network

Card Set Information

Author:
philb72
ID:
82829
Filename:
network
Updated:
2011-05-03 20:39:11
Tags:
types networks
Folders:

Description:
networks
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user philb72 on FreezingBlue Flashcards. What would you like to do?


  1. What is a network?
    A network is created when you have two or more hosts connected together so that they can communicate and share resources.

    • A host can be any device which has a "network interface" which alows it to connect to other devices on a network.
    • Some examples of resources which can be shared are documents and printers
  2. What are some different type of Networks?
    LAN - Local Area NetworkTypically refers to a network contained within a building


    • WAN - Wide area Network
    • A network spread over a wide area, typically covering multiple cities and countries


    • CAN - Campus Area Network
    • A network spread betweeen multiple contiguous buildings.
  3. How do we make connections?
    Network hosts communicate with each other by sending bits of information across network media.

    Network media can be wired or wireless.

    Examples of wired media are copper and fiber optic.

    Examples of wireless media are RF and infra-red.
  4. What is a Protocol?
    A protocol is a set of rules and procedures for communication.

    In order for hosts to communicate on a network they must agree to use a common set of rules and procedures or in other words, must use the same network protocol.

    Some of the common network protocols used today are TCP/IP, IPX/SPX, NETBEUI, and appletalk.
  5. Introduction to Addressing
    All hosts on a network must be identified with an address on that network.

    Addressing in computer networks is similar to how addressing works with the postal network or telephone network.

    The most typical types of addresses used in computer networking are MAC addresses and IP addresses.

    There are both provate and public forms of addressing.

    - Private addressing is used to keep communications safe within the boundaries of a private secure network.

    - Public addressing is used to allow communications with the outside world, most typically known as the internet.
  6. Wired Media
    • CAT3
    • Unshielded twisted pair capable of speeds up to 10Mbit/s. Used with 10Base-T, 100Base-T4, and 100Base-T2 Ethernet.

    • CAT4
    • Unshielded twisted pair capable of speeds up to 20Mbit/s. Not widely used. Used with 10Base-T, 100Base-T4, and 100Base-T2 Ethernet.

    • CAT5
    • Unshielded twisted pair capable of speeds up to 100Mbit/s. May be used with 10Base-T, 100Base-T4, 100Base-T2, and 100Base-TX Ethernet.

    • CAT5e
    • Enhanced Cat 5 is similar to CAT5, but exceeds its performance. Improved distance over previous categories from 100m to 350m. May be used for 10Base-T, 100Base-T4, 100Base-T2, 100BaseTX and 1000Base-T Ethernet.

    • CAT6
    • Can transmit data up to 220m at gigabit speeds. It has improved specifications for NEXT (Near End Cross Talk), PSELFEXT (Power Sum Equal Level Far End Cross Talk), and Attenuation. Cat 6 is backward compatible with lower Category grades and supports the same Ethernet standards as Cat 5e.

    • Multimode Fiber
    • Multimode fibers have large cores. They are able to carry more data than single mode fibers though They are best for shorter distances because of their higher attenuation levels.

    • Single Mode Fiber
    • Single Mode fibers have a small glass core. Single Mode fibers are used for high speed data transmission over long distances. They are less susceptible to attenuation than multimode fibers.

    • RG59 and RG6
    • These are both shielded coaxial cables used for broadband networking, cable television, and other uses.

    • Serial
    • A serial cable is a cable that can be used to transfer information between two devices using serial communication, often using the RS-232 standard.

    Typically use D-subminiature connectors with 9 or 25 pins. Cables are often unshielded, although shielding cables may reduce electrical noise radiated
  7. Wired Media - Twisted Pair
    • CAT3: 10 Mbps
    • CAT5: 100 Mbps
    • CAT5e: 1000 Mbps
    • CAT6: 1000 Mbps

    All categories can travel up to 100 meters before suffering from decrease in sgnal.

    • UTP: Unshielded Twisted Pair
    • - Susceptible to EMI

    • STP: Shielded Twisted Pair
    • - Differs from UTP in that it has a foil jacket that helps prevent cross talk. Cross talk is signal overflow wire.
    • - Uses an RJ45 connector
  8. What is Plenum?
    • An enclosed space used for airflow.
    • Usually thought of as the space above a drop ceiling or below a raised floor.

    Plenum grade cable should always be used in a plenum space.
  9. LAN Technology Types-Ethernet
    Ethernet is known as the 802.3 standard.

    Ethernet uses the CSMA/CD access method

    Ethernet is the most widely-installed local area network ( LAN) technology.Specified in a standard, IEEE 802.3.Early ethernet networks uses coaxial connections.

    The most common types currently use twisted pair cabling, however, fiber optic cabling is becoming much more common as standards and speeds increase.
  10. LAN Technology Types
    CSMA/CD (Carrier Sense Multiple Access with Collision Detection)

    In the early days of ethernet, when two hosts would send packets at the same time, a collision would occur.

    A standard had to be created that would have the hosts follow rules relating to when they could send data and when they could not.

    This standard is Carrier Sense Multiple Access with Collision Detection, referred to as CSMA/CD.

    CSMA/CD forces computers to “listen” to the wire before sending in order to make sure that no other host on the wire is sending.

    If a collision is detected, both of the senders will send a jam signal over the Ethernet.

    This jam signal indicates to all other devices on the Ethernet segment that there has been a collision, and they should not send data onto the wire
  11. The TCP/IP Protocol Suite
    TCP/IP stands for the Transmission ControlProtocol/Internet Protocol.

    It is the basic communication protocol of the Internet.

    Although it was designed to be an Internet protocol, it can also be used as a communication protocol in a private network

    The TCP/IP architecture is based off the 4 layer DARPAmodel.

    Each layer of the DARPA model corresponds toone or more of the layers of the 7 layer OSI model.

    Each of the 4 layers have individual protocols which allwork together to form a protocol stack.
  12. Transport Layer Protocols
    TCP – Transmission Control Protocol

    • TCP breaks data into manageable packets and tracks information such as source and destination of packets. It is able to reroute packets and is responsible for guaranteed delivery of the data.
    • – Reliable Communication

    • UDP – User Datagram Protocol
    • A connectionless, datagram service that provides an unreliable, best-effort delivery.–Unreliable Communications.
  13. Internet Layer Protocols
    IP – Internet Protocol

    This is a connectionless protocol, which means that a session is not created before sending data.

    IP is responsible for addressing and routing of packets between computers.

    It does not guarantee delivery and does not give acknowledgement of packets that are lost or sent out of order as this is the responsibility of higher layer protocols such as TCP.

    • ARP – Address Resolution Protocol

    Provides IP-address to MAC address resolution for IP packets.

    A MAC address is your computer's unique hardware number and appears in the form 00-A0-F1-27-64-E1 (for example).

    Each computer stores an ARP cache of other computers ARP-IP combinations.
  14. Internet Layer Protocols continued..
    • ICMP – Internet Control Message Protocol
    • Internet Control Message Protocol enables systems on a TCP/IP network to share status and error information such as with the use of PING and TRACERT utilities.

    PING & TRACERT are used for diagnostic and error reporting

    • IGMP – Internet Group Management Protocol
    • Internet Group Management Protocol is used to manage Internet Protocol multicast groups.IP hosts and adjacent multicast routers use IGMP to establish multicast group memberships.IGMP is only needed for IPv4 networks, as multicast is handled differently in IPv6 networks.
  15. Working with IP Addresses
    • What is an IP Address?
    • A 32 bit address that is used to uniquely identify a computer on anetwork

    .–The Network ID portion of the IP Address identifies the networkwhere the computer sits.

    –The Host ID portion of the IP Address uniquely identifies th ecomputer on its network.

    Example:IP Address: 192.168.10.1Network ID Host ID
  16. Planning an IP Addressing Scheme
    How to Plan an IP Addressing Scheme

    –How many IP Addresses do you need today?

    –How many IP Addresses will you need in the future?

    • –Are you dealing with a pre-existing IP scheme?
  17. Rules for IP Addressing
    Each of the 4 numbers in an IP Address is called an octet (8bits).–192.168.10.101

    A bit is a 1 or a 0

    Each octet can only have a number from 0 to 255–00000000 = 0–11111111 = 255

    The first octet cannot be 127

    The 127 range has been reserved for diagnostics.

    127.0.0.1 is known as the loopback address. (It is sometimes also referred to as local host.)
  18. Rules for IP Addressing continued..
    • The Host ID cannot be all 0s or all 255s
    • –All 0s represents the Network ID
    • –All 255s is the broadcast address









    • File Name:



    Search Tags: (eg: french verbs er)Private:



    • Description:















































  19. Preview






      • What is a network?
      • A network is created when you have two or more hosts connected together so that they can communicate and share resources.

      • A host can be any device which has a "network interface" which alows it to connect to other devices on a network.
      • Some examples of resources which can be shared are documents and printers








      • What are some different type of Networks?
      • LAN - Local Area NetworkTypically refers to a network contained within a building


      • WAN - Wide area Network
      • A network spread over a wide area, typically covering multiple cities and countries


      • CAN - Campus Area Network
      • A network spread betweeen multiple contiguous buildings.








      • How do we make connections?
      • Network hosts communicate with each other by sending bits of information across network media.

      Network media can be wired or wireless.

      Examples of wired media are copper and fiber optic.

      Examples of wireless media are RF and infra-red.








      • What is a Protocol?
      • A protocol is a set of rules and procedures for communication.

      • In
      • order for hosts to communicate on a network they must agree to use a
      • common set of rules and procedures or in other words, must use the same
      • network protocol.

      Some of the common network protocols used today are TCP/IP, IPX/SPX, NETBEUI, and appletalk.








      • Introduction to Addressing
      • All hosts on a network must be identified with an address on that network.

      Addressing in computer networks is similar to how addressing works with the postal network or telephone network.

      The most typical types of addresses used in computer networking are MAC addresses and IP addresses.

      There are both provate and public forms of addressing.

      - Private addressing is used to keep communications safe within the boundaries of a private secure network.

      - Public addressing is used to allow communications with the outside world, most typically known as the internet.








      • Wired Media
      • CAT3
      • Unshielded twisted pair capable of speeds up to 10Mbit/s. Used with 10Base-T, 100Base-T4, and 100Base-T2 Ethernet.

      • CAT4
      • Unshielded twisted pair capable of speeds up to 20Mbit/s. Not widely used. Used with 10Base-T, 100Base-T4, and 100Base-T2 Ethernet.

      • CAT5
      • Unshielded twisted pair capable of speeds up to 100Mbit/s. May be used with 10Base-T, 100Base-T4, 100Base-T2, and 100Base-TX Ethernet.

      • CAT5e
      • Enhanced Cat 5 is similar to CAT5, but exceeds its performance. Improved distance over previous categories from 100m to 350m. May be used for 10Base-T, 100Base-T4, 100Base-T2, 100BaseTX and 1000Base-T Ethernet.

      • CAT6
      • Can transmit data up to 220m at gigabit speeds.
      • It has improved specifications for NEXT (Near End Cross Talk), PSELFEXT
      • (Power Sum Equal Level Far End Cross Talk), and Attenuation. Cat 6 is
      • backward compatible with lower Category grades and supports the same
      • Ethernet standards as Cat 5e.

      • Multimode Fiber
      • Multimode fibers have large cores. They are able to carry more data than single mode fibers though They are best for shorter distances because of their higher attenuation levels.

      • Single Mode Fiber
      • Single Mode fibers have a small glass core. Single Mode fibers are used for high speed data transmission over long distances. They are less susceptible to attenuation than multimode fibers.

      • RG59 and RG6
      • These are both shielded coaxial cables used for broadband networking, cable television, and other uses.

      • Serial
      • A
      • serial cable is a cable that can be used to transfer information
      • between two devices using serial communication, often using the RS-232
      • standard.

      • Typically use D-subminiature connectors with 9 or 25
      • pins. Cables are often unshielded, although shielding cables may reduce
      • electrical noise radiated








      • Wired Media - Twisted Pair
      • CAT3: 10 Mbps
      • CAT5: 100 Mbps
      • CAT5e: 1000 Mbps
      • CAT6: 1000 Mbps

      All categories can travel up to 100 meters before suffering from decrease in sgnal.

      • UTP: Unshielded Twisted Pair
      • - Susceptible to EMI

      • STP: Shielded Twisted Pair
      • - Differs from UTP in that it has a foil jacket that helps prevent cross talk. Cross talk is signal overflow wire.
      • - Uses an RJ45 connector








      • What is Plenum?
      • An enclosed space used for airflow.
      • Usually thought of as the space above a drop ceiling or below a raised floor.

      Plenum grade cable should always be used in a plenum space.








      • LAN Technology Types-Ethernet
      • Ethernet is known as the 802.3 standard.

      Ethernet uses the CSMA/CD access method

      • Ethernet
      • is the most widely-installed local area network ( LAN)
      • technology.Specified in a standard, IEEE 802.3.Early ethernet networks
      • uses coaxial connections.

      The most common types currently use twisted pair cabling, however, fiber optic cabling is becoming much more common as standards and speeds increase.








      • LAN Technology Types
      • CSMA/CD (Carrier Sense Multiple Access with Collision Detection)

      In the early days of ethernet, when two hosts would send packets at the same time, a collision would occur.

      • A
      • standard had to be created that would have the hosts follow rules
      • relating to when they could send data and when they could not.

      This standard is Carrier Sense Multiple Access with Collision Detection, referred to as CSMA/CD.

      CSMA/CD forces computers to “listen” to the wire before sending in order to make sure that no other host on the wire is sending.

      If a collision is detected, both of the senders will send a jam signal over the Ethernet.

      • This
      • jam signal indicates to all other devices on the Ethernet segment that
      • there has been a collision, and they should not send data onto the wire








      • The TCP/IP Protocol Suite
      • TCP/IP stands for the Transmission ControlProtocol/Internet Protocol.

      It is the basic communication protocol of the Internet.

      Although it was designed to be an Internet protocol, it can also be used as a communication protocol in a private network

      The TCP/IP architecture is based off the 4 layer DARPAmodel.

      Each layer of the DARPA model corresponds toone or more of the layers of the 7 layer OSI model.

      Each of the 4 layers have individual protocols which allwork together to form a protocol stack.








      • Transport Layer Protocols
      • TCP – Transmission Control Protocol

      • TCP
      • breaks data into manageable packets and tracks information such as
      • source and destination of packets. It is able to reroute packets and is
      • responsible for guaranteed delivery of the data.
      • – Reliable Communication

      • UDP – User Datagram Protocol
      • A connectionless, datagram service that provides an unreliable, best-effort delivery.–Unreliable Communications.








      • Internet Layer Protocols
      • IP – Internet Protocol

      This is a connectionless protocol, which means that a session is not created before sending data.

      IP is responsible for addressing and routing of packets between computers.

      • It
      • does not guarantee delivery and does not give acknowledgement of
      • packets that are lost or sent out of order as this is the responsibility
      • of higher layer protocols such as TCP.

      • ARP – Address Resolution Protocol

      Provides IP-address to MAC address resolution for IP packets.

      A MAC address is your computer's unique hardware number and appears in the form 00-A0-F1-27-64-E1 (for example).

      Each computer stores an ARP cache of other computers ARP-IP combinations.








      • Internet Layer Protocols continued..
      • ICMP – Internet Control Message Protocol
      • Internet
      • Control Message Protocol enables systems on a TCP/IP network to share
      • status and error information such as with the use of PING and TRACERT
      • utilities.

      PING & TRACERT are used for diagnostic and error reporting

      • IGMP – Internet Group Management Protocol
      • Internet
      • Group Management Protocol is used to manage Internet Protocol multicast
      • groups.IP hosts and adjacent multicast routers use IGMP to establish
      • multicast group memberships.IGMP is only needed for IPv4 networks, as
      • multicast is handled differently in IPv6 networks.








      • Working with IP Addresses
      • What is an IP Address?
      • A 32 bit address that is used to uniquely identify a computer on anetwork

      .–The Network ID portion of the IP Address identifies the networkwhere the computer sits.

      –The Host ID portion of the IP Address uniquely identifies th ecomputer on its network.

      Example:IP Address: 192.168.10.1Network ID Host ID








      • Planning an IP Addressing Scheme
      • How to Plan an IP Addressing Scheme

      –How many IP Addresses do you need today?

      –How many IP Addresses will you need in the future?

      • –Are you dealing with a pre-existing IP scheme?








      • Rules for IP Addressing
      • Each of the 4 numbers in an IP Address is called an octet (8bits).–192.168.10.101

      A bit is a 1 or a 0

      Each octet can only have a number from 0 to 255–00000000 = 0–11111111 = 255

      The first octet cannot be 127

      The 127 range has been reserved for diagnostics.

      127.0.0.1 is known as the loopback address. (It is sometimes also referred to as local host.)








      • Rules for IP Addressing continued..
      • The Host ID cannot be all 0s or all 255s
      • –All 0s represents the Network ID
      • –All 255s is the broadcast address

      • Example
      • –192.168.10.0 is a Network ID
      • –192.168.10.255 is the broadcast address for the 192.168.10.0 network.








      • What is Classful IP Addressing?
      • Originally IP Addresses where divided into different“class” ranges:
      • – A Class: 1 – 126 255.0.0.0
      • – B Class: 128 – 191 255.255.0.0
      • – C Class: 192 – 223 255.255.255.0
      • – D Class: 224 – 239 Multicast
      • – E Class: 240 – 243 Experimental

      • A Class – 126 Networks, 16,777,214 Hosts
      • B Class – 16,384 Networks, 65,534 Hosts
      • C Class – 2,097,152 Networks, 254 Hosts

      Total of 3,720,314,628 host addresses available








      • Private vs. Public IP Addressing
      • Private IP ranges which have been reserved from PublicInternet use:
      • – 10.0.0.0 – 10.255.255.255
      • – 172.16.0.0 – 172.31.255.255
      • – 192.168.0.0 – 192.168.255.255
      • – 169.254.0.0 – 169.254.255.255

      Hosts assigned private IP Addresses can get to the Internet through a technology called Network Address Translation (NAT)

      Most of today’s companies use private IP addresses on their private networks








      • What is NAT?
      • NAT stands for Network Address Translation and is acommonly used IP translation and mapping technology.

      • Using
      • a device (such as a router) or piece of software that implements NAT
      • allows an entire home or office network toshare a single internet
      • connection over a single IP address.

      A single cable modem, DSL modem, or even 56k modem could connect all the computers to the internet simultaneously.

      Additionally, NAT keeps your home network fairly securefrom hackers.

      NAT is built in to the most common Internet Connectionsharing technologies.








      • How Computers get IP Addresses
      • * Statically
      • * From a DHCP Server

      The Dynamic Host Configuration Protocol or (DCHP) is used for assigning dynamic IP addresses to devices on anetwork.

      • Using APIPA
      • Stands for Automatic Private Internet Protocol Addressing

      • Client
      • systems that are configured for automatic IP address assignment /
      • dynamic IP assignment will attempt to use DHCP to make a request for an
      • IP address lease for a given network.

      • When the DHCP server is
      • unavailable the service on the client will automatically configure the
      • system with an APIPA IP address in the 169.254.0.1 through
      • 169.254.255.254 address range with a subnet mask of 255.255.0.0








      • Internetworking
      • What is a Router?

      • A router is a device that forwards data packets along networks
      • A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP’s network.

      • Routers
      • are located at gateways, the places where two or more networks connect,
      • and are the critical device that keeps data flowing between networks
      • and keeps the networks connected to the Internet.

      • When data is
      • sent between locations on one network or from one network to a second
      • network the data is always seen and directed to the correct location by
      • the router.

      • They accomplish this by using headers and forwarding
      • tables to determine the best path for forwarding the data packets, and
      • the use protocols such as ICMP to communicate with each








      • What is a Default Gateway?
      • Computers can only communicate directly with other computerson the same network.

      The only way for a computer to communicate with a computeron a different network is through a router. (Internetworking)

      The Default Gateway represents the IP Address of a router thata computer uses to communicate outside of its network.








      • What is Subnetting?
      • Subnetting
      • is the process of taking a large network and dividing it into smaller
      • networks to increase efficiency and manageability.

      • IP addresses can be class A, B or C.
      • Class A addresses are for networks with a large number of hosts.

      The first octet is the netid and the 3 remaining octets are the hostid

      • Class
      • B addresses are used in medium to large networks.The first 2 octets
      • making up the netid and the remaining 2 are the hostid.

      • Class C
      • is for smaller networks.The first 3 octets making up the netid and the
      • last octet comprising the hostid. The Network ID and the Host ID are
      • determined by a subnet mask.








      • What if You Wanted More Than 1 Subnet?
      • Subnetting allows you to create multiple logical networks that exist within a single Class A, B, or C network.

      If you don't subnet, you will only be able to use one network from your Class A, B, or C network.

      • When
      • subnetting is employed, the multiple networks are connected with a
      • router which enables data to find its way between networks.On the client
      • side, a default gateway is assigned in the TCP/IP properties.

      • The
      • default gateway tells the client the IP address of the router that will
      • allow their computer to communicate with clients on other networks.








      • What is IPv4
      • Every IP address can be broken down into 2 parts, theNetwork ID(netid) and the Host ID(hostid).

      All hosts on the same network must have the same netid.

      • Disadvantages of IPv4
      • Not Enough Addresses• Cluttered the Internet Routing Tables• Difficult to Configure• Security is Optional

      Each of these hosts must have a hostid that is unique inrelation to the netid.

      IP addresses are divided into 4 octets with each having amaximum value of 255.

      We view IPv4 addresses in decimal notation such as124.35.62.181, but it is actually utilized as binary data.








      • What is IPv6
      • The
      • previous information on TCP/IP has referred to IPv4, however, this
      • addressing scheme has run out of available IP addresses due to the large
      • influx of internet users and expanding networks.

      As a result, the powers that be had to create a new addressing scheme to deal with this situation and developed IPv6.

      • This
      • new addressing scheme utilizes a 128 bit address (instead of 32) and
      • utilizes a hex numbering method in order to avoid long addresses such as
      • 132.64.34.26.64.156.143.57.1.3.7.44.122.111.201.5.

      The hex address format will appear in the form of 3FFE:B00:800:2::C as an example








      • IPv6 Solutions
      • Plenty of Addresses• Simplified the Internet Routing Tables• Easy and Automated Configuration• Security is Required








      • Types of IPv6 Addresses
      • Unicast (One to One)
      • Sending of information packets to a single network node.

      • This
      • type of network transmission is used where a private or unique resource
      • such as media servers are being requested for two way connections that
      • are needed to complete the network communication.

      • So in the media
      • server example, a client system may make the request for streaming
      • content from the single source and the responding system may leverage
      • unicast as part of the response to the session request to deliver the
      • content.
      • Multicast (One to Many)
      • Single source address responding to multiple destination addresses with information to be sent.

      • In
      • a media server example, the single source address may need to send the
      • data to multiple clients; it does this by sending the data with multiple
      • destination IP addresses.








      • Types of IPv6 Addresses continued...
      • Multicast (cont’d)

      All the clients that “see” this network traffic will check to see if it is meant for them with the supplied information.

      • If
      • it is not the client does not receive the data.If a network node does
      • see that the data is intended for them the device will respond by
      • receiving the packet.

      Broadcast

      • Traffic
      • sent out from a network node that will reach every other node on the
      • subnet / broadcast domain because the message is sent with the intent of
      • reaching all nodes.

      • The network node that is sending the
      • traffic will use the broadcast address for that subnet and every device
      • in that broadcast domain will receive the broadcast information.

      Generally the broadcast address is the last IP address of that segment.








      • FTP
      • The File Transfer Protocol provides connection oriented file transfer between a client and a server.

      • It
      • was originally used to transfer files between UNIX systems, and is now
      • the most popular file transfer protocol on the Internet.

      Must resolve host name to IP address to establish communication.

      It is connection oriented (i.e. verifies that packets reach destination).

      FTP uses TCP port 21 for control and TCP port 20 for datatransport.








      • TFTP
      • The Trivial File Transfer Protocol provides connectionless file transfer functions.

      TFTP is a simple and small protocol, which makes it suitable for transferring small amounts of data.

      It is primarily used for updating devices such as routers and switches.

      Another common use is transferring the data required to boot a diskless system over the network.

      TFTP uses UDP port 69.








      • HTTP
      • The
      • Hypertext Transfer Protocol was originally designed for transferring
      • World Wide Web documents and has been extended to transfer other types
      • of files as well.

      Its most common use is transferring web pages between a web browser and a web server.

      It is the protocol controlling the transfer and addressing of HTTP requests and responses.

      HTTP uses TCP port 80 by default








      • HTTPS
      • HTTPS is used in exactly the same way as the HTTP protocol.

      The difference is that HTTPS uses SSL (Secure Sockets Layer) to send data in an encrypted form and to authenticate the server.

      For example, when you buy something online using a credit card HTTPS uses TCP port 443 by default.








      • DHCP
      • The Dynamic Host Configuration Protocol is used for assigning dynamic IP addresses to devices on a network.

      • DHCP simplifies
      • network administration by keeping track of IP addresses in a database
      • rather than an administrator having to manage and assign them manually.

      • When
      • a client is configured to receive an IP address automatically, it will
      • send out a broadcast to the DHCP server requesting an address.

      The server will then issue a "lease" and assign it to that client. DHCP uses UDP ports 67 & 68.


      Benefits of DHCP

      Prevents users from making up their own IP addresses.

      Prevents incorrect gateway or subnet masks from being entered.

      Decreases amount of time spent configuring computers especially in environments where computers get moved around all the time.








      • DNS
      • The Domain Naming System is a standard name service thatallows your computer to register and resolve domain names.

      DNS uses TCP port 53 for zone transfers

      and UDP port 53 forlookups.








      • TELNET
      • Telnet is a terminal emulation protocol that allows remote access to a system.
      • Telnet
      • can also refer to software which can be used by a client to remotely
      • connect to and configure operating systems and network devices.

      Provides a virtual terminal or remote login across the network that is connection-based.

      The remote server must be running a Telnet service for clients to connect.

      Telnet uses TCP port 23








      • Bridges & Switches
      • Switch

      • Network
      • device that filters and forwards packets between LAN segments and
      • ensures that data goes straight from its origin to its proper
      • destination.

      Switches remember the address of every node on the network, and anticipate where data needs to go.

      • A
      • switch only operates with the computers on the same LAN.This reduces
      • competition for bandwidth between devices on the network.

      It isn't smart enough to send data out to the internet, or across a WAN. These functions require a router.


      Bridge

      Functions the same as a repeater, but can also divide a network in order to reduce traffic problems.

      • A
      • bridge can also connect unlike network segments (ie. token ring and
      • ethernet).Bridges create routing tables based on the source address.








      • Advanced Switch Functionality
      • Power over Ethernet (PoE) is used to transfer electricalpower, along with data, over standard twisted pair cable.

      The Spanning Tree Algorithm (STA) is used by switches to determine the best route when there is more than oneconnection to a node.

      Virtual LANs (VLANs) can be created in order to emulatemultiple broadcast domains using switches.

      Trunking is when a switch presents more than one VLANconfiguration over a single connection to another switch or a router.

      Port Mirroring is used to send a copy of network data to a second (mirrored) connection usually for the purposes of monitoring.

      Port Authentication is used to restrict access based uponauthentication information. Typically used in 802.1x network








      • Firewalls & Proxy Servers
      • Firewall

      Either a hardware or software entity (or a combination of both) that protects a network by stopping network traffic from passing through it.

      • In
      • most cases, a firewall is placed on the network to allow all internal
      • traffic to leave the network (email to the outside world, web access,
      • etc.), but stop unwanted traffic from the outside world from entering
      • the internal network.

      This is achieved by granting and denying access to resources based on a set of configurable rules, Firewalls are used to protect private networks from external intrusion.

      Firewalls can control what data is allowed in or out of a network.Firewalls can be created with hardware or software.

      Proxy Servers

      • A
      • proxy server acts as a middle-man between clients and the Internet
      • providing security, administrative control, and caching services.

      • When
      • a user makes a request for an internet service and it passes filtering
      • requirements, the proxy server looks in its local cache of previously
      • downloaded web pages

      If the item is found in cache, the proxy server forwards it to the client. This reduces bandwidth through the gateway.

      If the page is not in the cache, the proxy server will request the page from the appropriate server.

      Nowadays, the functions of proxy servers are often built into firewalls.

      Serves 3 main purposes

      – Disguise an end users actual identity using NAT

      – Cache requests to save bandwidth

      – Control content permitted to be requested fromthe Internet








      • Load Balancer & Bandwidth Shaper
      • Load Balancer

      A load balancer is a hardware and/or software solution that provides load balancing services.

      • Load
      • balancing is used to distribute workloads evenly across two or more
      • computers, network links, CPUs, hard drives, or other resources, in
      • order to get optimal resource utilization, maximize throughput, minimize
      • response time, and avoid overload.

      Using multiple components with load balancing, instead of a single component, may increase reliability through redundancy.

      Bandwidth Shaper

      Describes the mechanisms used to control bandwidth usage on the network.

      Bandwidth shaping is typically done using software installed on a network server.

      • From
      • this server, administrators can control who uses bandwidth, for what,
      • and when.Bandwidth shaping establishes priorities to data traveling to
      • and from the Internet and within the network.

      A bandwidth shaper essentially performs two key functions: monitoring and shaping.

      Monitoring includes identifying where bandwidth usage is high and at what time of day.

      After that information is obtained, administrators can customize or shape bandwidth usage for the best needs of the network




  20. Question 18:































































































































































































































































































































    • Answer 18:







































































































































































































































































































































  21. Filename: Enter a descriptive filename. This name will show on the Card Browser as well as the iPod/iPhone list.



    • Private: When
    • this is checked, only you can see these cards. You may only mark cards
    • as Private if you are logged in under your account. Private cards are
    • marked with an icon in your card list. You must save your cards for this to take effect.



    • Tags: Tags are keywords. If someone was searching for your
    • cards, what keywords would they use to find it? Enter keywords
    • separated by spaces. For instance, if you had a file of french
    • vocabulary, you might tag it with

    french vocab nouns




    Description: Enter a helpful description of your cards. This will help others see what your card file contains.













    • Editing:















    • Example
    • –192.168.10.0 is a Network ID
    • –192.168.10.255 is the broadcast address for the 192.168.10.0 network.
















































  22. What is Classful IP Addressing?
    • Originally IP Addresses where divided into different“class” ranges:
    • – A Class: 1 – 126 255.0.0.0
    • – B Class: 128 – 191 255.255.0.0
    • – C Class: 192 – 223 255.255.255.0
    • – D Class: 224 – 239 Multicast
    • – E Class: 240 – 243 Experimental

    • A Class – 126 Networks, 16,777,214 Hosts
    • B Class – 16,384 Networks, 65,534 Hosts
    • C Class – 2,097,152 Networks, 254 Hosts

    Total of 3,720,314,628 host addresses available
  23. Private vs. Public IP Addressing
    • Private IP ranges which have been reserved from PublicInternet use:
    • – 10.0.0.0 – 10.255.255.255
    • – 172.16.0.0 – 172.31.255.255
    • – 192.168.0.0 – 192.168.255.255
    • – 169.254.0.0 – 169.254.255.255

    Hosts assigned private IP Addresses can get to the Internet through a technology called Network Address Translation (NAT)

    Most of today’s companies use private IP addresses on their private networks
  24. What is NAT?
    NAT stands for Network Address Translation and is acommonly used IP translation and mapping technology.

    Using a device (such as a router) or piece of software that implements NAT allows an entire home or office network toshare a single internet connection over a single IP address.

    A single cable modem, DSL modem, or even 56k modem could connect all the computers to the internet simultaneously.

    Additionally, NAT keeps your home network fairly securefrom hackers.

    NAT is built in to the most common Internet Connectionsharing technologies.
  25. How Computers get IP Addresses
    • * Statically
    • * From a DHCP Server

    The Dynamic Host Configuration Protocol or (DCHP) is used for assigning dynamic IP addresses to devices on anetwork.

    • Using APIPA
    • Stands for Automatic Private Internet Protocol Addressing

    Client systems that are configured for automatic IP address assignment / dynamic IP assignment will attempt to use DHCP to make a request for an IP address lease for a given network.

    When the DHCP server is unavailable the service on the client will automatically configure the system with an APIPA IP address in the 169.254.0.1 through 169.254.255.254 address range with a subnet mask of 255.255.0.0
  26. Internetworking
    What is a Router?

    A router is a device that forwards data packets along networks

    A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP’s network.

    Routers are located at gateways, the places where two or more networks connect, and are the critical device that keeps data flowing between networks and keeps the networks connected to the Internet.

    When data is sent between locations on one network or from one network to a second network the data is always seen and directed to the correct location by the router.

    They accomplish this by using headers and forwarding tables to determine the best path for forwarding the data packets, and the use protocols such as ICMP to communicate with each
  27. What is a Default Gateway?
    Computers can only communicate directly with other computerson the same network.

    The only way for a computer to communicate with a computeron a different network is through a router. (Internetworking)

    The Default Gateway represents the IP Address of a router thata computer uses to communicate outside of its network.
  28. What is Subnetting?
    Subnetting is the process of taking a large network and dividing it into smaller networks to increase efficiency and manageability.

    • IP addresses can be class A, B or C.
    • Class A addresses are for networks with a large number of hosts.

    The first octet is the netid and the 3 remaining octets are the hostid

    Class B addresses are used in medium to large networks.The first 2 octets making up the netid and the remaining 2 are the hostid.

    • Class C is for smaller networks.The first 3 octets making up the netid and the last octet comprising the hostid.
    • The Network ID and the Host ID are determined by a subnet mask.
  29. What if You Wanted More Than 1 Subnet?
    Subnetting allows you to create multiple logical networks that exist within a single Class A, B, or C network.

    If you don't subnet, you will only be able to use one network from your Class A, B, or C network.

    When subnetting is employed, the multiple networks are connected with a router which enables data to find its way between networks.On the client side, a default gateway is assigned in the TCP/IP properties.

    The default gateway tells the client the IP address of the router that will allow their computer to communicate with clients on other networks.
  30. What is IPv4
    Every IP address can be broken down into 2 parts, the Network ID(netid) and the Host ID(hostid).

    All hosts on the same network must have the same netid.

    • Disadvantages of IPv4
    • Not Enough Addresses• Cluttered the Internet Routing Tables• Difficult to Configure• Security is Optional

    Each of these hosts must have a hostid that is unique inrelation to the netid.

    IP addresses are divided into 4 octets with each having amaximum value of 255.

    We view IPv4 addresses in decimal notation such as124.35.62.181, but it is actually utilized as binary data.
  31. What is IPv6
    The previous information on TCP/IP has referred to IPv4, however, this addressing scheme has run out of available IP addresses due to the large influx of internet users and expanding networks.

    As a result, the powers that be had to create a new addressing scheme to deal with this situation and developed IPv6.

    This new addressing scheme utilizes a 128 bit address (instead of 32) and utilizes a hex numbering method in order to avoid long addresses such as 132.64.34.26.64.156.143.57.1.3.7.44.122.111.201.5.

    The hex address format will appear in the form of 3FFE:B00:800:2::C as an example
  32. IPv6 Solutions
    • Plenty of Addresses
    • Simplified the Internet Routing Tables
    • Easy and Automated Configuration
    • Security is Required
  33. Types of IPv6 Addresses
    • Unicast (One to One)
    • Sending of information packets to a single network node.

    This type of network transmission is used where a private or unique resource such as media servers are being requested for two way connections that are needed to complete the network communication.

    • So in the media server example, a client system may make the request for streaming content from the single source and the responding system may leverage unicast as part of the response to the session request to deliver the content.
    • Multicast (One to Many)
    • Single source address responding to multiple destination addresses with information to be sent.

    In a media server example, the single source address may need to send the data to multiple clients; it does this by sending the data with multiple destination IP addresses.
  34. Types of IPv6 Addresses continued...
    Multicast (cont’d)

    All the clients that “see” this network traffic will check to see if it is meant for them with the supplied information.

    If it is not the client does not receive the data.If a network node does see that the data is intended for them the device will respond by receiving the packet.

    Broadcast

    Traffic sent out from a network node that will reach every other node on the subnet / broadcast domain because the message is sent with the intent of reaching all nodes.

    The network node that is sending the traffic will use the broadcast address for that subnet and every device in that broadcast domain will receive the broadcast information.

    Generally the broadcast address is the last IP address of that segment.
  35. FTP
    The File Transfer Protocol provides connection oriented file transfer between a client and a server.

    It was originally used to transfer files between UNIX systems, and is now the most popular file transfer protocol on the Internet.

    Must resolve host name to IP address to establish communication.

    It is connection oriented (i.e. verifies that packets reach destination).

    FTP uses TCP port 21 for control and TCP port 20 for datatransport.
  36. TFTP
    The Trivial File Transfer Protocol provides connectionless file transfer functions.

    TFTP is a simple and small protocol, which makes it suitable for transferring small amounts of data.

    It is primarily used for updating devices such as routers and switches.

    Another common use is transferring the data required to boot a diskless system over the network.

    TFTP uses UDP port 69.
  37. HTTP
    The Hypertext Transfer Protocol was originally designed for transferring World Wide Web documents and has been extended to transfer other types of files as well.

    Its most common use is transferring web pages between a web browser and a web server.

    It is the protocol controlling the transfer and addressing of HTTP requests and responses.

    HTTP uses TCP port 80 by default
  38. HTTPS
    HTTPS is used in exactly the same way as the HTTP protocol.

    The difference is that HTTPS uses SSL (Secure Sockets Layer) to send data in an encrypted form and to authenticate the server.

    For example, when you buy something online using a credit card HTTPS uses TCP port 443 by default.
  39. DHCP
    The Dynamic Host Configuration Protocol is used for assigning dynamic IP addresses to devices on a network.

    DHCP simplifies network administration by keeping track of IP addresses in a database rather than an administrator having to manage and assign them manually.

    When a client is configured to receive an IP address automatically, it will send out a broadcast to the DHCP server requesting an address.

    The server will then issue a "lease" and assign it to that client. DHCP uses UDP ports 67 & 68.


    Benefits of DHCP

    Prevents users from making up their own IP addresses.

    Prevents incorrect gateway or subnet masks from being entered.

    Decreases amount of time spent configuring computers especially in environments where computers get moved around all the time.
  40. DNS
    The Domain Naming System is a standard name service thatallows your computer to register and resolve domain names.

    DNS uses TCP port 53 for zone transfers

    and UDP port 53 forlookups.
  41. TELNET
    Telnet is a terminal emulation protocol that allows remote access to a system.

    Telnet can also refer to software which can be used by a client to remotely connect to and configure operating systems and network devices.

    Provides a virtual terminal or remote login across the network that is connection-based.

    The remote server must be running a Telnet service for clients to connect.

    Telnet uses TCP port 23
  42. Bridges & Switches
    Switch

    Network device that filters and forwards packets between LAN segments and ensures that data goes straight from its origin to its proper destination.

    Switches remember the address of every node on the network, and anticipate where data needs to go.

    A switch only operates with the computers on the same LAN.This reduces competition for bandwidth between devices on the network.

    It isn't smart enough to send data out to the internet, or across a WAN. These functions require a router.


    Bridge

    Functions the same as a repeater, but can also divide a network in order to reduce traffic problems.

    A bridge can also connect unlike network segments (ie. token ring and ethernet).Bridges create routing tables based on the source address.
  43. Advanced Switch Functionality
    Power over Ethernet (PoE) is used to transfer electricalpower, along with data, over standard twisted pair cable.

    The Spanning Tree Algorithm (STA) is used by switches to determine the best route when there is more than oneconnection to a node.

    Virtual LANs (VLANs) can be created in order to emulatemultiple broadcast domains using switches.

    Trunking is when a switch presents more than one VLANconfiguration over a single connection to another switch or a router.

    Port Mirroring is used to send a copy of network data to a second (mirrored) connection usually for the purposes of monitoring.

    Port Authentication is used to restrict access based uponauthentication information. Typically used in 802.1x network
  44. Firewalls & Proxy Servers
    Firewall

    Either a hardware or software entity (or a combination of both) that protects a network by stopping network traffic from passing through it.

    In most cases, a firewall is placed on the network to allow all internal traffic to leave the network (email to the outside world, web access, etc.), but stop unwanted traffic from the outside world from entering the internal network.

    This is achieved by granting and denying access to resources based on a set of configurable rules, Firewalls are used to protect private networks from external intrusion.

    Firewalls can control what data is allowed in or out of a network.Firewalls can be created with hardware or software.

    Proxy Servers

    A proxy server acts as a middle-man between clients and the Internet providing security, administrative control, and caching services.

    When a user makes a request for an internet service and it passes filtering requirements, the proxy server looks in its local cache of previously downloaded web pages

    If the item is found in cache, the proxy server forwards it to the client. This reduces bandwidth through the gateway.

    If the page is not in the cache, the proxy server will request the page from the appropriate server.

    Nowadays, the functions of proxy servers are often built into firewalls.

    Serves 3 main purposes

    – Disguise an end users actual identity using NAT

    – Cache requests to save bandwidth

    – Control content permitted to be requested fromthe Internet
  45. Load Balancer & Bandwidth Shaper
    Load Balancer

    A load balancer is a hardware and/or software solution that provides load balancing services.

    Load balancing is used to distribute workloads evenly across two or more computers, network links, CPUs, hard drives, or other resources, in order to get optimal resource utilization, maximize throughput, minimize response time, and avoid overload.

    Using multiple components with load balancing, instead of a single component, may increase reliability through redundancy.

    Bandwidth Shaper

    Describes the mechanisms used to control bandwidth usage on the network.

    Bandwidth shaping is typically done using software installed on a network server.

    From this server, administrators can control who uses bandwidth, for what, and when.Bandwidth shaping establishes priorities to data traveling to and from the Internet and within the network.

    A bandwidth shaper essentially performs two key functions: monitoring and shaping.

    Monitoring includes identifying where bandwidth usage is high and at what time of day.

    After that information is obtained, administrators can customize or shape bandwidth usage for the best needs of the network

What would you like to do?

Home > Flashcards > Print Preview