Ryan's Midterm Study Guide (Chpt 1-7 + 10) Flashcards

Ryan's Midterm Study guide. Chapters 1-7 + chapter 10.

1
Q

What is a LAN?

A

A LAN is a Local Area Network. End devices connected to a single router that communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a WAN?

A

A WAN is a Wide Area Network. Usually a series of LANS connected by something (the internet is the worlds largest WAN. Other examples include cloud services) WANs are normally run and owned by a company or ISP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the internet?

A

The internet is a massive WAN that connects thousands of LANs and WANs together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an Intranet?

A

An Intranet is a group of LANs and WANs run by a single organization, and only accessed by members of that organization (Example, the network that doctors and nurses connect to at a hospital)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an Extranet?

A

An Extranet is an Intranet that members of the public have limited access to. (Example, Accessing your medical records through the My Health Portal login)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do LANS and WANs interconnect on the internet?

A

LANs connect to each other via WANs. They use routers to connect to other networks. WANs are connected via cabling, fiber or wireless transmissions. They talk to each other over the Internet through a cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a converged network?

A

A converged network is a network where multiple types of end devices all communicate. Converged networks share the same set of rules and standards to deliver voice, data and video over the same network infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe Fault Tolerance.

A

Fault tolerance pertains to limiting the amount of devices affected during a failure. (example. offering data multiple paths it can take. if one fails, it switches to the next until finding one that works)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe QoS (Quality of Service)

A

QoS. Making sure a network can handle the stress that it is presented, and operate at an acceptable speed. The main focus of QoS is prioritizing time sensitive traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe Scalability.

A

Scalability is the ability for a network to grow along with its user base. It must be able to take on new users and applications without disrupting current service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two main components of network security?

A

Network Infrastructure Security Hardware that prevents security breaches from occurring.

Network Information Security. Software that prevents security breaches from occurring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe Basic network infrastructure and core security (confidentiality, integrity, availability)

A

Confidentiality: Information must only be shared with people who are meant to see it.

Integrity: Data must not be altered on its way to its destination, and has to be in its original state on arrival

Availability: Timely access to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name some basic threats to a network.

A
Viruses
 Worms,
Trojan Horses
 Spyware
 Day Zero attacks ( attacks on the first few hours after a network goes live) 
DoS attacks (Denial of Service)
Identity theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name some basic security threat solutions.

A

Antivirus, antispyware, firewall filtering, access control lists, intrusion prevention systems, VPNS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between a Physical topology and a Logical topology?

A

Physical Topology: Illustrates the Physical locations of devices and physical connections between them (cabling diagrams)

Logical Topology: Shows the Logical connections between devices (IP addressing, ports, gateways)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the main purpose of the Cisco IOS?

A

Allows you to configure routers and switches directly

Allows you to set up a network that isn’t currently connected via directly plugging into devices with a console cable.

Allows you to directly communicate with devices using keyboard commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the features and functions of the Cisco IOS?

A

The Cisco IOS allows users to use keyboard commands to run CLI based networking programs and view outputs on a monitor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

From User exec mode, what commands would you have to enter to assign a hostname and MOTD to a switch?

A

enable
config t
hostname name
banner motd #motd#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What command has to be punched in after assigning a password to the console?

A

login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the command copy run start do in the CLI?

A

Copy’s the running configuration to the startup configuration. In the case of a power cycle, the device will start from this config.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What command encrypts all plain text passwords in the CLI?

A

service password-encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What ways can you access the Cisco IOS for configuration purposes?

A

Via console connection physically to a device via a console cable.

Secure Shell (SSH) In band method for remotely creating a secure CLI connection and virtual interface over a network.

Telnet. Unsecure In band connection to a virtual interface. Like SSH but does not provide a secure encrypted connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How do you access privileged exec mode in the CLI?

A

From User exec mode, type the “enable” command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which mode in the CLI is known as the “view only” mode?

A

User Exec. Enabled by pressing enter on connection to the CLI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What do devices need to communicate to each other across network media?

A

Devices need a unique IP address to distinguish between each other over a network.

26
Q

What are the basic rules of communication? How do they apply to a network?

A

The message must have an identified sender and receiver

The message must be written in common language and grammar.

The message must be sent in a timely manner.

The message must be confirmed or received at the destination.

27
Q

What is the role of Ethernet and wireless protocols?

A

Ethernet and wireless protocols govern the physical connections between the media and the network.

28
Q

What is the role of DHCP and IPV6 protocols?

A

IPv6 protocols provide IP addressing information, tells the device where to send packets over the network (basically the same as IPv4).

DHCP gives information when a device doesn’t know the name of the end device, but knows the IP address.

29
Q

What is the role of the TCP protocol?

A

TCP is a protocol used to ensure reliability, and to make sure packets arrive at their destination. If a packet fails to reach its destination, TCP will resend it.

30
Q

Define message encoding and decoding.

A

Encoding is when a message is converted into another acceptable form of transmission.

When the message reaches its destination, it is decoded back into its original format.

31
Q

Define message formatting

A

Specific message types have to stick to formatting rules depending on the type of message. Compare it to sending a letter. If the formatting of the address on the front of the envelope is incorrect, the letter will never arrive.

32
Q

Define Message Size in networking.

A

When a message is large, it has to be broken into smaller pieces to be sent over the network. These pieces need to be numbered and sent in a sequence to make sure they are put back together correctly at the destination.

33
Q

What are the main components of message timing?

A

Flow control. Controls the speed messages are sent over the network. If messages are sent too fast, they can not be read by the destination device.

Response timeout, When a message is sent, if there is no response in a certain period of time, the message will time out. The acceptable amount of time before the message is terminated is defined by network protocols.

Access method. Controls when messages can be sent to avoid collisions.

34
Q

What is the difference between broadcast, unicast and multicast?

A

Broadcast, a message is sent to all end devices on a network.

Multicast, a message is sent to specific end devices on a network.

Unicast, a message is sent from one end device to only one other end device.

35
Q

Define data encapsulation and decapsulation.

A

Data encapsulation is the process of breaking down larger files into smaller pieces and adding protocol information as it traverses over the network.

Decapsulation is putting the pieces back together once it reaches its destination.

36
Q

Name the layers of the OSI model and the term associated with the data at each layer.

A
Physical Layer - Bits.
Data Link Layer - Frames
Network Layer - Packets
Transport Layer - Segments
Session Layer - Data 
Presentation Layer - Data 
Application layer - Data
37
Q

Name the layers of the TCP/IP model.

A

Application Layer
Transport Layer
Network Layer
Network Interface Layer.

38
Q

What differentiates the TCP/IP and OSI model?

A

The OSI model is outdated and wasn’t created with the internet in mind. It is not practically used anymore and instead is used more as an outline.

39
Q

Which organization created the OSI model?

A

The International Organization for Standardization (IISO)

40
Q

What is sequencing and how is it used during the encapsulation process?

A

Sequencing is the process of numbering each packet after it has been broken down during the encapsulation process. This occurs during the data link layer.

It is used to make sure that when packets arrive at their destination, they are decapsulated back into the correct spots.

41
Q

What is the difference between a logical and physical addresses?`

A

Logical Addresses are dynamic IP addresses. They are responsible for delivering the IP packet from source to destination

Physical addresses or MAC addresses are burnt into devices and each one is unique to the media. Responsible for delivering the data link frame from one NIC to another NIC on the same network.

42
Q

What does NIC stand for?

A

Network Interface Card

43
Q

Name some of the general characteristics of Physical Layer Protocols.

A

The physical layer is responsible for PHYSICALLY connecting devices together.
The 3 main characteristics are:
Physical Components
Encoding
Signaling
The main physical layer device is the router.

44
Q

Name some of the organizations that govern the Physical layer.

A

ISO, TIA/EIA, ITU, ANSI, IEEE, regional organizations like the FCC in the US and the CSA in Canada.

45
Q

Describe Encoding.

A

Encoding is the method of turning streamed data bits into a predefined code. Codes are groupings of bits that can be understood by both the sender and the receiver.

46
Q

Describe Signaling

A

Signaling is when the physical layer generates signals that are converted into an understandable code.

The main methods of signaling are electronic, optical and wireless.

Physical layer standards define what signals stand for 1s and 0s.

Ex. The length of an electronic pulse is what defines it as 1 or 0. A longer pulse could mean a 1 and a short pulse could mean a 0.

47
Q

Define bandwidth, goodput, throughput and latency.

A

Bandwidth is the capacity that media can carry across a network. Better bandwidth = higher speeds.

Latency, the amount of time including delay that data takes to travel

Throughput. Measure of the transfer of bits over a period of time.

Goodput. Measure of usable data transferred over a given period of time.

48
Q

What are the main functions of the LLC and MAC sublayers?

A

LLC sublayer. Operates on IEEE 802.2. Communicates between the networking software at the upper layers and the device hardware at the lower layers.

MAC sublayer. Operates on IEEE 802.11. Responsible for data encapsulation and media access control.

49
Q

What does the MAC sublayer control?

A

Frame Delimiting. Provides identifying delimiters for fields within a frame.

Addressing. Provides source and destination addressing to the frame.

Error detection. Detects transmission errors in a frame.

50
Q

Describe the header of the Data Link Frame.

A

The header identifies the Frame start (beginning limit of the frame) the addressing (source and destination information) the type of frame (Identifies the layer 3 protocol) and the control (identifies special flow control services)

51
Q

Describe the data portion of the Data Link Frame

A

The data contains the payload of information the frame is attempting to transfer.

52
Q

Describe the trailer of the Data Link Frame.

A

The main function of the trailer is error detection. It also includes the frame stop which identifies the end limit of the frame.

53
Q

Describe the process of Ethernet (data) encapsulation.

A

Ethernet is a combination of both the Data Link and the Physical layers of the OSI model.
Ethernet frames contain both the source and destination MAC addresses, which is the burned in physical address of a media. The ethernet layer also consists of a Frame Check Sequence (FCS) which is used for error detection.

54
Q

Describe a MAC address.

A

A MAC address is a 48-bit binary string condensed into a 12 bit hex code.

MAC addressing provides device specific addressing in the data link layer. All MAC addresses must be unique to the Ethernet device.

55
Q

What is the purpose of an OUI?

A

When an ethernet device is created, it has to register to the IEEE and obtain a 6 digit hex code. This unique code is known as the Organizationally Unique Identifier (OUI)

56
Q

What is the format for Unicast, Broadcast and Multicast MAC addresses?

A

Broadcast: FF.FF.FF.FF.FF.FF Floods out all ports and is sent to all devices on a network.

Unicast. The source MAC address of a device.

Multicast. If the destination is an IPv4 Address, the reserved destination MAC is 01-00-5E. When it is IPv6 the destination MAC is 33-33. It is flooded out all ports except for the incoming port. Can only be used as a destination address, the source address still has to be unicast.

57
Q

Describe the store-and-forward switching method.

A

Store and forward receives the entire frame and computes the CRC. This performs error detection on the frame, and drops it if transmission errors are detected.

58
Q

Describe the fast-forward switching method.

A

Fast-Forward switching has the lowest latency of all forwarding methods. The packet is immediately forwarded after reading the addressing information.

Because fast-forward switching uses no error detection, if a frame contains an error the NIC has to discard the faulty packet on arrival.

59
Q

Describe the fragment-free switching method.

A

Fragment-Free Switching is the middle ground between Fast-Forward and Store-and-Forward. An error check is performed on the first 64 bytes of a frame before forwarding. Most collisions occur in these first bytes of a frame.

60
Q

What is the purpose of a CAM table?

A

A CAM table stores MAC addressing information on a switch. It uses this table to make forwarding decisions. When it hasn’t seen a MAC address before, it stores the address in the CAM table.