Networking terms Flashcards

(184 cards)

1
Q

LAN

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WAN

A

Wide Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Maximum data payload for ethernet:

A

1,500 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CAT-5 and CAT-6

A

Category 5, Category 6 Most ethernet networks use this type of cabling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FDDI

A

Fiber Distributed Data Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ATM

A

Asynchronous Transfer Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VPN

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

packet

A

The unit of data that gets transmitted across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NIC

A

network interface card (NIC): The hardware component that places packets from a computer onto the network. In computers, a NIC is sometimes an expansion card—often called an add-on card—that looks a lot like a sound card or video card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

hub

A

Hubs share bandwidth among all connected devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

switch

A

Switches are similar to hubs in functionality, with one important distinction: They don’t share bandwidth among each connected device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

router

A

Network devices that direct packets through a LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TCP/IP

A

Transmission Control Protocol/Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DNS

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OSI

A

Open Systems Interconnection (OSI) model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CLI for setting up a network share

A

net use * \fileserver747\public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

frame

A

term interchangable with packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

maximum Ethernet packet size

A

1,538 bytes after all of the headers are added.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DSL

A

Digital subscriber line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

E3

A

(an E3 is a European data connection, similar to a T1 or T3, and can transmit data at approximately 34Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

WAP

A

Wireless Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

MAC address

A

A media access control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CLI utility on Windows-7 to trace the route a packet takes to get to a destination.

A

tracert, which is short for traceroute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IT

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
SONET
SONET stands for **synchronous optical networking**, and is a WAN technology that uses optical fiber as its transmission medium).
26
border router
a border router, because it sits on the border of the LAN
27
Gibabit Ethernet
In computer networking, gigabit Ethernet (GbE or 1 GigE) is a term describing various technologies for transmitting Ethernet frames at a rate of a gigabit per second (1,000,000,000 bits per second), as defined by the IEEE 802.3-2008 standard.
28
ISP
Internet Service Provider
29
OC-12
Optical Carrier level 12, which transmits data at 622Mbps
30
OC-19212
Optical Carrier level 19212, capable of transmitting data at almost 10 Gigabits per second [Gbps]
31
routing table
A list of available routes to network destinations.
32
Windows CLI command to print the routing table.
route print
33
hop count
The number of routers traversed to reach a given destination.
34
default gateway
this is sometimes referred to as default route) The route used when no other routing-table entries identify a means of reaching the destination IP address.
35
static routing vs. dynamic routing
With static routing, a network administrator manually enters the entries into the routing-table. In dynamic routing, routers communicate to create a map of the network, to communicate router failures, and to determine the best route for a given packet.
36
RIP RIPv2 RIPng
Routing Information Protocol RIP version 2 RIP next generation
37
OSPF
Open Shortest Path First
38
convergence
The time it takes dynamic routers to reconfigure their router-centric map of the network after a change in network topology.
39
flooding
When routing-table changes occur in a network with dynamic routers, routers advertise those routing-table changes to the rest of the routers on the network through flooding.
40
routing loops
When routers are configured such that a packet gets forwarded from one router to another router, then back to the originating router to begin the circle again, it is considered a routing loop. Routing loops occur when routers are misconfigured.
41
black holes
Routes that send packets to a dead end. In simple terms, a black hole is a routing-table entry with no listening router at its destination.
42
TTL
**Time To Live** The hop count before a packet is destroyed by a router.
43
IGP
**Interior Gateway Protocol** Communication between routers in the same interconnected network uses an Interior Gateway Protocol (IGP). For example, you would use an IGP for communication among routers within a corporate network, or within a community college network.
44
The two most popular IGPs are...
**Routing Information Protocol** (RIP) and **Open Shortest Path First** (OSPF) are the two most popular IGPs.
45
EGP
In contrast to IGPs, an **Exterior Gateway Protocol** (EGP) enables communication between routers that are not part of the same local network.
46
redundancy
providing more than one path to segments in a network.
47
broadcasts
We often refer to broadcast packets simply as broadcasts, and we use them for a variety of administrative networking purposes—not just for routing protocols.
48
WINS
Windows Internet Name System
49
AS
autonomous system OSPF works on the premise of an autonomous system (AS) and further segments its networkwide hierarchical organizational unit into smaller, easier-to-manage groups called areas. An AS is the highest level of organization for an OSPF network.
50
area
Areas are groups of segments that are within an AS and that work as individual administrative, routing-area units.
51
internal routers
Routers that function within an area and do not have interfaces to segments outside the area they reside in.
52
designated routers
Within an area, certain routers are designated to manage administrative routing information for other routers within the area. This approach minimizes the amount of traffic necessary to dynamically administer routers in an OSPF network.
53
area border routers
Routers that handle communication between areas. An area border router is attached (has an interface connected) to two areas. An area border router maintains information about each area to which it has an interface, and communicates that information to the backbone.
54
backbone routers
Routers that have at least one interface connected to the OSPF backbone.
55
AS boundary routers
There are often instances when a LAN will have access to areas outside its AS, such as a connection to the Internet. We call these AS boundary routers—routers with interfaces that reach outside the AS.
56
pps
Packets per second how many packets a router can send through its system each second, either on a systemwide basis (more common) or a single interface-pair basis. This is one of the two key metrics for routers. The other is...
57
line level
able to forward Ethernet (100 Mbps) at all packet sizes
58
Latency
the time it takes a packet to get accepted on one interface on the router, and then sent out onto its other (properly routed) interface on the router. Put another way, latency is the time it takes a packet to get through the router. This is one of the tow key metrics for routers. The other is...
59
classful network addressing
IP addresses based on the 6 classes of IP addresses. Class A, B, C, D (E - not usually referred to in Class discussions).
60
dotted decimal notation
IP address are presented in decimal format (versus binary format), delimited using decimals (the dots between the numbers).
61
octet
A collection of 8 ones and zeros. Each number in an IP address can be written as a binary octet.
62
network mask
A network mask acts as a filter. When applied to an IP address, the network mask identifies which part of the IP address defines the network; the remaining information in the IP address is the client’s unique address. In a network mask, when expressed in binary, the ones designate the portion of the IP address that identifies the network. Conversely, when a network mask is expressed in binary, the zeros designate the portion of the IP address that uniquely identifies the client’s address within that network.
63
Class A network address
First octets 1- 126 Class A has the last three octets available for client identification because only the first octet identifies the network. Class A networks would be appropriate for huge organizations like the U.S. military or the entire federal government. Each Class A network can provide more than 16 million unique IP addresses within its network.
64
Class B network address
First octets128-191A Class B has the first two octets reserved for the network address, leaving only the second and last octet available for client identification. Each Class B network has 65,534 unique IP addresses within its network.
65
Class C network address
First octets 192-223 Class C has the first 3 octets reserved for the network address, leaving only the last octet available for client identification. Each Class C network has 254 unique IP addresses.
66
Class D network address
First octets 224-239 Class D addresses are reserved for a specialized network transmission called multicast.
67
the loopback address
**Any IP address in the 127.x.x.x range**. Packets sent to the 127.x.x.x address range go down through the networking stack, then immediately back up that same networking stack on the same machine. The packet never reaches the wire.
68
CLI command to test the presence of a network address
**ping** The ping utility is a simple test utility that sends a single packet to the target IP address, and the target IP address returns a ping packet back in response.
69
FQDN
Fully Qualified Domain Name.
70
IANA
Internet Assigned Numbers Authority
71
What are zeros in IP addresses used for?
Zeros in the client portion are for router broadcasts, which enable routers to communicate information or solicit information directly between routers on a subnet.
72
What is 255 in the final octet of an IP address used for?
The use of 255 in the final octet of an IP address designates a broadcast address. A broadcast is a packet addressed to every node on the subnet but to no node in particular.
73
TCP
Transmission Control Protocol
74
IP (protocol)
Internet Protocol
75
UDP
User Datagram Protocol
76
HTTP
Hypertext Transfer Protocol
77
SHTTP
Secure Hypertext Transfer Protocol
78
DHCP
Dynamic Host Configuration Protocol
79
SMTP
Simple Mail Transfer Protocol
80
IMAP
Internet Message Access Protocol
81
POP3
Post Office Protocol version 3
82
ICMP
Internet Control Message Protocol
83
SNMP
Simple Network Management Protocol
84
NTP
Network Time Protocol
85
ARP
Address Resolution Protocol
86
CIDR
**Classless Inter-Domain Routing** With CIDR, the network mask does not have to align with the octet boundary. With CIDR, you can still have the first eight bits denote the network, or you can have the first nine bits, the first 12 bits, the first 27 bits, or any other arrangement.
87
CIDR block
We call a **collection of IP addresses based on CIDR notation** a CIDR block. CIDR represents these blocks of IP addresses with a slash ( / ) and then a number. The number after the slash is the CIDR-based binary network mask, and that number specifies how many binary bits, starting on the left, constitute the network mask. So a CIDR block represented as 22.21.103.19/9 uses the first nine binary bits as the network mask, and leaves the remaining 23 bits (32 binary bits in an IP address, minus nine for the network mask, leaves 23) for individual IP addresses.
88
RIP
**Routing Information Protocol** (RIP)
89
OSPF
Open Shortest Path First OSPF is a step up from RIP in terms of routing protocols. It has more inherent capabilities than RIP, but its deployment in a network requires more planning and a thorough understanding of the protocol itself. Due to its increased capabilities, OSPF is more difficult to deploy than RIP. But in many cases, its benefits are worth it. OSPF takes static and dynamic network conditions, such as bandwidth availability and network congestion, into consideration when determining the best route for a packet to take through the network.
90
ACL
In Windows, an object maintains its security information in something called an **access control list** (ACL).
91
DACL
There are two primary types or ACLs: ## Footnote The **discretionary access control list** (DACL),which is an ACL that maintains data indicating which users have access to the object, and the access permissions those users have The system access control list (SACL), which is an ACL that the system uses to track events for auditing purposes
92
SACL
There are two primary types or ACLs: ## Footnote The discretionary access control list (DACL),which is an ACL that maintains data indicating which users have access to the object, and the access permissions those users have The **system access control list** (SACL), which is an ACL that the system uses to track events for auditing purposes
93
SID
Upon creation, each user and group receives a unique **security identifier**, commonly referred to as a SID.
94
security token
To reflect the need to collect all permissions a user has, **Windows packages all SIDs associated with a user or group when attempting to access an object**. We call this collection of SIDs a security token.
95
security primitives
That’s the breakdown of how security operates on objects in Windows environments. These basic components—**SIDs, the security token, and ACLs on computer objects**—are security primitives. They are the lowest building block of operating-system-based security. From these building blocks, even more elaborate security implementations are dreamed up.
96
security protocol
**The means by which that security token is transmitted across the network** is called the security protocol.
97
What 4 security protocols does Windows provide?
Windows and Windows Server provide the following security protocols: ## Footnote **Kerberos version 5** **NTLM** digital certificates / public key infrastructure (**PKI**) Secure Sockets Layer/Transport Layer Security (**SSL/TLS**)
98
Kerberos V5 protocol
Kerberos V5 protocol is appropriate for most Windows **logon features and authentication**, and it’s the default authentication method for large Windows deployments (Windows deployments that implement a domain structure). When a user logs on to a Windows computer, the authentication of that user generally occurs within the organization's local network, versus going across the Internet, for example.
99
NTLM
NTLM is on Windows **primarily for backward compatibility** with networks running older versions of Windows or Windows Server, but it’s no longer the security protocol of choice. There are **certain circumstances when NTLM is used for authentication**, generally when Kerberos-based authentication is not available, but those circumstances are limited. These days, Kerberos protocol is the security protocol most widely used in Windows deployments.
100
Digital certificates
Digital certificates are appropriate for use with a PKI deployment, which is an **Internet-based authentication infrastructure**. We use **digital certificates to ensure that the person attempting to log on, or the server someone is attempting to connect to, is indeed the entity it claims to be**. I mentioned that the Kerberos protocol is appropriate for logging on inside an organization's network; PKI is appropriate when the logon process must occur over the Internet, because it provides security better suited for that environment. In a Windows deployment, digital-certificate authentication maps a user to a Windows user account, so the Windows user account—with its associated security token, and the Windows security implementation—is still used.
101
SSL/TLS
SSL/TLS is appropriate for **connection-oriented security**, such as access to Web-based resources on an intranet or the Internet
102
Winlogon
If your logon credentials specify that your user account is on the local computer, Windows passes your credentials to the **Windows security subsystem**. (This security subsystem is Winlogon, and it’s a small software component that is part of the Windows operating system.)
103
domain controller
If your logon credentials specify membership in a Windows domain—a domain is a large grouping of users and computers in a Windows network deployment—the local computer checks with another computer (called a domain controller) to ensure that your user name and password are the same as those that the domain controller holds. **A domain controller is a special computer that holds domainwide information, including security information.**
104
Authorization
logging on, which occurs once per logon session. I also explained that authentication is the process of proving you are who you say you are, and that also generally occurs only once per session. Authorization, on the other hand, **occurs frequently during any given logon session**. In fact, it occurs every time a user attempts to access a secured object. ## Footnote Authorization is the process of determining whether you, the logged-on and authenticated you, have **sufficient permissions to access a given object**. Authorization is determined by comparing a security principal’s access rights against the security descriptors of a given object. That authorization is performed by comparing access permissions on a given object to the user’s access rights.
105
PKI
**Public key infrastructure** (PKI) was created out of necessity. Organizations want to use the Internet for private purposes, but they need security. A PKI deployment can provide security for private organizations, enabling them to use the Internet for secure communication.
106
symmetric keys
Data is scrambled, or encrypted, with something called a key. There are two types of keys in encryption technology: symmetric keys and asymmetric keys. ## Footnote **Symmetric keys are identical keys**.
107
Asymmetric keys
Data is scrambled, or encrypted, with something called a key. There are two types of keys in encryption technology: symmetric keys and asymmetric keys. ## Footnote Symmetric keys are identical keys. They are similar to house keys in that multiple keys to your house are identical, and you can use any copy of the house key to lock or unlock your front door. Asymmetric keys are not identical. When asymmetric keys are used in encryption key technology, **two keys form a key pair. As such, if one key is used to encrypt data, the other key must be used to decrypt that data.**
108
public key
With asymmetric key pairs, one key is generally a public key (**often published in some central repository such as a certificate authority**). The other key is the private key, and it must be secure so that no one but its owner has access to it.
109
private key
With asymmetric key pairs, one key is generally a public key (often published in some central repository such as a certificate authority). The other key is the private key, and it **must be secure so that no one but its owner has access to it.**
110
key pairs
With key pairs (asymmetric encryption technology), if one key is used to encrypt data, the other key is used to decrypt the data. **Either key can encrypt or decrypt, but the corresponding key is required to perform the opposite function** (decrypting or encrypting, respectively).
111
certificate server
So if someone needs to send you encrypted data, he or she can **obtain your public key** (from the certificate server) and encrypt the data before sending it to you. When you receive the encrypted data, you use your private key to decrypt it, rendering the data readable once again.
112
digital signature
Jack wants to send Ronald a message about hamburgers. Jack wants to encrypt the message, but he also wants Ronald to be able to verify that Jack sent the message. Jack encrypts the message with Ronald’s public key, and he includes a string in the message—the digital signature—that **is encrypted with his own private key**. Maybe the string reads, This message is from Jack. So, the bulk of the message is encrypted with Ronald’s public key (decrypted by Ronald using his own private key), but a string inside that encrypted message is encrypted with Jack’s private key. ## Footnote Remember that either the private key or the public key can encrypt data; the other key provides the opposite function. Ronald receives the message and decrypts it and then uses Jack’s public key to decrypt the digital signature. When the digital signature is verified, Ronald can confirm Jack’s identity as the sender of the message. Why does this work? Because only Jack has access to Jack’s private key. And the relationship between Jack’s private key and public key is such that verification of Jack’s digital signature is successful only if Jack’s private key generates (and encrypts) the signature. The string, This message is from Jack, is successfully decrypted using Jack’s public key only if Jack encrypted the string himself, using his private key.
113
certificate authority (CA)
The central authority guaranteeing user and computer identities is called the **certificate authority** (CA), which is **a computer that provides certificate services for a PKI deployment**. The CA can guarantee user and computer identities because the CA is the entity that **creates and issues encryption key pairs in the first place**. There may be many CAs in operation. Some are private, deployed by organizations that want to create, maintain, and deploy their own PKI. Others are public, such as VeriSign.
114
X.509
In terms of the information included in a digital certificate, there is a standard in existence that many CAs adhere to: the X.509 **standard for digital certificates**. An X.509 certificate contains the following fields: ## Footnote Version Serial number Signature algorithm ID Issuer name Validity period Subject user name Subject public key information Issuer unique ID Subject unique identifier Extensions Signature on the above fields Most PKI deployments are created for communication across the Internet for a dispersed agency (think of a government agency that has offices scattered across the country), or for communication from one agency to the other. *PKI is not generally for consumer activities, such as online shopping -- strange*.
115
SSL
probably the most widely used form of secure communication on the Internet—is **Secure Sockets Layer** (SSL). SSL was the predecessor to another secure communication protocol called Transport Layer Security (TLS). SSL and TLS are very similar. We generally consider them equivalent, in terms of their security. SSL is a software component that provides a secure communication channel between a client computer and a server—and it does this by implementing RSA data security encryption. RSA data encryption is a type of encryption that the RSA company created. SSL is implemented on Windows through the use of a DLL called schannel.dll. Invocation of SSL is transparent to users; when SSL is needed for a given connection, it is automatically implemented without user intervention.
116
RSA
SSL is a software component that provides a secure communication channel between a client computer and a server—and it does this by implementing RSA data security encryption. **RSA data encryption is a type of encryption that the RSA company created.**
117
schannel.dll
**SSL is implemented on Windows through the use of a DLL** called schannel.dll.
118
SSL provides three important functions:
SSL **authenticates** that data is being sent to its intended server and that the server is secure. SSL **encrypts data** as it travels between a client and a server. SSL ensures that the data the server receives **hasn’t been tampered** with along the way.
119
SSL session
The activity of **establishing a secure line of communication using SSL, transmitting data back and forth between the client computer and the secured server, and then dismantling the secure communication line** is called an SSL session. SSL shares its encryption roots with digital certificates; SSL works on the basis of an **asymmetric key pair**, which is the same public/private key pair concept used in PKI deployments.
120
5 steps of an SSL session:
1. The client establishes a connection to the server. 2. The server sends its digital certificate, along with its public key. 3. The client and the server negotiate encryption depth: 1024 or 2048 for stronger security. The more bits, the more difficult it is to crack the code. 4. The client randomly generates a session key and encrypts the session key with the server’s public key. The session key—which has been encrypted with the server’s public key—can be decrypted only with the server’s private key, so the session key is secure as it’s transmitted over the Internet. 5. The server decrypts the session key, and a unique secure communications channel is established between the client and server, because all data will be encrypted or decrypted with that randomly generated session key.
121
client certificate authentication
**Servers that require a digital certificate from the client** create more work to establish the connection. We call this client certificate authentication.
122
VPN
Vitural Private Network
123
PPTP
**Point-to-Point Tunneling Protocol**, more commonly called PPTP, was the first underlying networking protocol that enabled the creation of VPNs over the Internet. A few years later, engineers created another protocol to implement VPNs, called Layer 2 Tunneling Protocol, or L2TP.
124
L2TP
Point-to-Point Tunneling Protocol, more commonly called PPTP, was the first underlying networking protocol that enabled the creation of VPNs over the Internet. A few years later, engineers created another protocol to implement VPNs, called **Layer 2 Tunneling Protocol**, or L2TP.
125
main difference between PPTP L2TP
Both PPTP and L2TP add another header to a data packet at the IP layer, encapsulating the packet for transmission over another (usually public) network. Both PPTP and L2TP operate in a similar fashion, with one primary difference: PPTP encrypts a packet before sending it across the Internet, L2TP does not (we’ll discuss that encryption shortly). **Instead of encrypting a packet directly, L2TP relies on another protocol to handle the encrypting and decrypting.** Aside from that distinction, PPTP and L2TP protocols create VPNs in a similar way. In this chapter, we’re focusing on PPTP; L2TP operates in a similar fashion. When I mention PPTP, just know that I’m talking about L2TP as well.
126
RAS
Many organizations deploy **remote access servers** (RASs) in their networks. RASs are computers (or other devices, such as routers, that have built-in RAS/VPN capability) that connect Internet-connected devices to a private network, such as a corporate network.
127
tunneling
You cannot start into the tunnel and choose different destinations, such as two or three other buildings’ lobbies. There is one beginning to the tunnel, and there is one end. It is a point-to-point connection, as the term goes.
128
encapsulation
I mentioned earlier that PPTP and L2TP simply add an IP header to the otherwise complete packet. The packet is considered encapsulated because that IP header is all that is used to route the packet through the Internet. Some people become confused because encapsulation suggests being completely shrouded (like soda being encapsulated in an aluminum can). For PPTP, adding that IP header is equivalent in electronic terms to putting that packet into a sealed aluminum can.
129
RRAS
A single VPN server can handle thousands of individual VPN connections. In Windows, VPN capabilities are part of RRAS (**routing and remote access server**), which is part of all Windows servers used to provide secure remote access for remote users.
130
WINS
Windows Internet Name Service
131
RDN
But in certain situations, the domain-hierarchy part of the FQDN is cumbersome. To address those situations, there is a need for a local name that is relative to the DNS domain in which the host resides. We call that name the **relative distinguished name**, or the RDN. The RDN is **simply the single host name to the left of the leftmost dot in the FQDN**. For example, a host with an FQDN of server1.widgets.microsoft.com has a relative distinguished name of server1.
132
Namespace
namespace: **A context within which the names of all objects must be unambiguously resolvable.** For example, the Internet is a single DNS namespace—within which all network devices with a DNS name can be resolved to a particular address, such as www.facebook.com to 69.63.189.16. ## Footnote A namespace can be flat or hierarchical.
133
DNS domain
DNS domains: Domains in DNS are familiar to anyone who has used the Internet. **Domains are sections in the DNS hierarchical namespace**, and we can divide each domains into subdomains. Domains in the gadgets.widgets.microsoft.com hierarchy, for example, include the gadgets, widgets, microsoft, and com domains.
134
Subdomain
Subdomain is simply a fancy name for a domain that is part of a parent domain. So, in widgets.microsoft.com, Microsoft is a subdomain of .com, and widgets is a subdomain of Microsoft.com.
135
DNS zone
DNS zone: **A boundary within the DNS hierarchical namespace.** We use DNS zones to delineate which DNS servers are responsible—sometimes called authoritative—for resolving name-resolution queries for a given section of the DNS hierarchy. ## Footnote **DNS zones differ from the domain structure in the following fashion: Zones can be composed of one or more DNS domains.** One zone in the gadgets.widgets.microsoft.com domain tree might be authoritative for the gadgets and widgets domains. In other words, there is not a requirement for DNS zones to have a 1:1 relationship with DNS domains.
136
root
root: **The uppermost domain in a hierarchical namespace**. The root, which we define as a dot (.), is the base at which any entire-domain-tree search must be initiated. **So the uppermost domain in the Internet is actually dropped off of common Web site browsing practice.** For example, when you visit www.facebook.com, you’re technically visiting www.facebook.com. (notice the dot after com in the address). **That final dot is the root of the Internet DNS hierarchical namespace.** Because there’s nothing after the dot, the dot is removed from browsers by convention.
137
name resolution
name resolution: **The process of comparing a host name (such as a computer name, like server1.widgets.microsoft.com) to a list of resource records (RRs) and identifying the corresponding IP address.**
138
DNS server
DNS server: **A computer that completes the process of name resolution in DNS**. DNS servers contain files, called zone files, that enable DNS servers to resolve names to IP addresses. When queried, a DNS server will respond in one of three ways: ## Footnote The server returns the requested name-resolution or IP-resolution information. The server returns a pointer to another DNS server that can service the request. The server indicates that it doesn’t have the requested information. DNS servers might query other DNS servers during the course of preparing to return the requested resolution information. But beyond that, DNS servers don’t perform any operations other than those mentioned in the previous list.
139
zone files
DNS servers contain files, called zone files, **that enable DNS servers to resolve names to IP addresses**. When queried, a DNS server will respond in one of three ways: ## Footnote The server returns the requested name-resolution or IP-resolution information. The server returns a pointer to another DNS server that can service the request. The server indicates that it doesn’t have the requested information. A zone file is simply a collection of RRs. A zone file—sometimes referred to as a db file or, simply, the database—is the complete collection of resource records for a given DNS zone. DNS servers use a local copy of the zone file to resolve queries. (Local copy means the file actually resides on the DNS server computer itself.) Each zone file contains all the RRs necessary to resolve queries for the zone.
140
primary DNS servers vs secondary DNS servers.
The **primary server is the authoritative server for the zone**. All administrative tasks associated with the zone (for example, creating subdomains within the zone, or other administrative tasks) must be performed on the primary server. In addition, any changes associated with the zone or any modifications or additions to resource records (RRs) in the zone’s zone files must be made on the primary server. For any given zone, there is one primary server. ## Footnote **Secondary servers are backup DNS servers**. Secondary servers receive all of their zone files from the primary server’s zone files in a zone transfer. You can have multiple secondary servers for any given zone—as many as are necessary to provide load balancing, fault tolerance, and traffic reduction. Additionally, any given DNS server can be a secondary server for more than one zone. Here’s an example:
141
caching servers
In addition to primary and secondary DNS servers, there are three additional DNS server types used when such servers are appropriate for a given DNS infrastructure: caching servers, forwarders, and slaves. ## Footnote Caching servers, also known as caching-only servers, perform as their name suggests: **They provide only cached-query service for DNS responses (caching retains only recently resolved queries, but no zone files to look up). Rather than maintaining zone files like other secondary servers do, caching DNS servers perform queries, cache the answers, and return the results to the querying client.** The advantage to using caching servers is that we can completely avoid network traffic associated with the replication of zone transfers (copying updated zone files from the primary DNS server to secondary DNS servers). The disadvantage is that whenever a caching server is rebooted, the cache is flushed and must be regenerated through the process of performing queries and caching the answers. So the primary difference between caching servers and other secondary servers is that other secondary servers maintain zone files (and they do zone transfers when appropriate, generating network traffic associated with the transfer).
142
forwarders (DNS)
Forwarders are DNS servers that have been **designated to handle communication with off-site DNS servers**. The idea behind forwarders is that it’s better to have one DNS server communicating with outside DNS servers (for example, DNS servers on the Internet rather than inside the private LAN) instead of all DNS servers doing so.
143
zone transfers
The advantage to using caching servers is that we can completely avoid network traffic associated with the replication of zone transfers (**copying updated zone files from the primary DNS server to secondary DNS servers**).
144
TTL
It’s important to know that all DNS servers cache results, not just caching servers. DNS servers cache information for a period of seconds known as **Time To Live** (TTL). TTL is configured on the primary server, and it applies to all DNS servers in the domain. When determining the TTL value, administrators must balance the need for quick query responses with the need for keeping cache information consistent across the organization’s DNS servers. If low TTL values are used, the cache information will remain consistent, but your DNS servers will not keep quickly accessible cached information for very long. DNS servers can also cache negative responses, decreasing the response time for queries about domains or nodes that don’t exist or are unavailable.
145
exclusive mode forwarding
DNS servers can use a forwarder in one of two modes: exclusive or nonexclusive. ## Footnote A DNS server configured to use a forwarder in nonexclusive mode submits the query to its forwarder (or forwarders) and receives the result of the query to pass back to the originator of the query. If the forwarder can’t resolve the query or doesn’t receive a response, the DNS server using the forwarder attempts to resolve the query using its own zone files. DNS servers configured to use their forwarder in **exclusive mode** depend entirely on the forwarder to resolve queries; those DNS servers are called slaves (clearly not the most appropriate term, but this is how these DNS servers are known in the field). Slaves behave the same as DNS servers configured to use a forwarder in nonexclusive mode, with one exception: If the forwarder cannot resolve a forwarded query, the slave DNS server does not attempt to resolve the query on its own; it simply returns a query failure to the DNS client that initiated the query.
146
non-exclusive mode forwarders
DNS servers can use a forwarder in one of two modes: exclusive or nonexclusive. ## Footnote A DNS server configured to use a forwarder in **nonexclusive** mode **submits the query to its forwarder (or forwarders) and receives the result of the query to pass back to the originator of the query**. If the forwarder can’t resolve the query or doesn’t receive a response, the DNS server using the forwarder attempts to resolve the query using its own zone files. DNS servers configured to use their forwarder in exclusive mode depend entirely on the forwarder to resolve queries; those DNS servers are called slaves (clearly not the most appropriate term, but this is how these DNS servers are known in the field). Slaves behave the same as DNS servers configured to use a forwarder in nonexclusive mode, with one exception: If the forwarder cannot resolve a forwarded query, the slave DNS server does not attempt to resolve the query on its own; it simply returns a query failure to the DNS client that initiated the query.
147
slaves
DNS servers can use a forwarder in one of two modes: exclusive or nonexclusive. ## Footnote A DNS server configured to use a forwarder in nonexclusive mode submits the query to its forwarder (or forwarders) and receives the result of the query to pass back to the originator of the query. If the forwarder can’t resolve the query or doesn’t receive a response, the DNS server using the forwarder attempts to resolve the query using its own zone files. DNS servers configured to use their forwarder in exclusive mode depend entirely on the forwarder to resolve queries; those DNS servers are called slaves (clearly not the most appropriate term, but this is how these DNS servers are known in the field). **Slaves behave the same as DNS servers configured to use a forwarder in nonexclusive mode, with one exception: If the forwarder cannot resolve a forwarded query, the slave DNS server does not attempt to resolve the query on its own; it simply returns a query failure to the DNS client that initiated the query.**
148
DNS resolver
DNS resolver: **A software component** that is bundled in the TCP/IP protocol suite and communicates with DNS servers to create and resolve name-resolution queries. In other words, resolvers are the little pieces of software that take your attempts to reach TCP/IP computers (we also call these IP clients), extract information about the target IP client, bundle that information into a resolution request, and send it to an appropriate DNS server. **Resolvers exist on DNS clients and DNS servers.**
149
RR
the basic unit of DNS information: the **resource record**, commonly abbreviated to RR. Resource records are the building blocks of a DNS, and taking a look at common RRs will help you get your mind around how DNS does its name-resolution thing. these resource records are in a file on DNS servers called the zone file. The zone file is a database file, which means it has a special way of formatting so that each record is unique and accessible (a record is a unit of information for a database).
150
SOA RR
SOA resource record: The **start of authority** (SOA) record is the required first entry in all forward and reverse zone files. (Reverse lookups are also available in DNS, where you resolve an IP address to a host name using a special domain called in-addr.arpa.) The SOA record **defines the zone for which the DNS server is authoritative, as well as the specific server that is authoritative for the domain.**
151
NS RR
NS resource records: **Name server** (NS) records describe **which servers are secondary servers** for the zone specified in the SOA record, **and they indicate which servers are primary servers for any delegated zones**.
152
PTR RR
PTR resource records: **The pointer** (PTR) record provides **reverse address resolution** (called reverse lookups); PTR RRs map an IP address to a host name
153
A RR
A resource records: The **address** (A) record is **the most common. It simply maps a host name to an IP address**
154
MX RR
MX resource records: The **mail exchange** (MX) record **specifies where mail should be routed for users in the given DNS domain**. In addition to standard fields, the MX RR contains a field that enables administrators to weight multiple MX RRs based on whatever criteria seem appropriate. We call this field the preference field.
155
CNAME RR
CNAME resource records: The **canonical name** (CNAME) record **provides a mechanism by which you can assign an alias to a given host.** CNAME RRs are useful for keeping the naming conventions of your network infrastructure hidden from the outside world (or the inside world, for that matter). When DNS resolves a CNAME RR, it uses the owner field (filesrv1.widgets.com. in the following example) to subsequently find an A RR to resolve the name.
156
WINS RR
WINS resource records: Microsoft DNS servers are the only servers capable of implementing the **Windows Internet Name Service** (WINS) record. A WINS resource record is used when dynamically created host names registered with WINS are unavailable in a static DNS zone file. In essence, **this RR enables Microsoft DNS to make a request to a WINS server when DNS is unable to resolve a given host name.** If the host name exists in the WINS database, WINS returns the query to DNS, and DNS resolves the query.
157
WINS-R RR
WINS-R resource records: The **WINS-reverse** (WINS-R) record provides administrators with the **capability to perform reverse lookups through WINS**.
158
SRV RR
SRV resource records: The **service** (SRV) record **enables administrators to specify which service a server provides, which protocol it uses, and which domain it services. SRV RRs have their own special syntax,**
159
load-sharing resource records
load-sharing resource records: This is a means of incorporating load-sharing mechanisms into a DNS deployment. Load sharing is when multiple computers contain the same information, and clients are diverted between those same-information services to provide better service. It’s a lot like having two people answering questions at a customer service booth (rather than just one person). DNS can perform load sharing in a round-robin fashion. **When multiple *A RR*s for a given host name exist in the zone file, DNS servers distribute the load by rotating entry returns**.
160
full zone transfer
**full zone transfer**: In this type of transfer, **the primary DNS server transmits the complete contents of the zone file to the zone’s secondary DNS server(s)**.
161
incremental zone transfer
**incremental zone transfer**: Many DNS servers can perform this type of transfer. Whether a DNS server can perform incremental zone transfers depends on whether the DNS server software is current enough to support this feature. (Most current DNS servers can.) A primary server that supports an incremental zone transfer maintains a recent-version history of the zone file (in other words, a record of recent changes) and can identify which records have changed since the most recent update. ## Footnote When secondary servers that support incremental zone transfers determine that changes to the zone file have occurred—which they do by checking the serial number in the SOA RR, just like with full zone transfers—they submit an IXFR request (incremental zone transfer request). **The primary server then transmits only the changed records**.
162
IXFR
When secondary servers that support incremental zone transfers determine that changes to the zone file have occurred—which they do by checking the serial number in the SOA RR, just like with full zone transfers—they submit an IXFR request (**incremental zone transfer request**). The primary server then transmits only the changed records.
163
DNS Notify
DNS Notify: When DNS Notify is used in a **zone transfer, the initiator of the process is the primary server rather than a secondary server.**
164
notify set
DNS Notify: When DNS Notify is used in a zone transfer, the initiator of the process is the primary server rather than a secondary server. DNS servers using DNS Notify take the following steps when a zone file is updated: ## Footnote A change in the zone file triggers the primary DNS server to increment the serial number in the SOA RR. The primary server sends a notify message to secondary servers that have been placed (by an administrator) in something called a notify set. **A notify set is simply a list of secondary DNS servers that the primary DNS server should notify when the zone file changes**. ...
165
dynamic DNS
Dynamic updates require servers that support dynamic DNS. **With dynamic DNS, zone files on primary servers can be updated automatically.** Secondary servers receive these updates like they would manual updates: through zone transfers. ... Dynamic updates are driven by **update messages**, which can specify the creation or deletion of RRs or RR sets. Administrators can specify the conditions that must occur before an RR is updated—and this protects the zone files from unwanted updates.
166
forward lookups
There are two terms we often use in association with DNS name/address resolution: **name-to-IP-address resolutions** are forward lookups,
167
reverse lookups
There are two terms we often use in association with DNS name/address resolution: name-to-IP-address resolutions are forward lookups, while **IP-address-to-name resolutions** are reverse lookups.
168
recursive queries
recursive queries: In this type of query, the requesting client demands that the **DNS server reply with either the resolved name or an error message** that states that the requested data or name doesn't exist.
169
iterative queries
iterative queries: In this type of query, the requesting client allows the **DNS server to return the best answer it can, based on its local zone file or cached data**. If the queried DNS server can't resolve the name, the reply might be a referral to another DNS server that the client should try. In an iterative query, the **client continues this process until it gets a pointer to a DNS server that answers the query** by using its local zone file or cached data (which is most likely the DNS server that is authoritative for the domain in which the target host in question resides).
170
HTML
This specially formatted file is based on a standardized language we call **Hypertext Markup Language** (HTML). It's a scripting language, which means the computer reads and interprets the language, rather than computer programs
171
SMTP
Internet e-mail servers: These servers implement an industry-standard protocol called **Simple Mail Transfer Protocol** (SMTP). SMTP defines the methods used to transfer Internet e-mail.
172
POP3 and IMAP
SMTP defines the methods used to transfer Internet e-mail. Two other e-mail-related standards, POP3 and IMAP, **define the handling of individual user mailboxes**. It’s important to recognize the difference: SMTP transfers the mail; POP3 and IMAP **manage individual mailbox destinations where transferred mail is delivered**.
173
FTP
Internet-based file servers: These servers implement an industry-standard file-transfer protocol aptly named **File Transfer Protocol** (FTP). FTP is the best way (in network-efficiency terms) to get data files across the Internet, or across any TCP/IP network. FTP is extremely efficient; it’s arguably one of the most efficient transfer protocols in existence.
174
IM
You can send an **Instant Message** (usually simply called an IM) to anyone you know who happens to be connected to the Internet.
175
Name four web languages in use today.
Windows Script Host (WSH) Java and JavaScript Common Gateway Interface (CGI) and PERL Hypertext Preprocessor (PHP) Active Server Pages (ASP) Internet Server Application Programming Interface (ISAPI) programs
176
WSH
**Windows Script Host** (WSH) is a scripting language built into the Windows operating system, which means that Web servers running on a Windows computer can interpret and run Web scripts written in the WSH language. We use WSH more for administrative tasks, and not really to make dynamic or graphics-flashing Web pages. In other words, we don’t generally use WSH extensively within Web pages to enrich content.
177
ASP
**Active Server Pages** (ASP) is a scripting language for Windows that we can use to create rich Web site content. ASP lets administrators and Web publishers embed scripts right into Web pages, enabling the creation of dynamic content, the implementation of databases, the use of graphical components, file transfers, and all sorts of other activities that scripts are good for carrying out.
178
CGI
**Common Gateway Interface** (CGI) is a set of specifications for creating Web-based applications. CGI applications can come in the form of interpreted scripts, including PERL scripts. PERL is an industry-standard language used heavily in UNIX/Linux environments and in some Windows environments. PERL can run as a script, or compiled into an executable such as an .exe application.
179
PERL
PERL is an **industry-standard language used heavily in UNIX/Linux environments** and in some Windows environments. PERL can run as a script, or compiled into an executable such as an .exe application.
180
Name several other scripting languages.
There are many other scripting languages, such as **PHP, ColdFusion, Groovy, Python, Ruby, Websphere**, and even additional programming languages such as Microsoft’s **.NET Framework**. We don’t have time to cover all of these in this lesson, but I provide links to them in the Supplementary Material section.
181
ISAPI
Microsoft dreamed up ISAPI (**Internet Server Application Programming Interface**) specifically for its Web server product called Internet Information Services (IIS). Microsoft created ISAPI to boost Web-based application performance on IIS. ISAPI is a programmed interface, not a scripted interface, so it requires knowledge of C, C++, or C# (pronounced see sharp). If you want to have ISAPI applications, the programmer has to program and compile them, rather than creating scripts that can be modified on-the-fly.
182
NOS
You might have heard of the term **network operating systems**, commonly referred to as NOSs. I don't like the term at all; with the advent of the Internet, every operating system sold today has the capability to connect to a network. Therefore, every operating system today is a network operating system. **It's kind of like saying, "I have a wheeled automobile**." Of course your automobile is wheeled. If it weren't, you would own a tank!
183
SMP
Servers with multiple CPUs are called **symmetric multiprocessing** (SMP) machines.
184
container-based servers
There's another way datacenters get lots of servers installed: container-based servers. This approach uses **servers that are preinstalled in a shipping container** (containers like those you find on the highway pulled by a semi).