacy
No longer supported by the vendor. May be retained on networks to support existing services that are not practical to migrate. Security risks. Should be isolated from the network. Like embedded systems, the risk for maintenance and troubleshooting; requires specialist knowledge.
232
What is IDS/NIDS
Software and/or hardware that monitors for and quickly detects malicious behavior. Can also analyze and alert administrators to infrastructure problems. Can comprise sensors, detection software, and management software; each implementation is unique.
233
Give the definition of IPS/NIDS
An inline security device that monitors for and blocks suspicious network and system traffic. May drop packets, reset connections, sound alerts; at times quarantine intruders. Examines packet contents. UTM appliance combines firewall, A-V scanner, and IDS.
234
Give the definition of Proxy Server
Used on enterprise networks as an alternative to NAT. Checks and forwards HTTP, email, or other requests from internal hosts to the Internet; returns reply to the client. It May be transparent (no client configuration) or non-transparent (client must be configured with proxy’s IP address and port, typically 8080).