Old - Domain 2: Telecommunications and Network Security Flashcards

(176 cards)

1
Q

OSI model

A

A network model with seven layers: physical, data link, network, transport, session, presentation, and application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TCP/IP model

A

A simpler network model with four layers: network access, Internet, transport, and application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Packet-switched network

A

A form of networking where bandwidth is shared and data is carried in units called packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Switch

A

A layer 2 device that carries traffic on one Local Area Network, based on Media Access Control (MAC) addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Router

A

A layer 3 device that routes traffic from one LAN to another, based on IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Packet filter and stateful firewalls

A

Devices that filter traffic based on OSI Layer 3 (IP addresses) and Layer 4 (ports).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Carrier Sense Multiple Access (CSMA)

A

A method used by Ethernet networks to allow shared usage of a baseband (one-channel) network and avoid collisions (multiple interfering signals).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Simplex communication

A

One way communication, like a car radio tuned to a music station.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Half-duplex communication

A

Communication that sends or receives at one time only (not simultaneously), like a walkie-talkie.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Full-duplex communication

A

Communication that sends and receives simultaneously, like two people having a face-to-face conversation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Baseband networks

A

Networks that have one channel and can send only one signal at a time. (Like ethernet networks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

100baseT UTP cable

A

100 megabit, baseband, and twisted pair cable for ethernet networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Broadband networks

A

Have multiple channels and can send multiple signals at a time, like cable TV.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Analog communication

A

Communication like what our ears hear, a continuous wave of information. (such as the original phone networks or vinyl record)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital communication

A

Communication that is transferred in bits: ones and zeroes. (such as CD, or VOIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Metropolitan Area Network (MAN)

A

Network that is typically confined to a city, Zip Code, campus, or office park.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Local Area Network (LAN)

A

Network that is typically confined to a building or area within a building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Wide Area Network (WAN)

A

Network that typically covers cities, states, or countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Global Area Network (GAN)

A

Network that is a global collection of WANs. (such as the US Dept of Defense global network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Personal Area Network (PAN)

A

Network with a range of 100 meters or less.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Internet

A

A global collection of peered networks running TCP/IP, providing best-effort service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Intranet

A

A privately owned network running TCP/IP, such as a company network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Extranet

A

A connection between private Intranets, such as connections to business partners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Circuit-switched networks

A

A dedicated circuit or channel (portion of a circuit) between two nodes. Used to provide dedicated bandwidth to point-to-point connections, such as a T1 connecting two offices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Disadvantage of circuit switched networks?
Once a channel or circuit is connected, it is dedicated to that purpose, even while no data is being transferred.
26
Packet-switched networks
Designed to address issues with circuit-switched networks, as well as handle network failures more robustly. Designed to make unused bandwidth available for other connections.
27
ARPAnet
Predecessor of the Internet. Created out of research done in the 1960s by the US Defense Advanced Research Projects Agency (DARPA).
28
Quality of Service (QoS)
Used in packet-switched networks to give specific traffic precedence over other traffic. (often applied to VoIP traffic)
29
Network model
A description of how a network protocol suite operates, such as the OSI model or TCP/IP model.
30
Network stack
A network protocol suite programmed in software or hardware. (TCP/IP)
31
What network model do most systems now use?
TCP/IP Model
32
X.200: Information Technology - Open Systems Interconnection - Basic Reference Model
Formal name for OSI model.
33
Name the 2 sub-layes that the Data Link Layer is dividing into.
Media Access Control (MAC) and Logical Link Control (LLC)
34
OSI - Data Link Layer - MAC Layer
Transfers data to and from the physical layer. Touches layer 1.
35
OSI - Data Link Layer - LLC layer
Handles LAN communications. Touches layer 3.
36
OSI - Physical Layer (Layer 1)
Describes unites of data such as bits represented by energy and the medium used to carry them.
37
OSI - Data Link Layer (Layer 2)
Handles access to the physical layer as well as local area network communication.
38
Layer 1 devices
Hubs and repeaters.
39
Layer 2 devices
Switches and bridges.
40
OSI - Network Layer (Layer 3)
Describes routing: moving data from a system on one LAN to a system on another.
41
Layer 3 devices
Routers.
42
Layer 3 protocols
IPv4 and IPv6
43
OSI - Transport Layer (Layer 4)
handles packet sequencing, flow control, and error detection.
44
Layer 4 protocols
TCP & UDP
45
OSI - Session (Layer 5)
Manages sessions, which provide maintenance on connections.
46
Good way to remember Session layer.
Connections between applications.
47
Layer 5 example.
Mounting a network share. Used remote procedure calls (RPCs), which exist at the session layer.
48
OSI - Presentation Layer (Layer 6)
Presents data to the application (and user) in a comprehensible way.
49
Layer 6 concepts include what?
Data conversions, character sets such as ASCII, and image formats such as GIF or TIFF.
50
OSI - Application (Layer 7)
This is where you interface with your computer application.
51
Layer 7 examples.
Web browser, word processor, and instant messenger client.
52
Layer 7 protocols.
Telnet and FTP.
53
Please Do Not Throw Sausage Pizza Away
Mnemonic to help remember layers of OSI model.
54
TCP/IP was created by?
US Defense Advanced Research Projects Agency in the 1970s
55
Internet Protocol Suite
Formal name for TCP/IP model.
56
TCP/IP - Network Access Layer
Combines Layer 1 and Layer 2 of the OSI model.
57
TCP/IP - Internet Layer
Aligns with Layer 3 of the OSI model.
58
TCP/IP - Host-to-Host Transport Layer - Sometimes referred to as Host-to-Host or Transport alone.
Aligns with Layer 4 of the OSI model. Connects the Internet Layer to the Application Layer.
59
TCP/IP - Application Layer
Combines Layers 5 through 7 of the OSI model.
60
TCP/IP Application Layer protocol examples.
SSH, Telnet, and FTP.
61
Encapsulation
Takes information from a higher layer and adds a header to it, treating the higher layer information as data.
62
Protocol Data Unit (PDU) examples
Data, segments, packets, frames, and bits.
63
Demultiplexing
Sometimes called de-encapsulation, is the reverse of encapsulation.
64
MAC addresses
Historically 48 bits long. The first 24 bits form the Organizationally Unique Identifier (OUI), and the last 24 bits form a serial number (formally called an extension identifier)
65
EUI-64 MAC addresses
Created by IEEE. The OUI is still 24 bits, but the serial number is 40 bits. IPv6 autoconfiguration is compatible with this as well as conventional MAC addresses.
66
IPv4
Fundamental protocol of the Internet, designed in the 1970s to support packet-switched networking for DARPA. Used for ARPAnet, which later became the Internet.
67
IPv4 Header fields?
20 bytes long (with no options), and contains the following key fields: - Version - IP version (4 for IPv4) - IHL - Length of IP header - Type of Service - Sets the precedence of the packet. - Identification, Flags, and Offset - Used for IP fragmentation. - Time to Live - To end routing loops. - Protocol - Embedded protocol (TCP, UDP, etc) - Source and Destination Address - Options and Padding (optional)
68
IP fragmentation
If a packet exceeds the Maximum Transmission Unit (MTU) of a network, a router along the path may fragment it.
69
Maximum Transmission Unit (MTU)
Maximum PDU size on a network.
70
Typical MTU size for IP packet?
1500 bytes
71
Field used to reassociate fragmented packets?
The IP Identification field (IPID). They will have the same IPID.
72
Path MTU discovery
Uses fragmentation to discover the largest size packet allowed across a network path.
73
IPv6
Successor to IPv4, featuring far larger address space (128-bit addresses compared to IPv4's 32-bit), simpler routing, and simpler address assignment.
74
IPv6 header fields?
IPv6 header is larger and simpler than IPv4. Fields include: - Version - IP version (6 for IPv6) - Traffic Class and Flow Label - Used for QoS - Payload Length - Length of IPv6 data (not including header) - Next Header - Next embedded protocol header - Hop Limit - To end routing loops
75
IPv6 stateless autoconfiguration
Process by which an IPv6 host statelessly configures an IPv6 address by using the host's MAC address. This process takes away the need for DHCP with IPv6.
76
How many IPv6 addresses does each host receive?
Two. The first address is a global (routable) address used for communication beyond the local network. Configured based on IPv6 routing advertisement received from a local router. The second address is a link-local address used for local network communication only. This address is assigned independently, without the need for an IPv6 routing advertisement.
77
Global IPv6 stateless configuration process?
- Take the MAC. 00:0c:29:ef:11:36 - Embed the ff:ee constant in the middle two bytes. 00:0c:29:ff:ee:ef:11:36 - Set the universal bit. 02:0c:29:ff:ee:ef:11:36 - Prepend the network prefix and convert to ":" format: fc01:0000:0000:0000:020c:29ff:eeef:1136 - Convert one string of repeating zeroes to "::": fc01::020c:29ff:eeef:1136
78
In IPv6 addresses, how many consecutive series of zeroes can be summarized with "::"?
Only one.
79
IPv6 stateful autoconfiguration
IPv6 autoconfiguration method that utilizes DHCP.
80
Dual stack
When a system uses both IPv4 and IPv6.
81
Tunnelling
When a host accesses IPv6 networks via IPv4.
82
IPv6 loopback address
::1
83
IPv6 security challenges?
- Autoconfiguration - Allows systems to communicate with local network withouth admins knowledge. - While modern network tools can see IPv6, many aren't configured to do so. - Many network administrators have limited understanding of IPv6.
84
Classful networks
- Class A: 0.0.0.0-127.255.255.255 - Class B: 128.0.0.0-191.255.255.255 - Class C: 192.0.0.0-239.255.255.255 - Class D (multicast): 224.0.0.0-239.255.255.255 - Class E (reserved): 240.0.0.0-255.255.255.255
85
CIDR
Classless Inter-Domain Routing
86
Name the RFC that describes the private IPv4 addresses that may be used for internal traffic and are not routable on the Internet. - 10.0.0.0-10.255.255.255 (10.0.0.0/8) - 172.16.0.0-172.31.255.255 (172.16.0.0/12) - 192.168.0.0-192.168.255.255 (192.168.0.0/16)
RFC 1918 address
87
Three types of NAT?
- Static NAT - Pool Nat (Dynamic NAT) - Port Address Translation (PAT, or NAT overloading)
88
Address Resolution Protocol (ARP)
Used to translate between Layer 2 MAC addresses and Layer 3 IP addresses.
89
Reverse Address Resolution Protocol (RARP)
Used by diskless workstations to request an IP address.
90
Unicast traffic
One-to-one traffic, such as a client surfing the Web.
91
Multicast traffic
One-to-many traffic, where the "many" is preselected. (uses class D addresses and UDP)
92
Broadcast traffic
One-to-all traffic on a LAN.
93
Name the two types of broadcast traffic.
Limited broadcast and directed broadcast.
94
Limited broadcast
255.255.255.255, never forwarded across a router.
95
Name the directed broadcast address for the 192.0.2.0/24 network.
192.0.2.255
96
Layer 2 broadcast.
Reaches all nodes in a broadcast domain. A switch is an example of a broadcast domain.
97
Example of layer 2 broadcast address?
FF:FF:FF:FF:FF:FF
98
Promiscuous network access.
Provides the ability to access all unicast traffic on a network segment.
99
TCP
Transmission Control Protocol and is a reliable Layer 4 protocol. Uses a 3-way handshake to create reliable connections across a network.
100
TCP header
20 bytes long (with no options) and contains the following important fields: - Source Port and Destination Port - Sequence Number and Acknowledgement Number - TCP Flags - Window Size (amount of data that may be sent before receiving acknowledgment)
101
Name the two types of TCP ports.
Reserved (1023 or lower) and ephemeral (1024 to 65535)
102
Socket
Combination of an IP address and a TCP or UDP port on one node.
103
Socket pair
Describes a unique connection between two nodes: source ip & port, destination ip & port.
104
Sockets can be in what states?
Listening (waiting for connection) or established (active connection)
105
TCP flags
-URG - Packet contains urgent data. -ACK - Acknowledge received data. -PSH - Push data to app server. -RST - Reset (tear down) connection. -SYN - Synchronize a connection. -FIN - Finish a connection (gracefully) Additional flags used to manage congestion: Added in 2001: -CWR - Congestion window reduced. -ECE - Explicit congestion notification echo. Added in 2003: -NS - Nonce sum.
106
TCP three-way handshake?
SYN, SYN/ACK, ACK. Used when establishing a connection.
107
UDP header
8 bytes long and contains the following fields: - Source Port, - Destination Port - Packet length (header and data) - Simple checksum (optional)
108
UDP
The User Datagram Protocol is a simpler and faster cousin to TCP. Has no handshake, session, or reliability. Operates at Layer 4. Commonly used for lossy applications, such as streaming audio and video. Also for query-response applications such as DNS.
109
ICMP
The Internet Control Message Protocol is a helper protocol that helps Layer 3. Used to troubleshoot and report error conditions. Does not use ports like TCP and UDP, instead uses types and codes.
110
Commonly used ICMP types.
- Echo request (used for ping) - Echo reply (used for ping) - Time to live exceeded in transit (used for traceroute)
111
Traceroute
Uses the Time to Live (TTL) field to determine all routers between two nodes. Most clients send UDP packets outbound for this (such as UNIX and Cisco), but Windows uses ICMP.
112
Telnet port?
TCP port 23
113
FTP ports?
TCP port 21 - Control connection (where commands are sent) | -TCP port 20 - the data connection for Active FTP (where data is transferred)
114
Trivial File Transfer Protocol (TFTP)
Provides a simpler way to transfer files and is often used for saving router configs or bootstrapping (downloading OS) via network by diskless workstations. Has no authentication or directory structure. No confidentiality or integrity.
115
TFTP port?
UDP port 69
116
SSH
Designed as a secure replacement for Telnet, FTP, and the UNIX "R" commands (rlogin, rshell, etc.)
117
SSH port?
TCP port 22
118
SSH version 1
Original version of SSH, has since been found vulnerable to man-in-the-middle attacks. SSH v2 is the current recommended version.
119
SMTP port?
TCP port 25
120
POP port?
TCP port 110
121
IMAP port
TCP port 143
122
DNS ports?
- UDP port 53 (small answers) | - TCP port 53 (large answers such as zone transfers)
123
DNS weaknesses?
Uses the unreliable UDP protocol for most requests, and native DNS provides no authentication. Security of DNS relies on a 16 bit source port and 16 bit DNS query ID. Attackers who are able to guess both numbers can forge UDP DNS responses.
124
Domain Name Server Security Extensions (DNSSEC)
Provides authentication and integrity to DNS responses via the use of public key encryption. Note that this does not provide confidentiality.
125
Simple Network Management Protocol (SNMP)
Protocol that is primarily used to monitor network devices.
126
SNMP port?
UDP port 161
127
Versions of SNMP?
SNMPv1 and v2c provide no authentication or confidentiality. Vulnerable to attacks of attacker can sniff or has access to network. SNMPv3 was designed to provide confidentiality, integrity, and authentication via encryption. Use of this version is strongly encouraged.
128
HTTP port?
TCP port 80
129
HTTPS port?
TCP port 443
130
Bootstrap Protocol (BOOTP)
Used for bootstrapping via a network by diskless systems. Used to load OS via a network without a disk. Normally used to determine the IP and OS image name, then TFTP is used to download the OS.
131
Dynamic Host Configuration Protocol (DHCP)
Designed to replace and improve on BOOTP. Allows more config options than BOOTP, as well as assigning temporary IP leases to systems.
132
BOOTP ports?
UDP port 67 - for servers | UDP port 68 - for clients
133
Electomagnetic Interference (EMI)
Interference caused by magnetism created by electricity.
134
Noise
Any unwanted signal (such as EMI) on a network cable.
135
Crosstalk
Occurs when a signal crosses from one cable to another.
136
Attenuation
The weakening of a signal as it travels further from the source.
137
Unshielded Twisted Pair (UTP)
Network cabling that uses pairs of wires twisted together. Twisting the wires dampens the magnetism making the pair less susceptible to EMI.
138
UTP category cabling speeds and usages?
Category Speed (Mbps) Common use - Cat 1 <1 Analog voice - Cat 2 4 ARCNET - Cat 3 10 10baseT Ethrnt - Cat 4 16 Token Ring - Cat 5 100 100baseT Ethrnt - Cat 5e 1000 1000baseT Ethrnt - Cat 6 1000 1000baseT Ethrnt
139
Coaxial cable
Core and shield used by this cable is thicker and better insulated than other cable types, such as twisted pair. Makes this cabling more resistant to EMI and allows higher bandwidth and longer connections.
140
Thinnet and Thicknet
Two older types of coaxial cable used for Ethernet bus networking.
141
Advantages of fiber.
Speed, distance, and immunity to EMI.
142
Disadvantages of fiber.
Cost and complexity.
143
Multimode fiber
Carrier uses multiple modes (paths) of light, resulting in light dispersion. This type of fiber is used for shorter distances.
144
Single-mode fiber
Uses a single strand of fiber, and the light uses one mode (path) down the center of the fiber. This type of fiber is used for longer distances and high-speed networking.
145
Wavelength-division multiplexing (WDM)
Allows multiple signals to be carried via the same fiber through the use of multiple light "colors" to transmit different channels of information. Combined speeds of over a terabit/second can be achieved when this is used to carry 10-gigabits per color.
146
Ethernet
Dominant LAN technology that transmits network data via frames. Originally used a physical bus topology but later added support for physical star schema.
147
Carrier Sense Multiple Access (CSMA)
Designed to address collisions on ethernet networks.
148
CSMA/CD (Collision Detection)
Used to immediately detect collisions within a network. Used on systems that can send and receive simultaneously, such as wired Ethernet. It takes the following steps: 1. Monitor network to see if idle. 2. If not idle, wait a random amount of time. 3. If idle, transmit. 4. While transmitting, monitor the network. 5. If more electricity is received than sent, another station must also be sending. 6. Send Jam signal to tell all nodes to stop transmitting. 7. Wait a random amount of time before retransmitting.
149
CSMA/CA (Collision Avoidance)
Used for systems such as 802.11 wireless that cannot send and receive simultaneously. Relies on receiving an acknowledgement from the receiving station; if no acknowledgement is received there must have been a collision. The node will wait and retransmit.
150
CSMA/CA or CSMA/CD better?
CSMA/CD is better because collision detection detects a collision almost immediately.
151
The attached Resource Computer Network (ARCNET) and Token Ring.
Both are legacy LAN technologies. Both pass network traffic via tokens. Possession of a token allows a node to read or write traffic on a network. No collisions due to this.
152
The Fiber Distributed Data Interface (FDDI)
Another legacy LAN technology, running a logical network ring via primary and secondary counter-rotating fiber optic ring. Single ring runs at 100 megabits.
153
Bus network
Connects the network nodes in a string. Each node inspects the data as it passes along the bus. Fragile. Should the network cable break anywhere along string, the entire network would go down.
154
Tree (hierarchical) network
A network with a root node and branch nodes that are at least three levels deep (two levels would make it a star) The root node controls all traffic. Legacy network design, root node was often a mainframe.
155
Ring network
Physical ring connects network nodes in a ring. If you follow the cable from node to node, you will finish where you began.
156
Star network
Has become the dominant physical topology for LANs. First popularized by ARCNET and later adopted by Ethernet. Each node is connected directly to a central device such as hub/switch. Features better fault tolerance than other networks, but require more cable. Cost is typically outweighed by fault tolerance advantages.
157
Remember that physical and logical topologies are related but different. A logical ring can run via a physical ring, but there are exceptions. FDDI uses both, but Token Ring is a logical ring that runs on a physical star. If you see the word "ring" on the exam, check context to see if physical, logical, or both.
Blank
158
Mesh network
Interconnects network nodes to each other. Provides superior availability and is often used for HA server clusters.
159
Name the 2 most prevalent international circuit standards available.
T Carriers (United States) and E Carriers (Europe). T1s, T3s, E1s, E3s
160
T1 (often used interchangeably with DS1)
Dedicated 1.544-megabit circuit that carries 24 64-bit DS0 (digital signal 0) channels (such as 24 switched phone calls). Often rounded off to 1.5 megabits.
161
Difference between DS1 and T1.
DS1 describes the flow of bits (via any medium, such as copper, fiber, or wireless); a T1 is a copper telephone circuit that carries a DS1.
162
T3 (often used interchangeably with DS3)
28 bundled T1s, forming a 44.736-megabit circuit. Often rounded off to 45 megabits.
163
E1
Dedicated 2.048-megabit circuits that carry 30 channels.
164
E3
34.368-megabit circuit. Formed by bundling 16 E1s.
165
Synchronous Optical Networking (SONET)
Carries multiple T-carrier circuits via fiber optic cable. Uses a phisical fiber ring for redundancy.
166
Frame Relay
Packet-switched Layer 2 WAN protocol that provides no error recovery and focuses on speed. Higher layer protocols carried by this protocol, such as TCP/IP, can be used to provide reliability.
167
Frame Relay
Multiplexes multiple logical connections over a single physical connection to create Virtual Circuits; this shared bandwidth model is an alternative to dedicated circuits such as T1s.
168
Switched Virtual Circuit (SVC)
In Frame relay, this type of circuit sets up each "call", transfers data, and terminates the connection after an idle timeout.
169
Permanent Virtual Circuit (PVC)
In frame relay, this type of circuit is always connected, analogous to a real dedicated circuit like a T1.
170
X.25
Older packet-switched WAN protocol. Provided a cost-effective way to transmit data over long distances in the 1970s through early 1990s, when the most common other option was a direct call via analog modem. Popularity faded with rise of Internet.
171
Asynchronous Transfer Mode (ATM)
WAN technology that uses fixed length cells. Allows reliable network throughput compared to Ethernet. While ethernet packet sizes range greatly, all of these cells are the same size (53 bytes).
172
Switched Multimegabit Data Services (SMDS)
Older protocol that is similar to ATM, also uses 53-byte cells.
173
Multiprotocol Label Switching (MPLS)
Provides a way to forward WAN data via labels, via a shared ____ cloud network. Allows these networks to carry many types of network traffic, including ATM, Frame Relay, IP, and others. Can carry voice and data and can simplify WAN routing. Assume 12 offices connect to 1 data center. T1s require 12 circuits, this would require 1.
174
Synchronous Data Link Control (SDLC)
A synchronous Layer 2 WAN protocol that uses polling to transmit data. Polling is similar to token passing, diff is that a primary node polls secondary nodes, which can transmit data when polled. Combined nodes can act as either prim or sec. Supports NRM transmission only.
175
High-Level Data Link Control (HDLC)
Successor to SDLC. Adds error correction and flow control, as well as 2 additional modes (ARM and ABM).
176
What are the 3 modes of HDLC?
- Normal Response Mode (NRM) - Secondary nodes can transmit when given permission by the primary. - Asynchronous Response Mode (ARM) - Secondary nodes may initiate communication with the primary. - Asynchronous Balanced Mode (ABM) - Combined mode where nodes may act as either primary or secondary.