Section 14: Network Configurations Flashcards

OBJ 2.1, 2.5, 2.6

1
Q

TCP/IP

A

Transmission Control Protocol / Internet Protocol Suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Link/Network Interface Layer

A

Responsible for putting frames in the physical network’s transmission media
Media could be twisted pair cable, fiber optic, or radio waves
In this layer, data can only travel through the LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internet Layer

A

“Where to send those packets”
Used to address packets and route them across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Transport Layer

A

“How to send the packets”
Shows how to send the packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Application Layer

A

Contains all the protocols that perform higher level functions, such as email, file transfers, encryption, and others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Transmission Control Protocol (TCP)

A

can have a connection oriented method of sending packets but slower than UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

User Datagram Protocol (UDP)

A

connectionless protocol with lower overhead so its faster than TCP, but the delivery is not guaranteed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layers of TCP/IP

A
  1. Application Layer : what to do with the data
    3.Transport Layer: how to send the data (TCP or UDP)
  2. Internet Layer: where to send the data
  3. Link/Network Interface Layer: sends data across the LAN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Internet Protocol version 4 (IPv4)

A

formed out of 4 numbers (each called an octet), in a dotted-decimal notation from 0-255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Subnet Mask

A

Formatted like an IPv4 address.
A portion is the network bits, other portion is the host bits

Example:
192.168. 1 .4
192.168. 1 .50
255.255.255.0
Because the first 3 octets in the subnet mask are 255, it tells us the last octet contains the host bit for the IPv4 addresses, so 1 and 50 are the host bits. That means they are on the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IPv4 Classes

A

To identify the class for a IPv4, look at the first octet

Class| 1st Octet | Default Subnet Mask | Possible Hosts
___________________________________________________________
A | 1-127 | 255.255.255.0 N.H.H.H | 16.7 million (256^3)
B | 128-191 | 255.255.0.0 N.N.H.H | 65,536 (256^2)
C | 192-223 | 255.255.255.0 N.N.N.H | 256
D | 224-239 | N/A Multicast Address | N/A
E | 240-255 | N/A R&D purposes | 268 million

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multicast Address

A

A logical identifier for a group of hosts in a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Classful Mask

A

Default subnet mask for a given class of IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Classless Inter-Domain Routing (CIDR)

A

Allows for borrowing some of the host bits and reassigning them to the network portion

CIDR Notation:
The number of consecutive 1s
192.168.1.4 255.255.255.0 -> 192.168.1.4/24
192.168.1.4 255.255.255.192 -> 192.168.1.4/26
24 turns into 26 because 2 bits borrowed from host bits

CIDR Notation for classes:
A: /8
B: /16
C: /24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Subnetting

A

Allows you to use a classless subnet mask to create smaller networks with fewer hosts in each of those networks than you could if you had a classful subnet mask by itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Public IP (Routable)

A

Can be accessed over the internet and is assigned to the network by an ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Private IP (Non-routable)

A

Can be used by anyone any time, but only within their own LANs
Start with either 10, 172, or 192

A | 10 | 10.0.0.0 - 10.255.255.255 | 16.7 million
B | 172.16-172.31 | 172.16.0.0 - 172.31.255.255 | 1.05 million
C | 192.168 | 192.168.0.0 - 192.168.255.255 | 65,536

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network Address Translation (NAT)

A

allows for routing of private IPs through a public IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Loopback Address (127.0.0.1)

A

Creates a loopback to the host and is often used in troubleshooting and testing network protocols on a system
All IPs in the range of 127.0.0.0 to 127.255.255.255 are loopback addresses
localhost always resolves to 127.0.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Automatic Private IP Addresses (APIPA)

A

Used when a device does not have a static IP address or cannot reach a DHCP server
Looks like 192.254.x.x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Static Assignment

A

Manually type the IP address for the host, its subnet mask, default gateway, and DNS server
Impractical on large scale intranets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Dynamic Assignment

A

Dynamic allocation of IP addresses
Done automatically by the network’s DHCP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Domain Name System (DNS)

A

Used to convert human readable web addresses into machine readable IP addresses
The internet’s version of a phone book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Windows Internet Name Service (WINS)

A

Identifies NETBIOS systems on a TCP/IP network and converts those NETBIOS names to IP addresses
Used in LANs, like a DNS but only works in a Windows domain system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Bootstrap Protocol (BOOTP)
Dynamically assigns IP addresses and allows a workstation to load a copy of boot image to network Oldest system When a client booted up their system, it would send its MAC address to the server and it would receive its preassigned IP address
26
Dynamic Host Configuration Protocol (DHCP)
Assigns an IP based on an assignable scope or addresses and provides the ability to configure other options Each IP is leased for a period of time and returns to the pool when the lease expires Automatically configures the IP address, subnet mask, default gateway, and DNS/WINS server. Eliminates configuration errors
27
Zero Configuration (ZeroConf)
New technology that provides the same functionality as APIPA but has more features, such as: Assigning an IPv4 link-local address, a form of non-local IP, but can now resolve computer names to IP addresses without the need for DNS using mDNS (multicast DNS). It can also perform service discovery on the network to find systems available for use. Bonjour on Apple Link-Local Multicast Name Resolution (LLMNR) on Windows SystemD on Linux
28
Scope
list of valid IP addresses available for assignment or lease to a client computer or endpoint device on a given subnet
29
DHCP Reservation
excludes some IP addresses from being handed to devices unless they meet a certain condition
30
DHCP steps
D-O-R-A Discover an IP address Offer an address from a scope Request to take the IP Acknowledge the IP will be taken
31
Fully-Qualified Domain Name (FQDN)
Domain name under a top-level provider (service).(domain name).(top level domain) www.diontraining.com ftp.diontraining.com
32
DNS Heirarchy
Root: Answers requests in the root zone Top-Level Domain: ex: .uk .com .net Second-Level domain: ex: diontraining Subdomain: ex: support.diontraining.com Host: refers toa specific machine server
33
Uniform Resource Locator (URL)
contains the FQDN with the method of accessing information
34
DNS Records
DNS Record | Description | Function --------------------------------------------------------------- A | Address | Links a hostname to an IPv4 address AAAA | Address | Links a hostname to an IPv6 address CNAME| Canonical Name| Points a domain to another domain or subdomain MX | Mail Exchange | Directs emails to a mail server TXT | Text | Adds text into the DNS NS | Nameserver | Indicates which DNS nameserver has the authority
35
Sender Policy Framework (SPF)
DNS record that identifies the host authorized to send mail for the domain
36
DomainKeys Identified Mail (DKIM)
Provides the cryptographic authentication mechanism for mail using a public key published as a DNS record
37
Domain-based Message Authentication, Reporting & Conformance (DMARC)
Framework that is used for proper application of SPF and DKIM, utilizing a policy that's published as a DNS record can use SPF or DKIM or both
38
Nameserver
Type of DNS server that stores all the DNS records for a given domain
39
Internal DNS
allows cloud instances on the same network to access each other using internal DNS names
40
External DNS
Records created around the domain names from a central authority and used on the public internet
41
Time to Live (TTL)
tells the DNS resolver how long to cache a query before requesting a new one basically telling a computer how long to remember a DNS record before requesting it again
42
DNS Resolver/DNS Cache
Makes a local copy of every DNS entry it resolves when connecting to websites
43
Recursive Lookup
DNS server communicates with several other DNS servers to hunt down the IP address and return it to the client
44
Iterative Lookup
Each DNS server responds directly to the client with a DNS server that may have the correct IP address
45
Virtual Local Area Network (VLAN)
Allows different logical networks to share the same physical hardware and provides added security and efficiency
46
VLAN Trunking (802.1q)
Multiple VLANs transmitted over the same physical cable Each VLAN is identified using a 4 byte identifier
47
4-byte Identifier
Tag Protocol Identifier (TPI) Tag Control Identifier (TCI)
48
Virtual Private Network (VPN)
Extends a private network across a public network and enables sending and receiving data across shared or public networks Site to site: connect two offices together Client to site: connect a remote user to a corporate network Clientless: used for web browsing
49
Full Tunnel VPN
Better security Routes and encrypts all network requests through the VPN connection back to the headquarters
50
Split Tunnel VPN
Better performance Routes and encrypts only the traffic bound for the headquarters over the VPN, and sends the rest of the traffic to the regular internet
51
Clientless VPN
Creates a secure remote-access VPN tunnel using a web browser without requiring a software or hardware client
52
Secure Socket Layer (SSL)
provides cryptography and reliability using the upper layers of the OSI model (Layers 5, 6, 7)
53
Transport Layer Security (TLS)
provides secure web browsing over HTTPS
54
Address Exhaustion
Running out of network addresses in IPv4
55
IPv6
Larger address space Removes IPv4's broadcast data flow type No packet or datagram fragmentation Simplified header Uses hexadecimal digits to allow the use of shorthand notation made up of eight segments separated by a colon
56
Dual Stack
simultaneously runs both the IPv4 and IPv6 protocols on the same network devices
57
Tunneling
Allows an existing IPv4 router to carry IPv6 traffic
58
Unicast Addresses
Used to identify a single interface Globally-routed: similar to IPv4's unicast Class A, B, and C addresses and beings with 2000-3fff Link-local: Used like a private IP in IPv4 that can only be used on the LAN and begins with FE80
59
Stateless Address Autoconfiguration (SLAAC)
Eliminates the need to obtain addresses or other config information from a central server Uses a process called Extended Unique Identifier (EUI) to allow a host to assign itself a unique 64-bit IPv6 interface identifier called a EUI-64
60
Multicast Addresses
Used to identify a set of interfaces and begins with FF
61
Anycast Address
Used to identify a set of interfaces so that a packet can be sent to any member of a set
62
DHCPv6 Protocol
Allows DHCP to automatically assign addresses from a DHCPv6 server
63
Neighbor Discovery Protocol
Used to determine the Layer 2 addresses (MAC addresses) that are on a given network