• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/259

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

259 Cards in this Set

  • Front
  • Back
What are the advantages of peer to peer networking?
"The are simple to configure, used in environments in which time, expertise or money is scarce.
What are the DISADVANTAGES of using a traditional peer to peer network?
"1) NOT FLEXIBLE - as they grow larger adding or changing out significant elements can be difficult.
What is a Peer to Peer network?
Every computer can communicate directly with every other computer on the same network.
What is a common way to share resources on a peer to peer network?
"Users can modify the file sharing controls via the OS. (""Shared Docs"" directory)
What is a client/server network?
"A network that uses a server to enable clients to share resources.
What are the 5 advantages of a client/server network over a P2P network?
"USER ACCOUNTS for any one can be managed in one place
What is a LAN?
LOCAL AREA NETWORK - a network of computers & other devices that are confined to a reletively small space (office or single building)
What is a WAN?
WIDE AREA NETWORK: able to carry data over longer distance but require different transission methods and have greater variety of technologies.
What is a client?
a device on a network that request resources or services from another computer on a network.
What is a workstation?
A computer -it may or may not be connected to a network.
What is a node?
Any device that can communicate over the network. It is identified by it unique netowrk address number
What is a host?
"A computer that enable a recource shared by other computers on the same network.
What are the big 5 jobs of networks?
"1) FILE & PRINTER SHARING
What was the first addition of Windows to come with networking capabilites built in?
Windows 3.11(Windows for workgroups)
What was one of the largest Benifits of Windows 3.11 besides workgroups?
It was the firt multi-task OS
Nutshell of networking history...
1960's military started it as a research project, Ethernet was invented in 1970 and the routing technology was licensed to Cisco by stanfor U. in 1980s In 1986 Cisco figured out how connect computers over long distances using this technology
What Is Robert Metcalfe's Law?
"Connect any number, n, of machines—computers, phones, or even cars—and you get n squared potential value.
What was the sofware solution to the evergrowing complexity of the Internet?
DIRECTORY SERVICES: Organize the network services into one manageable unit - Windows Active directory, Novell's NDS, Netscape Directory Service
What were the two factors that spured the growth of networking?
Cheap PC over mainframe technology this allowed for Small business became dependent on the cheap PC
What is a Network?
The physical infrastructure that enables the transmission of data. It consists of all sorts of physical devices, such as cables, hubs, repeaters, routers, fiber-optics,microwave dishes, and so on
What is Networking?
the preparation of data for transmission, and the act of submitting that data to the physical network for transmission. Networking includes the establishment of communication (between nodes) to transport data across the physical network.
What is a Packet-Switched Network?
Current Lans & WANS, Break information into managale pieces and send them off to their destination. It doesn't matter how they get their or who gets their first - just as long as they all get there. The packets will be rearranged into the order they were send when they reach their destination.
What is the OSI Model and how does in benifit the network?
"ISO Developed the Open Systems Interconnect Model (OSI) defines a networking standard.
What is the Application Layer of the OSI Model?
"This uppermost layer is the only layer that has any interface with the user; It enable the apps to have network capability - it is not the app itself. it does things such as initiating file transfers, performing database inquiries, print services, opening documents residing on a file server.
What is the Presentation layer of the OSI Model?
"This layer is responsible for packaging the data into the agreed-upon format. (JPEG,GIF AND CHANGING IT TO ASCII) for exchange between networked computers.
What is the Session Layer of the OSI Model?
"The Session layer is responsible for managing the ongoing exchange of
What is the Transport Layer of the OSI Model?
"The Transport layer is responsible for ensuring data was sent (or received)
What is the Network Layer of the OSI Model?
"The OSI layer responsible for routing data, such as figuring out which route data should take to reach its destination by maintaining list of known networks.
What is the Data Link Layer of the OSI model?
"This layer is responsible for managing the Physical Layer, including the correction of transmission errors.
What is the Physical Layer of the OSI Model?
"The layer deals with interaction and interface with the media, such as how to format a packet for transmission voltage or signal on an Ethernet cable. It also deals with connector sizes and functional pin assignments
How are network topologies described?
"1) Physically -the way it is wired (EX physical roads)
What are the major network topologies?
What is UTP and STP and What are thier pros & cons?
"4 pairs of 22 or 24 Copper GA twisted together to eliminate the ghost signal.
How is a UTP or STP T568A wired?
"
How is UTP or STP T568B wired?
T568B Wire Diagram
What are are key properties of a wave?
"Frequency - Length of wave (measured in cycles)
What two types of modulation are there?
"Frequency Modultation - frequency the carrier wave is changed by the application data
What are the three types of transmission possible?
"Simplex - oneway, like a megaphone
What is multiplexing?
The ability to have sub channels within one channel either defined by timing each signal, Statistical based on priority or, Wave length.
What are three types of transmission flaws?
"NOISE -- Electro interpherence
What are the cost to consider when running new media?
"Cost of install
What's a RG58?
"Ethernetnetwork that works at 50 Ohms
What's a BNC Connector?
COAX CABLE @ 50 /75 OHMS
Whats a F-Type Connector?
What is the good & the bad of fiber?
"Good for security, immune to electo interference, high speed
What does an ST (strait tip) Connector look like?
A Quick release bayonet style connector developed by AT&T. STs were predominant in the late 80s and early 90s.
What does an SC (Subscriber Connector) look like?
A general purpose push/pull style connector developed by NTT. Snap-in connector that is widely used in singlemode systems for its performance low cost, simplicity, and durability.
What does an LC (Lucent Connector) look like?
Half the size of the ST. Otherwise, it is a standard ceramic ferrule connector - highly favored for singlemode.
What does a MT-JR (Mechanical Transfer Registered Jack) Connector look like?
A fiber-optic cable connector that is very popular for small form factor devices. Commonly used for networking applications. Its size is slightly smaller than a standard phone jack and just as easy to connect and disconnect. It's half the size of the SC connector it was designed to replace.
What are the pieces of the TCP Segment?
What Does A UDP Segment look like?
User Datagram Protocol
What does an IP Datagram look like?
What are the properties of 10Base-T?
"Speed: 10 Mbps
What are the properties of 10Base-FL?
"Speed: 10 Mbps
What are the properties of 100Base-TX?
"Speed: 100 Mbps
What are the properties of 100Base-FX?
"Speed: 100 Mbps
What are the properties of 1000Base-T?
"Speed: 1000 Mbps
What are the properties of 1000Base-CX?
"Speed: 1000 Mbps
What are the properties of 1000Base-SX?
"Speed: 1000 Mbps
What are the properties of 10GBase-SR?
"Speed: 10,000 Mbps
What are the properties of 10GBase-LR?
"Speed: 10,000 Mbps
What are the properties of 10GBase-ER?
"Speed: 10,000 Mbps
What is a Network Access Card (NIC)?
A permanent always on connection to the network used in LANS. May have a transceiver on board that sends and receives signals along the wire.
What is a Media Access Conctol Address (MAC)?
It is a 12 digit Base 16 number scheme that is a unique id for the NIC. First 6 are the MFG ID and the las 6 is the MFG unit ID
What is ISDN?
Integrated Services Digtial Network. Used more in Europe than here. It is a network interphase that connects small offices or homes to the network through a network ISDN interphase.
What is a Hub?
A central connection point of a star topology that sends data to all hosts on the network.
What is a Collision Domain?
A network where computers share the same xtr media. As devices on the network increases so does the chances of packets colliding and then being discarded
What is a switch?
A device that watches and learn wchich hosts connect to which port based on the MAC address. It has the capability to create a virtual circuit between two nodes there by reducing network traffic.
What is a bridge?
A device that connects two different hubs. If a mac ID is not on the other side of the bridge it will not let the frame through. It knows which nodes on are which side of the bridge.
What is a gateway?
A device that that serves as an entry point between two networks. It uses logical address to decide if it should forward the packet along. It has the ability to translate protocols.
What is a router?
A device like a gateway but can also calculate the best way to cross a network based on different costs.
What is a Firewall?
A device that controls the access to the network. It protects outside intrusions based on a set of rules that are configured by admin.
What is a broadcast domain?
Any Network where hosts recieve frame level broadcasts. Broadcast storms can occure when broadcast traffic is sent, regenerated and responded to. In this condition traffic consumes the network bandwidth and normal traffic is slowed.
What is an ethernet frame ?
A section of data that stars our with a preamble of 64 bits (1010.. last two are 11) then sends mac Address of recipient then sender then the data, a pad if needed and a CRC check number
What is Carrier Sense Multiple Access / Collision Detection (CSMA / CD)?
Ethernet functionality where hosts look to see if anyone is on the wire and if not, then sends its frame out. If frames are sent at the same time a collision is detected. Sending hosts wait a random amount of time and then resend again.
What is a Multi-Station Access Unit (Mau)?
Central unit of token ring's phisical star topology. You can connect up to 75 host w/45M segments ussing UTP. STP 260 hosts w/100 m segments
Describe a Token Ring.
"Developed by IBM in the 1980s. It is defined by IEEE 802.5. It has physical star topology with logical ring topology.
FDDI (Fitty) Fibber distributed Data interface.
Highly reliable backbone network architecture. It has two counter rotating rings of data that helps both with speed and redundancy. You can have 2 KM segments with 1 ring and 100 km segments with two rings
What is the Version Field in an IP Data Gram?
ID the Version number of th protocol - EX, IPv4
What is the Internet Header Length Field of IP Data-gram?
shows the number of blocks in ip header. this indicates to the receiving done where data will begin after the header ends.
What is the differentiated Services Feild of IP Datagram?
Informs routers what level of precedence they should apply when processing the incoming packet. used to be type of service but extend from 8 bits to 64 and became DiffServ
What is total length feild of IP Datagram?
ID's the total length of the Ip datagram, including header and data (in bytes). IP datagram, including header and data cannot exceed 65,535 bytes.
Identification field of the IP Datagram?
Identifies the message to which a datagram belongs and enables the receiving node to reassemble fragmented messages.
What is the flags field in the IP Datagram?
Helps identification field by indicating whether a message is fragmented and if so, whether this datagram is the last in the fragment.
What is the Fragment offset field in the IP Datagram?
Helps the Identification feild by showing where the datgram fragment belongs in the incomming set of fragments.
What is Time to Live field in the IP datagram?
Indicates the the maximum time that a datagram can remain on the network before it is discard. Counts number of hops on a network. it is configurable but typically set to 32 or 64.
What is the Protocol Field in the IP datagram?
Identifies the type of transport layer protocol that will receive the datagram (TCP/UDP)
What is the Header checksum of the IP data gram?
Allows the receiving node to calculate whether the IP header has been corrupted during transmission.
What is the padding field in the IP Datagram?
Contains filler bits to ensure that the header is multiple of 32bits
what does a 4 pin firewire look like?
What are the 6 Flags of the TCP Header Datagram?
"URG - pointer field contains urgent info
What is the sliding-window size of the TCP datagram?
Indicates how many bytes the sender can issue to a receiver while acknowledgment for this segment is outstanding. Its a flow control that prevents the receiver from being deluged with bytes.
How doe the Sequence and Acknowledgement fields work in an TCP data gram?
Computer A sends out a random snyc number 32 bits long. Then Computer B responds by sending out another random sync number followed by acknowledgement with adding 1 to computer A's sequence number. Then Computer A responds with +1 to both fields just do this over and over.
What is a NOS?
"Network operating system: required for a server to run.
What are the softskills required for an IT professional?
"Customer Relations
What is the EIA?
EIA: Electronic Industries Alliance: Trade org composed of reps from electronics mfgs across the us. Set standards and lobbies for favorable growth of the computer electronics industry.
What is TIA?
"Telecommunications Industry Association: US group that standards and lobbies for IT, wireless, satellite, fiber and telco equipment.
What is IEEE?
Instutue of Electrical & Electronics Engineers. Goal is to promote development, standards and education in the the electrical and computer science fields
What is ISO?
"International Organization for Standardization: Goal is to establish international technological standards to facilitate global exchange of infoadn barrier free trade. ""ISO? means equals in greek"
What are the two subivisions of the Data Link Layer?
"LLC (Logical link control): is Defined by 802.2 and provides an interface to the network layer. LLC is responsible for:
"
"802.3
What is Thicknet?
Uses 10BASE-5 Ethernet: 10 Mbps, Baseband, 500 meter segment length. Uses RG-8 connector
What is Thin-net?
10Base-2 Ethernet: 10Mbps, Basebande, 185 M segments. Uses RG58A/U Coax and relies on bus topology.
What are the properties of CAT 3?
UPT four wire pairs that carry up to 10 Mbps for ethernet or 4 Mbps for token ring. Signal bandwidth of 16MHZ.
What are the properties of CAT 4?
UTP that contains four wire pairs and can support 16 Mbps for token ring and 10 Mbps for Ethernet. throughput has signal bandwidth upto 20 Mhz.
What are the properties of CAT 5?
UPT with four wire pairs and supports up to 1000 Mpbs with a 100 Mhz signal rate.
What are the properties of Cat 5e?
"like cat 5 but has higher quality copper and higher twist ratio and uses advanced methods. Rated at 350Mbps 100m
What are the properties of Cat 6?
Twisted pair cable with 4 wire pairs each raped in foil. It has excellent resistance to cross talk. Supports a 250 Mhz signal rate and six times the throughput of regular cat 5. Max length is 100m
Describe the 568 Commercial Building Wiring Standard by TIA /EIA
"Structured cabling:
What is a Connection Oriented Protocol?
A protocol that makes sure data was received just as it was sent. One way to do this is by using a checksum. TCP is this type of protocol.
What is a Connectionless Protocol type?
A protocol type that doesn't care about the receiver just broadcast data out. Example of this type of protocol would be UDP, PING, Grouper,
What is the most popular Network layer protocol?
"IP: A Connectioinless protocol. treates each datagram as independant unit so it will forward fragments and let the upper layers re-sequence the data. The only thing it care about is data delivery to the correct location... doesn't care about the data itself.
What is a socket?
A layer 4 term that refers to the combination of port and IP address. It is used to identify distinct applications running on the same system at the same time.
Besides IP, what are some other network layer protocls?
"1) IPX
What are some other layer 4 protocols?
"Domain Name Systems (DNS_
What is a Protocol Suite?
Standards and software vendors that focus on the upperlayer features with out regard for the physical design of the network. A single protocol suite can be used on multiple architectures.
What is a Network Architecture?
The collection of items that make up the physical and data link layers of a network.
What are some of the properties of the TCP/IP Protocol Suite?
"Network Lay: Ip Protocol
What are the addressing properties of the IPX/SPX Protocol Suite?
"Originally a netware protocol suite. net 5 and above now use TCP/IP.
net+ 6.5"
"Original protocol used for windows networks (3.x - NT)
What are some of the properties of the apple talk protocol suite?
"use to to be defualt protocol for MAC. staring with osx they all run native tcp/ip.
Net+ 5.0"
Frequency Hopping spread Spectrum (FHSS) is a wireless signaling method. Uses narrow band frequency and hops data signals in a predictable sequence from on frequency to the next. This way it can avoid interference as it shifts from one to the next. It also increases security.
What is DSSS?
Direct Sequence Spread Spectrum (DSSS). The transmission is broken into pieces and then sends the pieces at the same time across different frequencies. It is more susceptible to interference and less secure than FHSS.
What is the media access method for a wireless environment?
Uses Carries Sense media access /Collision Avoidance (CSMA/CA) If rather than detecting collisions it tries to avoid packet collisions. If a host detects traffic it waits longer than on a wired network before rechecking the media. Also every xtr is acknowledge by the receiver. the acknowledge frame is sent to all host on the network tell them to wait.
What are some of the devices you could find on a wireless network?
"Wireless bridge
What are the specs of Wifi 802.11a
"Frequency: is 5ghz
What are the specs of wireless 802.11 b
"Frequency: 2.4 GHZ
What are the wireless Specs for 802.11 G?
"Frequency: 2.4 Ghz
What are the specs for wireless 802.11N?
"Frequency: 2.4 GHZ or 5 Ghz
What is Service Set Identification?
"SSID Groups host together on the same wireless network.
What is Wired Equivalent Privacy?
WEP: 64/128 bit encryption that does not require authentication. The keys are generated automatically. All devices have the same shared key. Its very weak because the key is static and everyone shares the same key.
Whatt is wireless protected access?
"WPA essentially a bridge to WPA2. it address some weakness of of WEP.
What is Wireless Protected Access 2?
WPA2 - The current security standard for most networks. adheres to 802.11i spec. Built on a robust secure network RSN. manditory elements of complying with 802.11i are: new AES encryption algorithm. Second the counter mode w/ cipher blocks changing the message authentication code (CCMP)
What are the wireless specs of Bluetooth?
"Frequency: 2.45 Ghz
net+ 7.1"
"1) 32 bit represented by 4 octets separated by a period.
What are the properties of the class A IP Addresses?
"1) First octect is between 1-126
What are the properties of the class B IP Addresses?
"First octet is 128-191
What are the properties of the class C IP Addresses?
"First octet is 192-223
What are the properties of the class D IP Addresses?
"Octets from 224 to 239.255.255.255
What are the properties of the class E IP Addresses?
"Octets 240.0.0.0 to 255.255.255.254
What must you remember when defining IP addresses on a network?
"1) The first address in an address range is used to ID the network.
"
The Process of dividing a large network into smaller networks. It is necessary because there is a limited number of hosts allowed on any one network segment. Each network segment is a called a subnet and has a unique address called a subnet address.
Subnetting allows you to ...
"1) Increase the number of hosts that can be added to a LAN
What is Classless Addressing?
Creating custom subnets to help effectly manage IP addresses that are available.
What are the Facts of IPv6
"1) Full implementation should be around 2015
What are some of the key features of IPv6
"1) Auto configuration: because hardware ID are used for the Nodes ID then it only needs to discover the network ID
What are some of the strategies for compatibility between IPv4 & IPv6?
"1) Dual Stack: Provide support for both protocols concurrently
What are network ports?
"Logical connections provided by the TCP & UDP protocols. They help determine how traffic should be directed on a computer.
What are the 3 port categories defined by ICAN?
"Well Known: Used for specific protocols, 1 to 1023
What are some MAC Address Resolution protocols?
"1) Address Resolution Protocol (ARP) Used when a client has the IP address of the requested host but does needs it's MAC Address
What is the most used Network Layer Protocol?
Internet Protocol: A Connectionless protocol that is responsible for routing decisions based on info received from ARP. It also handles logical address issues.
What are the two primary transport Layer protocol?
"1) Transmissio controle Protocol (TCP): A connection based protocol that performs segmentation, sequencing and service addressing plus eror checking, flow controle. It is considered a host to protocol.
What are the protocols used for web browsing?
"HTTP: Echage file over web it is an info requesting and responding protocol
What are the primary Secirty Protocols?
"Secure Socket layer (SSL): Uses RSA for authentication and encription.
What are some file Transfer Protocols?
"1) FTP
What are the primary email protocols?
"Simple mail transfer (SMTP) used between mail servers for sending msgs. Used by all email clients to send mail and to manage exchange server activities.
What are the protocols used for network management?
"1) Simple network Management (SNMP): designed to manage complex networks. Lets hosts exchange config and status info. Data can be gathered and then used to monitor and manage network traffic
What are the commonly used file and print services?
"1) Network File System: Dev by Sun, lets users remote access file across different plat forms
what is LDAP?
Lightweight directory access protocol: used to allow searching and updating of directory services. follow client/server model.
What is IMCP?
Internet message control protocol: works closely with IP. Providing IP with Error and control info through allowing hosts to exchange packet status info which helps move packets through the network. Uses messages to check connectivity, sends notices when destinations are unreachable...
What are the TCP/IP Parameters needed for configuration?
"1) IP Address
NET+ 8.1.1"
Domain Name System (DNS): A name resolution service that maps IP address to names. It Organizes names in to a hierarchical file system. Root (.) is the highest then broken into top level domains(.com, .org, .edu, .uk, etc..) then additional sub domains and eventually hosts. Setup as a distributed database broken into zones where each zone may have one or more domains. Each DNS server has a zone file that shows the divisions of the different zones.
Describe the name resolution process of DNS server.
"1) Look @ local cache to see if it was resolved recently
What is a forward lookup?
Where DNS server finds the IP address for a given Host name
What is a Reverse Lookup
A DNS server finds the name for a given IP Address.
What is an Authoritative Server?
A DNS Server that has a full complete copy of all the records for a particular.
What is a Zone File?
"A DNS file that maps of host names to IP address maps.
What is Recursion?
The process by which a server uses a root server and subsequent servers to perform name resolution.
net+ 8.2"
Dynamic Host Configuration Protocol: a specific server configured to pass out IP address and other IP config info to the network clients
What is the DHCP Process?
8.2"
Automatic private IP Addressing Developed by MS --used when DHCP server is not available. Hosts assign themselves IP address on the 169.254.0.0 / Subnet Mask 255.255.0.0 It does not assign a default gateway so APIPA hosts can only talk to each other.
How do you enable DHCP requests to be broadcast across subnets?
"Since routers do not typically forward broadcasts you need to
When should you use Static IP Addressing?
"1) network w/small number of hosts
What is NAT?
Network Address Translation: allows you to share a registered IP address among private hosts. A nat router maps private host IP address to port numbers connected to the registered IP Address.
What are some of the properties of NAT?
"Nat can support up to 5k of concurrent connects
What is Dynamic NAT?
Automattically maps request IP address w a port assignment for the private host. It allows private hosts to initiate contact public hosts but not vise versa.
What is Static NAT?
Maps a private IP address to a static port on the NAT router. Allows public clients to initiate contact with a private host that is connected to the static port.
What are the IPv4 Address Ranges for private IP networks?
"Class A: 10.0.0.1 to 10.255.255.254
What is ICS?
Internet Connection Sharing: Lets multiple computers chare a connection to the internet through a single designated computer. This computer becomes a NAT rout and a limited DHCP server.
What are some of the parameters setup by ICS?
"IP Address range 192.168.0.0 with subnet mask of 255.255.255.0
What is SNMP?
Simple Network Managment Protocol: Designed for managing complex networks. It lets hosts exchange the config and status info. The info is gathered by management software and used to monitor and manage the network.
What are the key elements of SNMP to function?
"1) Manager: computer used to perform mgt tasks the manager queries agents that gather responses
What are the Goals of ZeroConf?
"1) Make network admin easier by automating config tasks - get rid of DHCP and DNS
What are the Key Features of Zerconfig?
"1)Client must obtain address w/out DCHP Server
What is telnet?
A terminal Emulation utility. It has 0 encryption
What is Terminal Services?
A MS terminal service too that allows you to work through a GUI. It uses the remote desktop protocol(RDP) to allow you to login.
What is a workgroup?
All user & resource access is controlled on a host by host basis.
What is a MS Domain?
NT networks use the domain as a central database for user accounts. Servers called domain controllers hold a copy of the domain database.
What is Active Directory?
"On win2k, 03 server,. Can be configured in a multi domain model throu ms director servcecs.
What is GSNW used for?
Gateway Services for Netware. You install it on a win server so win clients can then connect to the Netware server via the in server. Better than installing the novel client software on each computer.
What protocols are supported by the 3 different versions of Netware?
"1)NW 3.X IPX/SPX, IP/TCP can be provided through tunneling.
What are the system rights in Netware?
Supervisory, read, write, create, erase, modify, file scan, access control.
How do rights granted in a NW system?
"Rights that are granted to a volume flow down to folders and files in the direcotry structure. You can block ""inherited rights through various filters. "
What is a Bindery?
A DB on a NW 3.X server. user accts exist independently on each svr. Resource access has to be configured on a server by server basis.
What is eDirectory?
"Used on NW 4.x.. Formerly called NDS. User accounts are configured in the eDirectory - it can run on linux & win too. Organized by:
What Mac OS service connects to windows clients?
Dave or Sharity
What is the t-carrier system?
"Telephon system started in the 1960's
What are the properties of a t-1 line?
a connection that has 24 channels with 64 kpbs per channel = 1.5Mbps
What are the properties of t-3 line?
a connection having 672 channels with 64 kbps per channel = 44.73 Mbps
What is SONET?
"A carrier type network, Synchronies optical network.
What is X.25?
"A WAN service. Analog, banks use it for atm
What is a Frame Relay Service?
"A WAN Connection service.
What is IDSN?
"A wan connection service. uses POTS or a t-1
What are the 3 primary WAN Connection services?
ISDN, Frame Relay, X.25
What is Serial Line Internet Protocol (SLIP)?
A remote access protocol that does not support DHCP. Many parameters have to set manually when logging in (like IP address, gateway, Max transfer rate(MTR), Max Recieve Unit (MRU)
What is Point to Point Protocol(PPP)?
A remote access protocol that makes connection easier because you just give a phone number and it negotiates the rest... (DNS, DHCP, etc...)
What is PPPoE?
A remote access protocol like PPP but for always on connections.
What are ports 20-21?
FTP
What is port 22?
Secure Shell(ssh) Port?
What is port 23?
What is the telnet port?
What is port 25?
What is SMTP port?
What is port 50-51?
What is the IPSec Port?
What is port 53?
What is the DNS port?
What are ports 67&68?
What the DHCP port?
What is port 69?
What is the Trivial File transfer protocol (TFTP) port?
what is port 110?
what is the post office protocol 3 port?
what is port 119?
what is the network news transport protocol NNTP port?
What are ports 135 -139 reserved for?
What ports are reserved for netbios?
What is port 143 used for?
What port does the internet messaging access protocol 4 use?
What port is 161 used for?
What port does SNMP use?
What is port 389 used for?
What port does lightweight directory access protocol use?
What port is 443 used for?
What port does https use?
What is DSL?
"Digital Subscriber Line
What are the porperties of ISDN
"natively digital service
What is BRI?
"ISDN Level of service:
What is PRI
"Level of ISDN service - Primary rate interface
What are the properties of Cable?
"High speed Bi-directional connect to ISP
What is PAP
"A Remote Acces protocol - Password Authentication protocal
What is S-PAP?
"Remote Access Protocal -Shiva PAP. Uses to connect to a Chiva LAN Router.
What is CHAP?
"A Remote Access Protocol - Challenge Handshake protocol.
What is MS-Chap?
"A remote access protcol - Microsoft flavor of CHAP. Encripts secert used for authentication
What is EAP?
"A remote access protocol -
What is PEAP?
"A remote access protocol
What is RADIUS?
"A remote acces protocol:
What is KERBEROS?
"Remote Acces Protocol for Authentication
What is PPTP?
"VPN FACTS: Point to Point tunneling protocol.
What is Layer 2 fowading?
"VPN - Facts
What is Layer tunneling protocol
"VPN Facts
What is IPSec
"VPN Facts
What is a Packet filtering Firewall?
Operates at Layer three where it makes decisions about which network traffic to allow through by examining packet contents such as source/destination, ports, and protocols
What is a Circut Level Gateway?
Monitor Traffic between hosts via the virtual ciruts that are created. Operates @ layer 5, verify sequencing of sessioin packets, Does not filter packets, rather denys or allows sessions.
What is a Proxy Server?
A Firewall Implamentation: Also called an application gateway. It is an intermediary between a secure lan and the public. It usus ACLs to controle in/out bound traffic. Increases performance by cacheing heavily used web sights. Actls like a NA. Filters content.
What is a VLAN?
A virtual LAN. Computers are arranged in loggical grouping ussing a v-lan capable switch. These groups are like seperate networks. Beni's include - simplify movement of devices, controle broad cast traffic, controle security.
What is the Transport method of IPSEC?
END to END host to host encryption of data. Sending device creates ipsec packet, intermediaries are able to read destination only, recieving device understands IPsec and can decrypts the packet.
What is Tunnel method of IPsec?
router to router communications neither end device has to know IPsec. End device send packet to router, router adds IP sec info, packet is sent through untrusted network to destination router where the IP sec encryption is removed. Router then fowards decrypted info to end computer.
What is RAID stand for?
Redundant Array of independent disks.
What is RAID 0?
"Stripping: Breaks Data into units and stores data across a serries of disks.
What is RAID 1?
"Mirroring: Stores same data on two duplicate disks simultaneasily. Provides level of fault tolerance, quality of service. has 50% overhead because every thing is copied.
What is RAID 5?
"Stripping w/Distributed parity: volume combine3s stripping with parity data for each disk. Parity info is stored on each disk should the other one go down.
What is RAID 10?
Combines RAID 0+1 - multiple disks are striped creating a single vol. that vol is then mirrored - requires an even number of disks, 50% overhead, incrased performance.
What are the different types of redundant componets?
"1) Dual components - multiple setups that do the excact same thing
What is are clustered servers?
a group of servers set to work together on incomming client requests. Clients see only a single computer. Typically share common storage location.
What is a hot site?
Redundant site: fully configured servers and clients are mirrord w/ up to date info from the primary site.
What is a Warm Site?
Redundant site: facility is ready but applications amy not be configured. May need to restore from previous backup, extra comm links that have long time to order are on hand.
What is a cold site?
Redundant site: Ready for equipment to be broght in durring an emergency. May only have HVAC and power. Ussusally offers a false sense of security. because it may take just as long to get cold site up as getting the hot site back online.
What is the proper methodology for trouble shooting (8 steps)?
"1) identify the syptoms and potential causes (resist urge to fix it just decribe problem.
What is info can you get from ipconfig to help you trouble shoot?
IP address, mac address, dns server, dhcp server, wins server, default gate way.
What is netstat for?
view IP routing stats: current connections, incomming/outgoing connections, active sessions +ports+sockets, Local routing table.
What is TraceRT / TraceRout used for ?
Uses ICMP pacekets to test connectivity between devices. Hops between routh are masured 3 times to provide accurate representation of how long the packets take to reach destination.