{ "@context": "https://schema.org", "@type": "Organization", "name": "Brainscape", "url": "https://www.brainscape.com/", "logo": "https://www.brainscape.com/pks/images/cms/public-views/shared/Brainscape-logo-c4e172b280b4616f7fda.svg", "sameAs": [ "https://www.facebook.com/Brainscape", "https://x.com/brainscape", "https://www.linkedin.com/company/brainscape", "https://www.instagram.com/brainscape/", "https://www.tiktok.com/@brainscapeu", "https://www.pinterest.com/brainscape/", "https://www.youtube.com/@BrainscapeNY" ], "contactPoint": { "@type": "ContactPoint", "telephone": "(929) 334-4005", "contactType": "customer service", "availableLanguage": ["English"] }, "founder": { "@type": "Person", "name": "Andrew Cohen" }, "description": "Brainscape’s spaced repetition system is proven to DOUBLE learning results! Find, make, and study flashcards online or in our mobile app. Serious learners only.", "address": { "@type": "PostalAddress", "streetAddress": "159 W 25th St, Ste 517", "addressLocality": "New York", "addressRegion": "NY", "postalCode": "10001", "addressCountry": "USA" } }

Networking Flashcards

(38 cards)

1
Q

What are the IPv4 address classes and their key characteristics?

A

IPv4 addresses are divided into classes based on the range of the first octet.

  • Class A: First octet 0–127, binary starts with 0, default subnet mask 255.0.0.0, CIDR /8.
  • Class B: First octet 128–191, binary begins with 10, default mask 255.255.0.0, CIDR /16.
  • Class C: First octet 192–223, binary begins with 110, default mask 255.255.255.0, CIDR /24.
  • Class D: First octet 224–239, binary begins with 1110, used for Multicast Addressing.
  • Class E: First octet 240–255, binary begins with 1111, designated as Experimental.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the significance of IPv4 addresses being 32 bits long?

A

IPv4 addresses have 32 bits divided into four octets. This allows for approximately 4.3 billion unique addresses. The 32‐bit structure is represented in dotted-decimal notation, and it delineates network and host portions according to classful or CIDR-based subnet masks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the private IP ranges in IPv4 and why are they important?

A

Private IP ranges are reserved for internal networks and are not routable on the public Internet. They include 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. Using these ranges helps conserve public IP addresses and enhances network security by isolating internal traffic from the public realm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is APIPA and why is it useful?

A

APIPA stands for Automatic Private IP Addressing. It allows a Windows machine to assign itself an IP address from the 169.254.0.0/16 range when no DHCP server is available. This DHCP fail-safe mechanism enables devices on a LAN to communicate locally even when external configuration services are down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the loopback address in IPv4 and what is its purpose?

A

The loopback address is defined within the 127.0.0.0/8 range, with 127.0.0.1 being the most commonly used address. It is used to test network software without sending packets over a physical network, essentially allowing a device to communicate with itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are IPv6 addresses structured and what advantages do they offer?

A

IPv6 addresses are 128 bits long and are written as eight groups of four hexadecimal digits separated by colons. The extended address space allows for a virtually unlimited number of unique addresses. Additionally, shorthand notation using a double colon (::) can compress contiguous sections of zeros, making addresses shorter and easier to read.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List the different types of IPv6 addresses and their purposes.

A

IPv6 address types include: • Unspecified (::/128) for representing an absence of an address; • Loopback (::1/128) for local testing; • Unique Local Addresses (FC00::/7) for private networks; • Link-local addresses (FE80::/10) for communication on a single network segment; • Global unicast addresses (2000::/3) for routable addresses on the Internet; • Multicast addresses (FF00::/8) to send data to multiple recipients simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What mechanisms allow IPv4 and IPv6 to coexist on the same networks?

A

Dual Stacking allows devices to run both IPv4 and IPv6 concurrently. Tunneling encapsulates IPv6 packets within IPv4 packets (methods include 6to4, 6in4, Teredo, and ISATAP), while translation through routers converts header information between the protocols to enable communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is subnetting critical in network design?

A

Subnetting breaks a larger network into smaller subnets, which optimizes network performance by reducing broadcast domains, improving security, and facilitating efficient IP address allocation. It requires careful calculation of the first, last, network, and broadcast addresses for each subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the OSI Model and why is it crucial in understanding network communication?

A

The OSI (Open Systems Interconnection) Model is a conceptual framework that divides network communication into seven layers. Each layer has a specific function and standardized protocols, allowing interoperability, simplified troubleshooting, and modular network design across different vendors and technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of the Application Layer (Layer 7) in the OSI Model?

A

Layer 7, the Application Layer, provides services directly to end-user applications. It acts as the interface between software applications and the underlying network, supporting protocols such as DNS, HTTP, FTP, SMTP, POP3, SNMP, and Telnet to facilitate communication and data exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the functions of the Presentation Layer (Layer 6).

A

The Presentation Layer ensures that data is in a usable format and handles translation between different data formats. It is responsible for data compression, encryption, decryption, and character encoding conversion, ensuring that data sent by the Application Layer of one system can be properly interpreted by the Application Layer of another. Protocols like SSL/TLS operate here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain the responsibilities of the Session Layer (Layer 5).

A

The Session Layer manages and controls the dialogue between two devices. It sets up, coordinates, and terminates connections (sessions) across the network while handling the exchange and synchronization of data. This layer uses protocols like NetBIOS, RPC, and PPTP to facilitate effective communication between applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What functions does the Transport Layer (Layer 4) perform?

A

The Transport Layer provides transparent transfer of data between end systems, ensuring complete data transfer with error detection, correction, and flow control. It segments data for transmission (TCP uses connection-oriented communication with features such as sequence numbers and acknowledgments, while UDP offers a faster, connectionless service for applications where speed is more critical than reliability).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does the Network Layer (Layer 3) facilitate data routing?

A

The Network Layer is responsible for logical addressing (using IP addresses) and routing across multiple networks. It determines the best path for data packets to travel from the source to the destination and handles fragmentation and reassembly if packets are too large. Routers operate at this layer, and protocols such as IP, ARP, and ICMP are key components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What roles do the Data Link (Layer 2) and Physical (Layer 1) layers serve in the OSI Model?

A

The Data Link Layer (Layer 2) is responsible for node-to-node data transfer, framing, error detection, and MAC addressing, while the Physical Layer (Layer 1) deals with the transmission of raw bits over physical media such as cables, fiber optics, or wireless channels. Together, they ensure that data is delivered accurately across the shared medium.

17
Q

What functions do common network devices perform?

A

• A Network Adapter (NIC) enables a computer to connect to a network at the Data Link Layer. • Repeaters amplify signals to overcome attenuation at the Physical Layer. • Hubs act as multiport repeaters that broadcast signals to all connected devices. • Switches examine MAC addresses to forward data to the appropriate port (Layer 2). • Routers operate at the Network Layer to route traffic between disparate networks and manage data paths.

18
Q

Compare the physical network topologies of bus, ring, star, and full mesh.

A

• In a Bus topology, all devices share a single communication line; if the main cable fails, the entire network collapses. • A Ring topology connects each device to two others in a closed loop; token-based transmission is used, but a single failure can disrupt the network. • A Star topology links all devices to a central hub; if a peripheral fails, the impact is isolated, though a central hub failure can bring down the network. • In a Full Mesh topology, every device is interconnected, providing high redundancy and fault tolerance at the expense of increased wiring and complexity.

19
Q

What are the three ranges of port numbers and what is their significance?

A

Port numbers are divided into three ranges for standardization: • Well-Known Ports (0–1023): Used by core services and applications (e.g., HTTP, FTP). • Registered Ports (1024–49151): Assigned for user or application-specific services. • Private/Dynamic Ports (49152–65535): Utilized for temporary, short-lived connections and private communications.

20
Q

What is ARP and how does it function in a network?

A

ARP (Address Resolution Protocol) is used to map an IP address to its corresponding physical (MAC) address on a local network. This mapping enables data packets to be correctly delivered within a network. Reverse ARP (RARP) performs the opposite function by finding the IP address corresponding to a given MAC address.

21
Q

Summarize the key aspects of the FTP protocol.

A

FTP (File Transfer Protocol) is used to transfer files between a client and server. It operates using separate control (TCP port 21) and data (TCP port 20) connections. FTP supports authentication and specifies file transfer parameters using a standardized URL format (ftp://[user]:[password]@[host]:[port]).

22
Q

What is SSH and why is it preferred over Telnet?

A

SSH (Secure Shell) is a protocol for secure remote login and data communication. It encrypts data to protect sensitive information and operates on TCP port 22. Unlike Telnet, which sends text in clear, SSH offers robust security by employing modern encryption methods and key exchange protocols.

23
Q

What role does DNS play in networking and which ports does it use?

A

The Domain Name System (DNS) translates human-readable domain names into IP addresses that computers can use to communicate. It primarily uses UDP on port 53 for queries and TCP on port 53 for tasks such as zone transfers, ensuring that address resolution is efficient and scalable.

24
Q

How does DHCP simplify network management?

A

DHCP (Dynamic Host Configuration Protocol) automates the assignment of IP addresses and other network configuration details (such as the default gateway and DNS servers) to devices on a network. It operates using UDP ports 67 (server) and 68 (client), reducing the need for manual configuration and ensuring consistent network settings.

25
What is SNMP and how is it used for network monitoring?
SNMP (Simple Network Management Protocol) is used to collect, organize, and manage information about networked devices. It allows administrators to monitor performance, detect faults, and configure devices remotely. SNMP operates over TCP/UDP ports 161 (for queries) and 162 (for trap messages).
26
Explain how HTTPS secures web communications.
HTTPS secures web communications by embedding HTTP within SSL/TLS encryption. This ensures that data exchanged between a client’s web browser and a server is encrypted and authenticated, protecting sensitive information such as login credentials and payment details. HTTPS typically uses TCP port 443.
27
Describe the structure and purpose of the TCP header.
The TCP header is typically 20 bytes long and contains critical fields such as the source and destination ports, sequence number, acknowledgement number, flags (SYN, ACK, FIN, etc.), window size, checksum, and urgent pointer. These fields enable reliable, ordered, and error-checked data transmission between devices.
28
How does UDP differ from TCP, and when would you choose UDP?
UDP (User Datagram Protocol) is a simpler, connectionless protocol with an 8-byte header. It does not provide the error-checking or establishment of a connection that TCP offers. UDP is chosen when speed is essential and occasional data loss is acceptable, such as in streaming or online gaming.
29
What constitutes an Ethernet frame, and what are its size requirements?
An Ethernet frame includes a header with the destination MAC address, source MAC address, and EtherType field (e.g., 0x0800 for IPv4), followed by the payload (data) and a frame check sequence (checksum). The frame must be at least 64 bytes and can carry up to 1500 bytes of payload, ensuring reliable data encapsulation on wired networks.
30
Outline the steps of the TCP/IP three-way handshake.
The three-way handshake establishes a TCP connection through: 1) The client sends a SYN packet with a random sequence number. 2) The server responds with a SYN-ACK packet, acknowledging the client’s sequence number and sending its own random sequence number. 3) The client sends an ACK packet, confirming receipt of the server’s sequence number. This process synchronizes both systems for reliable communication.
31
Differentiate between NAT and PAT in network address management.
NAT (Network Address Translation) modifies IP headers to map a private address space to a public IP address, allowing multiple devices to share a single external address. PAT (Port Address Translation), an extension of NAT, differentiates connections based on port numbers, enabling multiple devices to make concurrent connections using a single public IP while conserving address space.
32
What is the significance of Time-to-Live (TTL) in IP networking?
TTL is a field in an IP packet that limits its lifespan. It is decremented by each router the packet passes through to prevent indefinite circulation due to routing errors. Different operating systems set different default TTL values (e.g., 255 for Cisco/Solaris, 128 for Windows, 64 for Linux/Unix), which can also hint at the originating system.
33
List and explain some commonly used network commands in UNIX/Windows.
• 'ipconfig' (Windows) or 'ifconfig' (UNIX): Display and configure network interfaces. • 'arp -a': Show the ARP cache containing IP-to-MAC mappings. • 'netstat': Display active network connections, routing tables, and interface statistics. • 'traceroute' (or 'tracert' in Windows): Trace the path packets take to reach a destination, which is useful for diagnosing network problems.
34
What are IEEE 802 standards and why are they important?
IEEE 802 standards define the specifications for various networking technologies, ensuring interoperability across devices and vendors. Notable examples include 802.3 for Ethernet, 802.11 for Wireless LAN (Wi-Fi), 802.15.1 for Bluetooth, among others. These standards establish common protocols and transmission methods that facilitate reliable communications.
35
What are networking APIs such as NetBIOS, SMB, and winsock used for?
Networking APIs provide standard interfaces for applications to access network services. • NetBIOS offers basic communication services over a LAN. • SMB (Server Message Block) supports file sharing, printer services, and inter-process communication. • Winsock (Windows Sockets API) defines how Windows applications interact with the TCP/IP protocol suite, ensuring consistent networking operations across applications.
36
Differentiate between Domain Controllers (DC) and Active Directory (AD).
A Domain Controller (DC) is a server that handles authentication and authorization within a network, ensuring that users gain access to resources securely. Active Directory (AD) is a directory service used to store information about network resources such as users, computers, and policies. Every domain has at least one DC, but while AD is common in Windows environments for comprehensive network management, not every domain necessarily utilizes AD.
37
What are the main routing protocols and how do they differ in operation?
Routing protocols help determine the best path for data. * EIGRP (Enhanced Interior Gateway Routing Protocol) is a hybrid (advanced distance-vector) protocol with rapid convergence (AD of 90 for internal routes). * OSPF (Open Shortest Path First) is a link-state protocol with no hop limit and an AD of 110, offering faster convergence and scalability. * RIP (Routing Information Protocol) is a distance-vector protocol that uses hop count (max 15 hops) and has an Administrative Distance (AD) of 120. * BGP (Border Gateway Protocol) is a path-vector protocol used for inter-autonomous system routing, with higher AD values (typically 20 externally, 200 internally).
38
How do distance vector and link state routing protocols differ?
Distance vector protocols (e.g., RIP, IGRP) periodically send entire routing tables to neighbors and are simpler but more prone to routing loops. Link state protocols (e.g., OSPF, IS-IS) only send updates triggered by network changes and build a complete map of the network topology, which leads to more efficient and loop-free routing decisions.