Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
27 Cards in this Set
- Front
- Back
- 3rd side (hint)
Routers |
Based on IP addressing Divides networks. Passes data between networks (until it reaches the destination network) Separates broadcast domains |
|
|
Switches |
Based off of hardware address (MAC/physical/ethernet address)
Extends network and broadcast domains (router divides). Can be broken up with VLANs. Like a big bridge.
Managed: Allows admin to create VLANS, configure ports, add security. Has an IP for remote configuration.
Unmanaged: (pretty much a hub) device makes no decisions, just passes data along |
|
|
Access points |
Access to a wired network for wireless devices. Access point usually paired with router in SOHO configs (wireless router) |
|
|
Cloud-based network controller |
Software Defined Networking (SND)
Software manipulates Control Plain to optimize Data Plain. Like an automatic traffic controller. Can be centralised, controlling physically remote networks |
|
|
Firewall |
Network-based: hardware, filters traffic in or out of a network. Usually between secure and unsecure networks, also between networks and servers. Host-based: Software on your PC, for example
Can operate based on addressing, port, file type, content, or context |
|
|
NIC |
Network Interface Card Used to communicate with a network (wired or wireless) Has a hardware/MAC/physical/ethernet address (hexadecimal) |
Network Interface Card |
|
Repeater |
Boosts signal without making a change.
Signal degrades through copper wire in 100m. Fibre goes farther but still needs repeaters. |
|
|
Hub |
Can only receive or send. Cannot make changes or make decisions. Basically multiport repeater.
Sends same data out along all channels, like a power strip. Data congestion, any device on network can receive that data.
Outdated. |
|
|
Cable/DSL modem |
Modulator/Demodulator
Takes signal from (usually) ISP and translates it to data your network can understand (ie, fibre signal or DSL to ethernet signal) |
|
|
Bridge |
A repeater which avoids data collision, by separating content by reading the MAC addresses of the source and destination.
Like a switch but smaller (2-4 ports) |
|
|
Patch panel |
Usually in comm closets and data centres.
All wall ports lead here to be parched (or not) into live sockets. Not all ports have to be live. |
|
|
PoE |
Power over ethernet.
You don't need a dedicated powerline, the electricity comes through the ethernet cable. Simple as that. Need a switch with PoE capabilities or a power injector (a repeater which adds power to signal). |
Power over Ethernet |
|
EoP |
Send data over existing powerlines. Very rare. |
|
|
Layer 7 |
Application (Host -Data)
Human-computer interaction.
Allows software to access network resources by providing the interface for lower layers Coordinates partnering applications Ensures data integrity and error recovery procedures are in place Example: web browsers, email, apps |
Application |
|
Layer 6 |
Presentation (Host - data)
Presents data to layer 1. Encodes and decodes data for transmission. Defines how data should be formatted. Compression and encryption (and inverses) done here. |
Presentation |
|
Layer 5 |
Session (Host - data) Synch and send to ports. Create a session between two devises. Ex: Logical ports. |
Session |
|
Layer 4 |
Transport (Host - segments) Data transfer logistic (what to send, where, how fast) ex TCP/UDP |
Transport |
|
Layer 3 |
Network (media - packets) Actual packet data transfer. Ex IP, routers |
Network |
|
Layer 2 |
Datalink (media - frames) Node to node transfer. Also handles error correction for layer 1. Sublayers: MAC layer and LLC layer Ex switches, bridges, network cards |
Data link |
|
Layer 1 |
Physical (media - bits) The necessary physical structure of a network. Ex hubs, repeaters, electric cables, radio waves. |
Physical |
|
OSI Model (Layers in order) |
Physical Datalink Network Transport Session Presentation Application |
Please do not throw sausage pizza away |
|
QoS |
Quality of Service Any device which regulates loss of data, latency, etc. Prioritises certain time-sensitive data (VOIP, streaming) over other less urgent data (email, web traffic). |
Quality of Service |
|
WEP |
Wired Equivalent Privacy
Wireless encryption, using the RC4 algorithm
No longer secure, uses the same key over and over. If you monitor traffic for long enough you can crack the key. |
Wired Equivalent Privacy |
|
WPA |
WiFi Protected Access Wireless encryption, uses TKIP (Temporal Key Integrity Protocol) which rotates keys. By the time someone has collected enough data to crack the key, it's already changed. |
WiFi Protected Access |
|
WPA2 |
WiFi Protected Access (gen 2) Wireless encryption, uses AES (Advanced Encryption Standard). Replaced TKIP with CCMP (Counter Mode Cipher Block Chaining Message Authentication Code Protocol) |
WiFi Protected Access (gen 2) |
|
WPA-PSK |
WiFi Protected Access - Pre-Shared Key (usual SOHO network) |
|
|
WPA Enterprise |
Takes you to a central service to log on with username/password |
|