Old - Domain 2: Telecommunications and Network Security Flashcards

1
Q

OSI model

A

A network model with seven layers: physical, data link, network, transport, session, presentation, and application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TCP/IP model

A

A simpler network model with four layers: network access, Internet, transport, and application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Packet-switched network

A

A form of networking where bandwidth is shared and data is carried in units called packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Switch

A

A layer 2 device that carries traffic on one Local Area Network, based on Media Access Control (MAC) addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Router

A

A layer 3 device that routes traffic from one LAN to another, based on IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Packet filter and stateful firewalls

A

Devices that filter traffic based on OSI Layer 3 (IP addresses) and Layer 4 (ports).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Carrier Sense Multiple Access (CSMA)

A

A method used by Ethernet networks to allow shared usage of a baseband (one-channel) network and avoid collisions (multiple interfering signals).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Simplex communication

A

One way communication, like a car radio tuned to a music station.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Half-duplex communication

A

Communication that sends or receives at one time only (not simultaneously), like a walkie-talkie.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Full-duplex communication

A

Communication that sends and receives simultaneously, like two people having a face-to-face conversation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Baseband networks

A

Networks that have one channel and can send only one signal at a time. (Like ethernet networks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

100baseT UTP cable

A

100 megabit, baseband, and twisted pair cable for ethernet networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Broadband networks

A

Have multiple channels and can send multiple signals at a time, like cable TV.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Analog communication

A

Communication like what our ears hear, a continuous wave of information. (such as the original phone networks or vinyl record)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital communication

A

Communication that is transferred in bits: ones and zeroes. (such as CD, or VOIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Metropolitan Area Network (MAN)

A

Network that is typically confined to a city, Zip Code, campus, or office park.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Local Area Network (LAN)

A

Network that is typically confined to a building or area within a building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Wide Area Network (WAN)

A

Network that typically covers cities, states, or countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Global Area Network (GAN)

A

Network that is a global collection of WANs. (such as the US Dept of Defense global network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Personal Area Network (PAN)

A

Network with a range of 100 meters or less.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Internet

A

A global collection of peered networks running TCP/IP, providing best-effort service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Intranet

A

A privately owned network running TCP/IP, such as a company network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Extranet

A

A connection between private Intranets, such as connections to business partners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Circuit-switched networks

A

A dedicated circuit or channel (portion of a circuit) between two nodes. Used to provide dedicated bandwidth to point-to-point connections, such as a T1 connecting two offices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Disadvantage of circuit switched networks?

A

Once a channel or circuit is connected, it is dedicated to that purpose, even while no data is being transferred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Packet-switched networks

A

Designed to address issues with circuit-switched networks, as well as handle network failures more robustly. Designed to make unused bandwidth available for other connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

ARPAnet

A

Predecessor of the Internet. Created out of research done in the 1960s by the US Defense Advanced Research Projects Agency (DARPA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Quality of Service (QoS)

A

Used in packet-switched networks to give specific traffic precedence over other traffic. (often applied to VoIP traffic)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Network model

A

A description of how a network protocol suite operates, such as the OSI model or TCP/IP model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Network stack

A

A network protocol suite programmed in software or hardware. (TCP/IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What network model do most systems now use?

A

TCP/IP Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

X.200: Information Technology - Open Systems Interconnection - Basic Reference Model

A

Formal name for OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Name the 2 sub-layes that the Data Link Layer is dividing into.

A

Media Access Control (MAC) and Logical Link Control (LLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

OSI - Data Link Layer - MAC Layer

A

Transfers data to and from the physical layer. Touches layer 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

OSI - Data Link Layer - LLC layer

A

Handles LAN communications. Touches layer 3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

OSI - Physical Layer (Layer 1)

A

Describes unites of data such as bits represented by energy and the medium used to carry them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

OSI - Data Link Layer (Layer 2)

A

Handles access to the physical layer as well as local area network communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Layer 1 devices

A

Hubs and repeaters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Layer 2 devices

A

Switches and bridges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

OSI - Network Layer (Layer 3)

A

Describes routing: moving data from a system on one LAN to a system on another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Layer 3 devices

A

Routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Layer 3 protocols

A

IPv4 and IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

OSI - Transport Layer (Layer 4)

A

handles packet sequencing, flow control, and error detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Layer 4 protocols

A

TCP & UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

OSI - Session (Layer 5)

A

Manages sessions, which provide maintenance on connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Good way to remember Session layer.

A

Connections between applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Layer 5 example.

A

Mounting a network share. Used remote procedure calls (RPCs), which exist at the session layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

OSI - Presentation Layer (Layer 6)

A

Presents data to the application (and user) in a comprehensible way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Layer 6 concepts include what?

A

Data conversions, character sets such as ASCII, and image formats such as GIF or TIFF.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

OSI - Application (Layer 7)

A

This is where you interface with your computer application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Layer 7 examples.

A

Web browser, word processor, and instant messenger client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Layer 7 protocols.

A

Telnet and FTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Please Do Not Throw Sausage Pizza Away

A

Mnemonic to help remember layers of OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

TCP/IP was created by?

A

US Defense Advanced Research Projects Agency in the 1970s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Internet Protocol Suite

A

Formal name for TCP/IP model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

TCP/IP - Network Access Layer

A

Combines Layer 1 and Layer 2 of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

TCP/IP - Internet Layer

A

Aligns with Layer 3 of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

TCP/IP - Host-to-Host Transport Layer - Sometimes referred to as Host-to-Host or Transport alone.

A

Aligns with Layer 4 of the OSI model. Connects the Internet Layer to the Application Layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

TCP/IP - Application Layer

A

Combines Layers 5 through 7 of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

TCP/IP Application Layer protocol examples.

A

SSH, Telnet, and FTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Encapsulation

A

Takes information from a higher layer and adds a header to it, treating the higher layer information as data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Protocol Data Unit (PDU) examples

A

Data, segments, packets, frames, and bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Demultiplexing

A

Sometimes called de-encapsulation, is the reverse of encapsulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

MAC addresses

A

Historically 48 bits long. The first 24 bits form the Organizationally Unique Identifier (OUI), and the last 24 bits form a serial number (formally called an extension identifier)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

EUI-64 MAC addresses

A

Created by IEEE. The OUI is still 24 bits, but the serial number is 40 bits. IPv6 autoconfiguration is compatible with this as well as conventional MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

IPv4

A

Fundamental protocol of the Internet, designed in the 1970s to support packet-switched networking for DARPA. Used for ARPAnet, which later became the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

IPv4 Header fields?

A

20 bytes long (with no options), and contains the following key fields:

  • Version - IP version (4 for IPv4)
  • IHL - Length of IP header
  • Type of Service - Sets the precedence of the packet.
  • Identification, Flags, and Offset - Used for IP fragmentation.
  • Time to Live - To end routing loops.
  • Protocol - Embedded protocol (TCP, UDP, etc)
  • Source and Destination Address
  • Options and Padding (optional)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

IP fragmentation

A

If a packet exceeds the Maximum Transmission Unit (MTU) of a network, a router along the path may fragment it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Maximum Transmission Unit (MTU)

A

Maximum PDU size on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Typical MTU size for IP packet?

A

1500 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Field used to reassociate fragmented packets?

A

The IP Identification field (IPID). They will have the same IPID.

72
Q

Path MTU discovery

A

Uses fragmentation to discover the largest size packet allowed across a network path.

73
Q

IPv6

A

Successor to IPv4, featuring far larger address space (128-bit addresses compared to IPv4’s 32-bit), simpler routing, and simpler address assignment.

74
Q

IPv6 header fields?

A

IPv6 header is larger and simpler than IPv4. Fields include:

  • Version - IP version (6 for IPv6)
  • Traffic Class and Flow Label - Used for QoS
  • Payload Length - Length of IPv6 data (not including header)
  • Next Header - Next embedded protocol header
  • Hop Limit - To end routing loops
75
Q

IPv6 stateless autoconfiguration

A

Process by which an IPv6 host statelessly configures an IPv6 address by using the host’s MAC address. This process takes away the need for DHCP with IPv6.

76
Q

How many IPv6 addresses does each host receive?

A

Two. The first address is a global (routable) address used for communication beyond the local network. Configured based on IPv6 routing advertisement received from a local router. The second address is a link-local address used for local network communication only. This address is assigned independently, without the need for an IPv6 routing advertisement.

77
Q

Global IPv6 stateless configuration process?

A
  • Take the MAC. 00:0c:29:ef:11:36
  • Embed the ff:ee constant in the middle two bytes. 00:0c:29:ff:ee:ef:11:36
  • Set the universal bit. 02:0c:29:ff:ee:ef:11:36
  • Prepend the network prefix and convert to “:” format: fc01:0000:0000:0000:020c:29ff:eeef:1136
  • Convert one string of repeating zeroes to “::”: fc01::020c:29ff:eeef:1136
78
Q

In IPv6 addresses, how many consecutive series of zeroes can be summarized with “::”?

A

Only one.

79
Q

IPv6 stateful autoconfiguration

A

IPv6 autoconfiguration method that utilizes DHCP.

80
Q

Dual stack

A

When a system uses both IPv4 and IPv6.

81
Q

Tunnelling

A

When a host accesses IPv6 networks via IPv4.

82
Q

IPv6 loopback address

A

::1

83
Q

IPv6 security challenges?

A
  • Autoconfiguration - Allows systems to communicate with local network withouth admins knowledge.
  • While modern network tools can see IPv6, many aren’t configured to do so.
  • Many network administrators have limited understanding of IPv6.
84
Q

Classful networks

A
  • Class A: 0.0.0.0-127.255.255.255
  • Class B: 128.0.0.0-191.255.255.255
  • Class C: 192.0.0.0-239.255.255.255
  • Class D (multicast): 224.0.0.0-239.255.255.255
  • Class E (reserved): 240.0.0.0-255.255.255.255
85
Q

CIDR

A

Classless Inter-Domain Routing

86
Q

Name the RFC that describes the private IPv4 addresses that may be used for internal traffic and are not routable on the Internet.

  • 10.0.0.0-10.255.255.255 (10.0.0.0/8)
  • 172.16.0.0-172.31.255.255 (172.16.0.0/12)
  • 192.168.0.0-192.168.255.255 (192.168.0.0/16)
A

RFC 1918 address

87
Q

Three types of NAT?

A
  • Static NAT
  • Pool Nat (Dynamic NAT)
  • Port Address Translation (PAT, or NAT overloading)
88
Q

Address Resolution Protocol (ARP)

A

Used to translate between Layer 2 MAC addresses and Layer 3 IP addresses.

89
Q

Reverse Address Resolution Protocol (RARP)

A

Used by diskless workstations to request an IP address.

90
Q

Unicast traffic

A

One-to-one traffic, such as a client surfing the Web.

91
Q

Multicast traffic

A

One-to-many traffic, where the “many” is preselected. (uses class D addresses and UDP)

92
Q

Broadcast traffic

A

One-to-all traffic on a LAN.

93
Q

Name the two types of broadcast traffic.

A

Limited broadcast and directed broadcast.

94
Q

Limited broadcast

A

255.255.255.255, never forwarded across a router.

95
Q

Name the directed broadcast address for the 192.0.2.0/24 network.

A

192.0.2.255

96
Q

Layer 2 broadcast.

A

Reaches all nodes in a broadcast domain. A switch is an example of a broadcast domain.

97
Q

Example of layer 2 broadcast address?

A

FF:FF:FF:FF:FF:FF

98
Q

Promiscuous network access.

A

Provides the ability to access all unicast traffic on a network segment.

99
Q

TCP

A

Transmission Control Protocol and is a reliable Layer 4 protocol. Uses a 3-way handshake to create reliable connections across a network.

100
Q

TCP header

A

20 bytes long (with no options) and contains the following important fields:

  • Source Port and Destination Port
  • Sequence Number and Acknowledgement Number
  • TCP Flags
  • Window Size (amount of data that may be sent before receiving acknowledgment)
101
Q

Name the two types of TCP ports.

A

Reserved (1023 or lower) and ephemeral (1024 to 65535)

102
Q

Socket

A

Combination of an IP address and a TCP or UDP port on one node.

103
Q

Socket pair

A

Describes a unique connection between two nodes: source ip & port, destination ip & port.

104
Q

Sockets can be in what states?

A

Listening (waiting for connection) or established (active connection)

105
Q

TCP flags

A

-URG - Packet contains urgent data.
-ACK - Acknowledge received data.
-PSH - Push data to app server.
-RST - Reset (tear down) connection.
-SYN - Synchronize a connection.
-FIN - Finish a connection (gracefully)
Additional flags used to manage congestion:
Added in 2001:
-CWR - Congestion window reduced.
-ECE - Explicit congestion notification echo.
Added in 2003:
-NS - Nonce sum.

106
Q

TCP three-way handshake?

A

SYN, SYN/ACK, ACK. Used when establishing a connection.

107
Q

UDP header

A

8 bytes long and contains the following fields:

  • Source Port,
  • Destination Port
  • Packet length (header and data)
  • Simple checksum (optional)
108
Q

UDP

A

The User Datagram Protocol is a simpler and faster cousin to TCP. Has no handshake, session, or reliability. Operates at Layer 4. Commonly used for lossy applications, such as streaming audio and video. Also for query-response applications such as DNS.

109
Q

ICMP

A

The Internet Control Message Protocol is a helper protocol that helps Layer 3. Used to troubleshoot and report error conditions. Does not use ports like TCP and UDP, instead uses types and codes.

110
Q

Commonly used ICMP types.

A
  • Echo request (used for ping)
  • Echo reply (used for ping)
  • Time to live exceeded in transit (used for traceroute)
111
Q

Traceroute

A

Uses the Time to Live (TTL) field to determine all routers between two nodes. Most clients send UDP packets outbound for this (such as UNIX and Cisco), but Windows uses ICMP.

112
Q

Telnet port?

A

TCP port 23

113
Q

FTP ports?

A

TCP port 21 - Control connection (where commands are sent)

-TCP port 20 - the data connection for Active FTP (where data is transferred)

114
Q

Trivial File Transfer Protocol (TFTP)

A

Provides a simpler way to transfer files and is often used for saving router configs or bootstrapping (downloading OS) via network by diskless workstations. Has no authentication or directory structure. No confidentiality or integrity.

115
Q

TFTP port?

A

UDP port 69

116
Q

SSH

A

Designed as a secure replacement for Telnet, FTP, and the UNIX “R” commands (rlogin, rshell, etc.)

117
Q

SSH port?

A

TCP port 22

118
Q

SSH version 1

A

Original version of SSH, has since been found vulnerable to man-in-the-middle attacks. SSH v2 is the current recommended version.

119
Q

SMTP port?

A

TCP port 25

120
Q

POP port?

A

TCP port 110

121
Q

IMAP port

A

TCP port 143

122
Q

DNS ports?

A
  • UDP port 53 (small answers)

- TCP port 53 (large answers such as zone transfers)

123
Q

DNS weaknesses?

A

Uses the unreliable UDP protocol for most requests, and native DNS provides no authentication. Security of DNS relies on a 16 bit source port and 16 bit DNS query ID. Attackers who are able to guess both numbers can forge UDP DNS responses.

124
Q

Domain Name Server Security Extensions (DNSSEC)

A

Provides authentication and integrity to DNS responses via the use of public key encryption. Note that this does not provide confidentiality.

125
Q

Simple Network Management Protocol (SNMP)

A

Protocol that is primarily used to monitor network devices.

126
Q

SNMP port?

A

UDP port 161

127
Q

Versions of SNMP?

A

SNMPv1 and v2c provide no authentication or confidentiality. Vulnerable to attacks of attacker can sniff or has access to network. SNMPv3 was designed to provide confidentiality, integrity, and authentication via encryption. Use of this version is strongly encouraged.

128
Q

HTTP port?

A

TCP port 80

129
Q

HTTPS port?

A

TCP port 443

130
Q

Bootstrap Protocol (BOOTP)

A

Used for bootstrapping via a network by diskless systems. Used to load OS via a network without a disk. Normally used to determine the IP and OS image name, then TFTP is used to download the OS.

131
Q

Dynamic Host Configuration Protocol (DHCP)

A

Designed to replace and improve on BOOTP. Allows more config options than BOOTP, as well as assigning temporary IP leases to systems.

132
Q

BOOTP ports?

A

UDP port 67 - for servers

UDP port 68 - for clients

133
Q

Electomagnetic Interference (EMI)

A

Interference caused by magnetism created by electricity.

134
Q

Noise

A

Any unwanted signal (such as EMI) on a network cable.

135
Q

Crosstalk

A

Occurs when a signal crosses from one cable to another.

136
Q

Attenuation

A

The weakening of a signal as it travels further from the source.

137
Q

Unshielded Twisted Pair (UTP)

A

Network cabling that uses pairs of wires twisted together. Twisting the wires dampens the magnetism making the pair less susceptible to EMI.

138
Q

UTP category cabling speeds and usages?

A

Category Speed (Mbps) Common use

  • Cat 1 <1 Analog voice
  • Cat 2 4 ARCNET
  • Cat 3 10 10baseT Ethrnt
  • Cat 4 16 Token Ring
  • Cat 5 100 100baseT Ethrnt
  • Cat 5e 1000 1000baseT Ethrnt
  • Cat 6 1000 1000baseT Ethrnt
139
Q

Coaxial cable

A

Core and shield used by this cable is thicker and better insulated than other cable types, such as twisted pair. Makes this cabling more resistant to EMI and allows higher bandwidth and longer connections.

140
Q

Thinnet and Thicknet

A

Two older types of coaxial cable used for Ethernet bus networking.

141
Q

Advantages of fiber.

A

Speed, distance, and immunity to EMI.

142
Q

Disadvantages of fiber.

A

Cost and complexity.

143
Q

Multimode fiber

A

Carrier uses multiple modes (paths) of light, resulting in light dispersion. This type of fiber is used for shorter distances.

144
Q

Single-mode fiber

A

Uses a single strand of fiber, and the light uses one mode (path) down the center of the fiber. This type of fiber is used for longer distances and high-speed networking.

145
Q

Wavelength-division multiplexing (WDM)

A

Allows multiple signals to be carried via the same fiber through the use of multiple light “colors” to transmit different channels of information. Combined speeds of over a terabit/second can be achieved when this is used to carry 10-gigabits per color.

146
Q

Ethernet

A

Dominant LAN technology that transmits network data via frames. Originally used a physical bus topology but later added support for physical star schema.

147
Q

Carrier Sense Multiple Access (CSMA)

A

Designed to address collisions on ethernet networks.

148
Q

CSMA/CD (Collision Detection)

A

Used to immediately detect collisions within a network. Used on systems that can send and receive simultaneously, such as wired Ethernet. It takes the following steps:

  1. Monitor network to see if idle.
  2. If not idle, wait a random amount of time.
  3. If idle, transmit.
  4. While transmitting, monitor the network.
  5. If more electricity is received than sent, another station must also be sending.
  6. Send Jam signal to tell all nodes to stop transmitting.
  7. Wait a random amount of time before retransmitting.
149
Q

CSMA/CA (Collision Avoidance)

A

Used for systems such as 802.11 wireless that cannot send and receive simultaneously. Relies on receiving an acknowledgement from the receiving station; if no acknowledgement is received there must have been a collision. The node will wait and retransmit.

150
Q

CSMA/CA or CSMA/CD better?

A

CSMA/CD is better because collision detection detects a collision almost immediately.

151
Q

The attached Resource Computer Network (ARCNET) and Token Ring.

A

Both are legacy LAN technologies. Both pass network traffic via tokens. Possession of a token allows a node to read or write traffic on a network. No collisions due to this.

152
Q

The Fiber Distributed Data Interface (FDDI)

A

Another legacy LAN technology, running a logical network ring via primary and secondary counter-rotating fiber optic ring. Single ring runs at 100 megabits.

153
Q

Bus network

A

Connects the network nodes in a string. Each node inspects the data as it passes along the bus. Fragile. Should the network cable break anywhere along string, the entire network would go down.

154
Q

Tree (hierarchical) network

A

A network with a root node and branch nodes that are at least three levels deep (two levels would make it a star) The root node controls all traffic. Legacy network design, root node was often a mainframe.

155
Q

Ring network

A

Physical ring connects network nodes in a ring. If you follow the cable from node to node, you will finish where you began.

156
Q

Star network

A

Has become the dominant physical topology for LANs. First popularized by ARCNET and later adopted by Ethernet. Each node is connected directly to a central device such as hub/switch. Features better fault tolerance than other networks, but require more cable. Cost is typically outweighed by fault tolerance advantages.

157
Q

Remember that physical and logical topologies are related but different. A logical ring can run via a physical ring, but there are exceptions. FDDI uses both, but Token Ring is a logical ring that runs on a physical star. If you see the word “ring” on the exam, check context to see if physical, logical, or both.

A

Blank

158
Q

Mesh network

A

Interconnects network nodes to each other. Provides superior availability and is often used for HA server clusters.

159
Q

Name the 2 most prevalent international circuit standards available.

A

T Carriers (United States) and E Carriers (Europe). T1s, T3s, E1s, E3s

160
Q

T1 (often used interchangeably with DS1)

A

Dedicated 1.544-megabit circuit that carries 24 64-bit DS0 (digital signal 0) channels (such as 24 switched phone calls). Often rounded off to 1.5 megabits.

161
Q

Difference between DS1 and T1.

A

DS1 describes the flow of bits (via any medium, such as copper, fiber, or wireless); a T1 is a copper telephone circuit that carries a DS1.

162
Q

T3 (often used interchangeably with DS3)

A

28 bundled T1s, forming a 44.736-megabit circuit. Often rounded off to 45 megabits.

163
Q

E1

A

Dedicated 2.048-megabit circuits that carry 30 channels.

164
Q

E3

A

34.368-megabit circuit. Formed by bundling 16 E1s.

165
Q

Synchronous Optical Networking (SONET)

A

Carries multiple T-carrier circuits via fiber optic cable. Uses a phisical fiber ring for redundancy.

166
Q

Frame Relay

A

Packet-switched Layer 2 WAN protocol that provides no error recovery and focuses on speed. Higher layer protocols carried by this protocol, such as TCP/IP, can be used to provide reliability.

167
Q

Frame Relay

A

Multiplexes multiple logical connections over a single physical connection to create Virtual Circuits; this shared bandwidth model is an alternative to dedicated circuits such as T1s.

168
Q

Switched Virtual Circuit (SVC)

A

In Frame relay, this type of circuit sets up each “call”, transfers data, and terminates the connection after an idle timeout.

169
Q

Permanent Virtual Circuit (PVC)

A

In frame relay, this type of circuit is always connected, analogous to a real dedicated circuit like a T1.

170
Q

X.25

A

Older packet-switched WAN protocol. Provided a cost-effective way to transmit data over long distances in the 1970s through early 1990s, when the most common other option was a direct call via analog modem. Popularity faded with rise of Internet.

171
Q

Asynchronous Transfer Mode (ATM)

A

WAN technology that uses fixed length cells. Allows reliable network throughput compared to Ethernet. While ethernet packet sizes range greatly, all of these cells are the same size (53 bytes).

172
Q

Switched Multimegabit Data Services (SMDS)

A

Older protocol that is similar to ATM, also uses 53-byte cells.

173
Q

Multiprotocol Label Switching (MPLS)

A

Provides a way to forward WAN data via labels, via a shared ____ cloud network. Allows these networks to carry many types of network traffic, including ATM, Frame Relay, IP, and others. Can carry voice and data and can simplify WAN routing. Assume 12 offices connect to 1 data center. T1s require 12 circuits, this would require 1.

174
Q

Synchronous Data Link Control (SDLC)

A

A synchronous Layer 2 WAN protocol that uses polling to transmit data. Polling is similar to token passing, diff is that a primary node polls secondary nodes, which can transmit data when polled. Combined nodes can act as either prim or sec. Supports NRM transmission only.

175
Q

High-Level Data Link Control (HDLC)

A

Successor to SDLC. Adds error correction and flow control, as well as 2 additional modes (ARM and ABM).

176
Q

What are the 3 modes of HDLC?

A
  • Normal Response Mode (NRM) - Secondary nodes can transmit when given permission by the primary.
  • Asynchronous Response Mode (ARM) - Secondary nodes may initiate communication with the primary.
  • Asynchronous Balanced Mode (ABM) - Combined mode where nodes may act as either primary or secondary.