Powerpoints Networking Flashcards

1
Q

Networking: Clients vs. Servers:

A

Clients request information; Servers provide information to other devices on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Peer-to-Peer:

A

Computers for both server and client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

End Devices vs. Intermediary Network Devices:

A

End Devices: Source or destination of a message.
Intermediary: Connects multiple individual networks to form an inter-network, connects individual end device; ensures data flows across the network; and provides connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Topology:

A

Physical and logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Intranet, Extranet, and Internet differences

A

Intranet - Company
Extranet - Suppliers, customers, collaborators
Internet - the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Traditional Separate /Converging Network:

A

Traditional: Each network with its own set rules and regulations.
Converging: Delivers data, voice and video over the same network infratructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Four characteristics of architecture (reliable network):

A

Fault tolerance-redundant network, limits impact of a failure, multiple paths between source and destination

Scalability-expands quickly to support new users and applications without impacting performance

QOS (Quality of Service)-priorities importance of communications

Security
confidentiality=intended authorized recipients can access and receive data
integrity-info in the data hasnt been altered during transmission
availability-timely and reliable access to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network trends:

A

BYOB, Online Collaboration, Video Communication, Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Threats vs. Security Solutions:

A

Threats: Virus, worm, trojan horses, spyware and adware, zero day attacks (zero hour), hacker, denial of service, data intercept and theft
Solutions: Antivirus and spyware, dedicated firewall, access control lists (ACL’s), intrusion prevention systems (IPS), virtual private network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rules of Communication vs. Network Protocols and Standards (rules that govern communication)

A

Communication:
Rule Establishment - ID sender and receiver, common language and grammar, speed and timing of delivery, conformation or acknowledgement requirements.
Message Encoding: Process of converting information into another acceptable form. Message formatting and encapsulation, message size, message timing (access method, flow control, response timeout), message delivery options (unicast, multicast, broadcast),

Network Protocals and Standards:
How message is formatted and structured, networking devices share information about pathways with other networks, how and when errors and system messages are passed between devices, and setup and termination of data transfer sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Protocol Interaction:

A

Application and network access work together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Segmentation / Multiplexing:

A

Segmentation breaks communications into pieces.

Multiplexing interleaves the pieces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network Address / Data Link Addresses

A

Network: Source/destination IP address; delivers IP packet from original source to final destination, same network or remote network.
Data Link: Source/destination data link address; delivers from one NIC to another NIC on same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Physical / Layer:

A

Accepts complete frame from data link layer; encodes it as series of signals that are Tx onto the local media. Functions: physical component, encoding, signaling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Transfer (bandwidth vs. throughput)

A

Bandwidth: capacity to a medium to carry data.
Throughput: measure of the transfer of bits across the media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of UTP (unshielded)

A

Rollover
Crossover (similar components)
Straight through (dissimilar components)

17
Q

Data Link Layer

A

?

18
Q

Data Link Sublayers (LLC / MAC)

A

LLC communicates with the network layer

MAC defines the media access process

19
Q

MAC WAN Topologies:

A

Physical: Point-to-point, hub and spoke, mesh
Logical: Point-to-point

20
Q

Detail link frame (what layer? and define)

  1. 11
  2. 3 ????
A

Layer 2 - header, packet (data), trailer
Header: frame start/addressing/type/controls
Packet: Data
Trailer: Error detection/frame stop

  1. 11 - wireless frame
  2. 3 - wired
21
Q

Ethernet Encapsulation:

A

Data link layer and physical layer

22
Q

MAC Sublayer:

A

Lowest sublayer of the data link layer,responsible for data encapsulation and media access control.

23
Q

Ethernet Frame:

A

Adds headers and trailers around Layer 3 PDU to encapsulate the message being sent. Frame size is 64 bytes.

24
Q

MAC Address:

A

48 bit long, expressed as 12 Hexidecimal digits. IEE requirements must use vendor’s assigned OUI as first three bytes, same OUI signal unique value in last 3 byes.

25
Q

CAM (Content Addressable Memory):

A

In the ethernet switch, remembers whose MAC addresses are in each port; monitors source address; frame is forwarded based on the CAM.

26
Q

Switch Forwarding Method (cut through, store and forward):

A

Store and Forward receives and stores the whole frame before it forwards it.
Cut Through forwards the frame before it’s entirely received, the destination frame must be read before it’s forwarded.

27
Q

Two Cut Through Switching Types:

A

Fast Forward: Lowest level of latency forwards the packet after reading destination address.
Fragment-Free Switching: Stores first 64 bytes of frame before forwarding. Most network errors and collisions occur during first 4 bytes.

28
Q

Full Duplex / Half Duplex:

A

Full - Both ends of the connection can send and receive simultaneously.
Half - Only one connection can send at a time.

29
Q

Common cause of performance issues on ethernet links:

A

One port operates at half duplex and another on full duplex.

30
Q

Auto-MDX:

A

Detects type of duplex needed for connection and configures automatically; helps reduce configuration errors.

31
Q

Layer 2 / Layer 3:

A

Layer 2 - Addresses are used to move frame within local network.
Layer 3 - Addresses are used to move the packets through remote networks.

32
Q

Combination of MAC and IP facilitate the _____ communication.

A

end-to-end

33
Q

Where do the physical address and logical address come from?

A

Physical: MAC used on the NIC for same network communications.
Logical: IP address to send packets remotely, different network.

34
Q

ARP (address resolution protocol):

A

Allows the source to request MAC address of the destination (Layer 3). ARP uses ARP requests and ARP Reply to perform its functions. Entries are removed from ARP table when cache timer expires. ARP-A on Windows PC

35
Q

IPV4 Addresses:

A

32 bit divided into four sections called octets. Each octet contains 8 bits separated by a dot. 8 bits = 1 byte.

36
Q

Static / Dynamic:

A

Static - type in manually.

Dynamic - DHCP - automatically configs IP addresses.

37
Q

Private Addresses:

A

10.0.0.0/8 172.16.0.0/12 192.168.0.0/16
Loopback 127.0.0.0/8
Linklocal 169.254.0.0/16

38
Q

IPV4 and IPV6 Coexistance

A

Dual Stack - IPV4 / IPV6 same network
Tunneling - IPV6 packets inside IPV4 packets.
Translation - IPV6 packet translated to an IPV4 packets, and vice versus