week 2 networking Flashcards

(90 cards)

1
Q

sneakernet

A

moved the file by putting it on a disk and then moving that disk into another system (no network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

xerox invented first ethernot

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.3

A

ethernet commite thjat controls the ethernet standard still today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.3i

A

10mbps ethernet usuing twisted pair cableing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.3ab

A

gigabit ehernet over twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

802.3by

A

25 Gigabit Ethernet over fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

sending computers can resend damaged frames

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

preamble

A

a 7-byte series of alternating ones and zeroes followed by a 1-byte start frame
delimiter, always precedes a frame. The preamble gives a receiving NIC time to realize a
frame is coming and to know exactly where the frame starts. The preamble is added by
the sending NIC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PAD

A

a frame has minnimum 64 bits of data if smaller the frame will (pad) the shortage with data too hit the 64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

frame check sequence

A

enables ethernet nodes to recognize when bad things happen too good data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CRC

A

cyclic redundancy chek

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

cycle redundancy check

A

a mathmatical equation that has to nequal from the sent machine and reciving maching optherwise the frame is dropped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

baseband

A

the cable only carries one type of signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what cable did 10BaseT use ?

A

unshielded twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

10BaseT summary

A
  • Speed 10 Mbps
  • Signal type Baseband
  • Distance 100 meters between the hub and the node
  • Node limit No more than 1024 nodes per hub
  • Topology Star-bus topology: physical star, logical bus
  • Cable type Cat 3 or better UTP cabling with RJ-45 connector
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how does fiber optic send data?

A

puleses of light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

10BaseFL

A

fiber optics cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

10BaseFL summary

A
  • Speed 10 Mbps
  • Signal type Baseband
  • Distance 2000 meters between the hub and the node
  • Node limit No more than 1024 nodes per hub
  • Topology Star-bus topology: physical star, logical bus
  • Cable type Multimode fiber-optic cabling with ST or SC connectors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what does a media converter do?

A

connects different ethernet types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

csma/cd

A

carrier sense mutiopple access/ collision detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

carrier sense

A

each node usuing the network examines thew cable before sending a data frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

EXAM TIP CSMA/CD is a network access method that maps to the IEEE 802.3
standard for Ethernet networks.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

mutiple access means

A

all machines have equal access otoo the wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what happens if there is a collision?

A

both senders know that a collision ahppend they will wait arandom amount of tinme and check if the cable is free before resending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
EXAM TIP Adding another hub or two to an early Ethernet network enabled you to add more devices, but also compounded the problem with collisions. In such a scenario, you could connect networks using a bridge. A bridge acted like a repeater to connect two networks, but then went a step further—filtering and forwarding traffic between those segments based on the MAC addresses of the computers on those segments. This placement between two segments preserved bandwidth, making larger Ethernet networks possible. You’ll see the term “bridge” applied to modern devices, primarily in wireless networking. The interconnectedness of network segments is similar, but the devices are fundamentally different. See Chapter 14 for the scoop on wireless.
26
switch
come with extra smarts that enable them to take advantage of MAC addresses, effectively creating point-to-point connections between two conversing computers.
27
SAT
Source ADDRESS TABLE
28
once a switch gets an address what does it do
ity stores the address in the source address table
29
EXAM TIP One classic difference between a hub and a switch is in the repeating of frames during normal use. Although it’s true that switches initially forward all frames, they filter by MAC address in regular use. Hubs never learned and always forwarded all frames.
30
what happens when 2 computers connect too a switch at the same time?
Each port on a switch is in its own collision domain, plus the switch can buffer incoming frames. That means that two nodes connected to the switch can send data at the same time and the switch will handle it without any collision.
31
uplink port
enables the connection of 2 swqitches usuing straight through cable
32
bridging lopp[s or switching loops
redudent connections between switches on a network
33
STP
spanning trree proocal
34
spanning tree protocal
sensinsin loops before they hapopen
35
BPDU
Bridge protocal data units
36
Bridge protocal data units
switches communicate with other switches too stop bridges from happening
37
VPN
Virtual private network
38
virtual private network
l standards use encrypted tunnels between a computer or a remote network and a private network through the Internet
39
endpoints
the end of the tunnel where data is encrypted and decrypted
40
vpn creatyes a virual nic on your system to make a connection with the other network which gratns 2 ipv4 addresses
41
PPP
Point to Point Protocoal
42
RRAS
Routing and Remote access server
43
how to set up a virual connection
On the Windows client side, you run Add a VPN connection in Settings in the Control Panel. (With older versions of Windows, you’d run the Create a new connection option in the Network and Sharing Center applet.) This creates a virtual NIC that, like any other NIC, does a DHCP query and gets an IP address from the DHCP server on the private network (Figure 11-5)
44
When your computer connects to the RRAS server on the private network, PPTP creates a secure tunnel through the Internet to the private LAN
45
l2tp
layer 2 tunneling protocol
46
vpn concectrator
a vpn capable router
47
site to site vpn connection
two local lans connecting as one single network
48
ifference between l2tp and pptp l2tp has no encrytpion
l2tp has no encryption
49
ssl vpn
dont require client software
50
what are the 2 different types of ssl vpns
ssl portal and ssl tunnel
51
ssl portal vpn
clien gains access too anything on that webpage
52
ssl tunnel vpns
creates a more typical hos to site connectino
53
dtls vpn
datagram tls vp
54
datagram tls vpn
optimize connection for delay sensative applications
55
dmvpn
dynamic multipoint vpn
56
dynamic multipoint vpn
direct vpn connection between multiple locations
57
managed switching
have programming and logic to handle switching security and more
58
3 ways to connect to a mangaed switch
Directly plug into a serial interface and use a virtual terminal program to connect to a command-line interface. * Get the switch on the network and then use a virtual terminal over SSH to connect to the same command-line interface. * Get the switch on the network and use the switch’s built-in Web interface
59
how to connect to a manged switch
First, many managed switches have a special serial port called a console port. Plug a laptop into the console port on the back of the switch (Figure 11-7). Then, run a terminal program like PuTTY to access the command-line interface on the switch. As long as you speak the language of the switch’s command prompt, you’re good to go. It’s very common to use a console port for initial configuration of a new managed switch. The second and third methods require the managed switch to be connected to the network and have an accessible IP address. Connect to the switch over the network and run some sort of software—either PuTTY or a Web browser—to manage the switch.
60
A managed switch enables you to configure every port on the switch in a lot of different ways, depending on the purpose and complexity of the switch. For example, it’s easy to set the speed and duplexing of a port to match the client.
61
You configure a default gateway on a switch by telling the switch the IP address of the router. For most implementations, type in the IP address of your Internet connection box, such as a fiber-optic or cable modem
62
managment port
a port soley for doing interface configuration
63
EXAM TIP You’ll find out-of-band management options—management URL, modem connection, console port—on switches and on routers. CompTIA uses the term console router to describe a router with out-of-band management capabilitie
64
vlan
virtual local are network
65
virtual lan
allows you too segment a phyusical network into mutiple discreet networks without additional hardware.
66
setup a vla and then assign ports to those vlans and have computers access it through those ports
67
trunking
the proccess of transferring vlan traffic between two or more switches
68
EXAM TIP Expect a question or two on segmentation and interface properties of VLANs and 802.1Q. These will ask you about what each accomplishes and perhaps how a configuration screen should function.
69
NOTE VLANs based on ports are the most common type of VLAN and are commonly known as static VLANs. VLANs based on MAC addresses are called dynamic VLANs. The latter method is never used these days
70
tagging
assins the traffic with the approrpriate vlans when frames enter the switch
71
EXAM TIP Expect a question or two on the CompTIA Network+ exam that checks your knowledge of tagging and untagging ports on VLAN switches. Also, you’ll get a question on why you would want to change a native VLAN (to mitigate against double-tagging attacks).
72
vlan tp
vlantrunking protocol
73
vlan trunking protocol
autotmate the updating of multiple vlan switches
74
NOTE VTP offers VTP pruning, a tool for minimizing broadcast traffic. This can be a very useful tool on larger-scale networks.
75
NOTE Clients can update servers the same way servers update clients. The difference is that VLAN information can only be changed on servers.
76
intervlan routing
te use ofa switch in order to make a router work between 2 or more vlans
77
router on a sitck configuration
used a single router interface to connefct to mutiple vlans on a switch
78
layer 2 switch fowards based on
mac address
79
layer 3 switch fowards based on
i.p address
80
NOTE Any device that works at multiple layers of the OSI seven-layer model, providing more than a single service, is called a multifunction network device.
81
load balencing
making a buch of servers look like a single server
82
traffic shapping
control the flow of packets in and out off your network
83
traffic shapping
control the flow of packets in and out off your network
84
EXAM TIP Several companies enable signature management in the cloud, to help monitor and protect network traffic from malicious code, picking out known and suspect malware signatures with continuously updating definition files. Check out www.threatconnect.com for a prototypical example. And look for a signature management question on the CompTIA Network+ exam.
85
EXAM TIP The CompTIA Network+ exam can refer to an IDS system by either its location on the network—thus NIDS or HIDS—or by what the IDS system does in each location. The network-based IDS scans using signature files, thus it is a signature-based IDS. A host-based IDS watches for suspicious behavior on systems, thus it is a behavior-based IDS
86
EXAM TIP Expect a question on the appropriate placement of a multilayer switch such as an IPS or IDS within a network. This tackles the differences among HIDS, NIDS, HIPS, and NIPS. Some of these devices might have routing functions as well as switching functions, so be prepared for either word to be used in the description.
87
port mirroring
copy all daya on a swithc too a physical port
88
proxy server
takes reques from client and makes them itsellf to the external server
89
NOTE If a proxy server caches a Web page, how does it know if the cache accurately reflects the real page? What if the real Web page was updated? In this case, a good proxy server uses querying tools to check the real Web page to update the cache.
90
reverse poroxy server
gets data from the servers and gives it too the clients the client only seees the prixyh serever