IS216 midterm

¡Supera tus tareas y exámenes ahora con Quizwiz!

37. Look at the various IEEE standards and their purposes.

802.3 802.11 BAG NAC - big aweful gym need AC B - 2.4 GHz - 11mbps A - 5 GHz - 54 mbps G - 2.4 GHz - 54mbps , compatible with b N - 2.4 and 5 GHz - 65-600Mbps AC - 5 GHz - 7 Gbs

5. Have an overview of topologies of networks; different types and what distinguishes them from each other.

A topology describes how the parts of a whole work together. physical topology—Mostly refers to a network's hardware and how computers, other devices, and cables fit together to form the physical network. (bus, star, mesh, star-bus, hybrid, ring) Bus, Ring, Star, Mesh (Partial or Full) L: Bus = P Bus/Star L: Ring = P Ring/Star L: Star = Star L: Mesh = Mesh logical topology—Has to do with software and how access to the network is controlled, including how users and programs initially gain access to the network and how specific resources, such as applications and databases, are shared on the network.

30. Advantages/disadvantages of virtualization.

Advantages: -Efficient use of resources -Cost and energy savings -fault and threat isolation -simple backups, recovery and replication Disadvantages: -compromised performance -increased complexity -increased licensing costs -single point of failure

7. What are some popular web server applications?

Apache, IIS, Nginx

4. Understand what an API is and the role it plays in an OS call.

Application programming interface - API - call The process an app uses to make a request of the OS - like a waiter that take your orders, take it to the cook then bring back food to you!

22. What is a wavelength mismatch?

Common Fiber Cable Problems wavelength mismatch—SMF, MMF, and POF (Plastic Optical Fiber) each use different wavelengths for transmissions. A wavelength mismatch occurs when transmissions are optimized for one type of cable but sent over a different type of cable.

27. What is PPP and features that define it.

PPP (Point-to-Point Protocol) is a Data Link layer protocol that directly connects two WAN endpoints. One example might be when a DSL or cable modem connects to a server at the ISP. PPP headers and trailers create a PPP frame that encapsulates Network layer packets. The frames total only 8 or 10 bytes, the difference depending on the size of the FCS field (recall that the FCS field ensures the data is received intact). Here's what PPP can do: Negotiate and establish a connection between the two endpoints. Use an authentication protocol, such as MS-CHAPv2 or EAP, to authenticate a client to the remote system. Support several Network layer protocols, such as IP, that might use the connection. Encrypt the transmissions, although PPP encryption is considered weak by today's standards.

39. What is SIP?

Session Initiation Protocol - A signaling protocol that is used to make an initial connection between hosts but that does not participate in data transfer during the session. After SIP establishes the connection, other protocols kick in—for example, RTP (Real-time Transport Protocol or Real-time Protocol) that transports streaming audio and video data for VoIP calls.

32. What constitutes being highly available for a server?

To maintain high availability, you should ensure that critical network elements, such as your connection to the Internet or your file server's hard disk, are redundant. FHRP we can create redundant default gateway routers and links for a network segment. So, if one default gateway or its link becomes unavailable, we have a backup. This makes it so network operations can continue using the redundant router while you troubleshoot problems with the offline router. GLBP balances the load between multiple redundant default gateways using an active/active model.

Router

a device that connects two or more network segments or subnets. Each subnet has a unique logical network address. Routers can be used to connect subnets within a single LAN, or they can be used as gateways to connect multiple LANs together. Routers can be used to connect networks with different architectures (for example, connecting an Ethernet network to a token ring network). Routers maintain information about other networks in a database called a routing table. The routing table typically contains the address of all known networks and the next router in the path used to reach the destination network. The routing table is used in the process of forwarding packets.

Switches

a device that connects two or more network segments or subnets. Each subnet has a unique logical network address. Routers can be used to connect subnets within a single LAN, or they can be used as gateways to connect multiple LANs together. Routers can be used to connect networks with different architectures (for example, connecting an Ethernet network to a token ring network). Routers maintain information about other networks in a database called a routing table. The routing table typically contains the address of all known networks and the next router in the path used to reach the destination network. The routing table is used in the process of forwarding packets. A Layer 3 switch is capable of reading Layer 3 (network) addresses and routing packets between subnets. A Layer 3 switch often provides better performance than a router, but it does not support as many features as a router.

11. Know what a Service Level Agreement is and what it defines for customer and provider.

is a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer, such as the service provided by an ISP. Details specified might include contract duration (minimum or maximum), guaranteed uptime, problem management, performance benchmarks, and termination options.

25. What is attenuation?

the loss of a signal's strength as it travels away from its source. Just as your voice becomes fainter as it travels farther, so do signals fade with distance. To compensate for attenuation, signals are boosted en route using a repeater, which regenerates a digital signal in its original form without the noise it might have previously accumulated

15. How do you verify a TCP/IP is correctly configured and communicating with a network?

Using IPconfig, ping to make sure all network configs are correct.

28. The different cloud service models and what differentiates them from one another.

traditional—All the hardware, software, and everything else is located and managed at your location. This would be like making your own pizza from scratch at home. You provide all the ingredients, bake it in your own oven, and eat it at your own table. For example, you install Microsoft Office on your laptop and keep all your documents on your hard drive. You can work with Office and your documents without being connected to the Internet. IaaS (Infrastructure as a Service)—Hardware services are provided virtually, including network infrastructure devices such as virtual servers and end user interfaces such as HVDs (hosted virtual desktops). HVDs are desktop operating environments running on a different physical computer than the one the user interacts with. These devices rely on the network infrastructure at the vendor's site, but customers are responsible for their own application installations, data management and backup, and possibly operating systems. For example, customers might use the vendor's servers to store data, host websites, and provide email, DNS, or DHCP services, but could provide their own NOS licenses and productivity software, such as customer tracking, sales management, and an office suite. In our pizza analogy, this would be like a take-and-bake restaurant. You decide the type of crust you want and the toppings; the restaurant puts it all together for you. Then you take the unbaked pizza home, bake it yourself, and eat it at your own table. In the IT world, AWS (Amazon Web Services) is a good example of an IaaS. Amazon provides the processing power, storage space, and deployment services. You create VMs and choose OSes to install on them. You load applications, databases, etc., and run Internet and other network services on them. PaaS (Platform as a Service)—Developers often require access to multiple platforms during the development process. A platform in this context includes the operating system, the runtime libraries or modules the OS provides to applications, and the hardware on which the OS runs. Rather than purchasing and maintaining a separate device for each platform, another option is to subscribe to PaaS services. Developers can build and test their applications within these virtual, online environments, which are tailored to the specific needs of the project. Alternatively, an organization's entire network might be built on platform services provided by a vendor. Any platform managed by a vendor resides on the vendor's hardware and relies on their uptime and accessibility to meet performance parameters. However, the customers are responsible for their own applications and/or data storage, including maintaining backups of the data. In our pizza analogy, this is the delivery option. You decide on the crust and toppings, the restaurant bakes it for you, and then they bring it to your front door within 30 minutes. You provide your own table and do the cleanup after dinner. Google Cloud Platform (cloud.google.com) is a good example of PaaS. They offer pre-built VMs where you can immediately start installing and testing software. SaaS (Software as a Service)—Applications are provided through an online user interface and are compatible with a variety of devices and operating systems. Online email services such as Gmail and Yahoo! are good examples of SaaS, as are CRM (customer relationship management) apps, such as Salesforce and Zoho. Google offers an entire suite of virtual software applications through Google Drive and their other embedded products. Except for the interface itself (the device and whatever browser software is required to access the website), the vendor provides every level of support from network infrastructure through data storage and application implementation. Here we see the full capability of pizza provider services. The restaurant provides the crust and all the ingredients, bakes it for us, and serves it directly to the table that they also have provided. We had to get ourselves to the restaurant, but we didn't need to bring anything to make it all work (except our payment, of course), and they do the cleanup after we leave. This is similar to applications you run online, like email, office productivity apps, or CRM software. XaaS (Anything as a Service or Everything as a Service)—In this broader model, the "X" represents an unknown, just as it does in algebra. (And you thought you would never again use algebra.) Here, the cloud can provide any combination of functions depending on a client's exact needs. This includes, for example, monitoring, storage, applications, and virtual desktops.

20. Definition of routing protocol convergence time.

Convergence occurs when all routers share a consistent view of the network. Each router will used converged path information to insert next hop information for each learned path into the routing table. It does this by choosing the route with the lowest metric.

35. IF a network has 10 usable bits for the host, how many usable host addresses are available?

258 ???

Twisted Pair Cables

-Two copper conductors from a path for an electrical signal with each wire carrying an equal but opposite signal Conduct electrical signals -twisted to reduce crosstalk -UTP - unshielded twisted pair -STP - shielded twisted pair - min EMI Ads: -Flexible, cost effective, works with newer protocols and ease of use Dis: -EMI and eavesdropping RJ11 = Phone Cable RJ45 = Cat 3(10BASE-T), 5(100BASE-TX), 5e(100BASE-T and 1000BASE-T), 6(10GBASE-T), 6a(10GBASE-T) GG45, TERA = Cat 7 (10GBASE-T)

Fiber optic

-use light signal -two fiber strands, one transmit, one receive. -core carries signal, made of glass or platic -cladding maintain signal in the core Types: 1) Single Mode : data xn thru the core using a single light path, support longer distance, less modal dispersion 2) Multi Mode: data xn thru the core using mul light paths- simplified connections and allows lower-cost electronics ADS -immune to EMI -resist eavesdropping -extremely high data trxn rates -greater trxn without repeaters DIS -Very expensive -Dif to work with -Special training ST, SC, LC, MTRJ, FC

17. Understand the DNS hierarchy.

1)The host looks in its local cache to see if it has recently resolved the host name. 2)If the information is not in the cache, it checks the Hosts file. The Hosts file is a static text file that contains host-name-to-IP address mappings. 3) If the IP address is not found, the host contacts its preferred DNS server. If the preferred DNS server can't be contacted, the host continues contacting additional DNS servers until one responds. 4) The host sends the name information to the DNS server. The DNS server checks its cache and Hosts file. If the information is not found, the DNS server checks any zone files that it holds for the requested name. 5) If the DNS server can't find the name in its zones, it forwards the request to a root zone name server. This server returns the IP address of a DNS server that has information for the corresponding top-level domain (such as .com). 6) The first DNS server requests the information from the top-level domain server. The server returns the address of a DNS server with the information for the next highest domain. This process continues until a DNS server is contacted that holds the necessary information. 7) The DNS server places the information in its cache and returns the IP address to the client host. The client host also places the information in its cache and uses the IP address to contact the desired destination device.

13. What denotes a loopback IP address?

127.0.0.1 through 127.255.255.254 Used for research or can indicate your own computer, in which case it is called the loopback address. Local host

34. The definition of clustering.

Clustering refers to the technique of grouping multiple devices so they appear as a single device to the rest of the network. Clustering can be configured with groups of servers, routers, or applications. Although it usually accompanies load balancing, it doesn't have to.

10. Understand the concept of cross talk and how to prevent it.

Crosstalk is a disturbance caused by the electric or magnetic fields of one telecommunication signal affecting a signal in an adjacent circuit. In an telephone circuit, crosstalk can result in your hearing part of a voice conversation from another circuit. how to help: -termination: When terminating twisted-pair cabling, don't leave more than 1 inch of exposed (stripped) cable before a twisted-pair termination

24. Term for noise that can disrupt network signal.

EMI (electromagnetic interference)—Caused by motors, power lines, televisions, copiers, fluorescent lights, microwave ovens, manufacturing machinery, and other sources of electrical activity (including a severe thunderstorm). One type of EMI is RFI (radio frequency interference), or electromagnetic interference caused by radio waves. (Often, you'll see EMI referred to as EMI/RFI.) Strong broadcast signals from radio or TV antennas can generate RFI. crosstalk—Occurs when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable, as shown in Figure 5-1. The resulting noise, or crosstalk, is equal to a portion of the second line's signal. If you've ever been on a traditional, landline phone and heard the conversation on a second line in the background, you have heard the effects of crosstalk.

3. What is the difference between firmware and hardware?

Hardware: Hardware is the computer's part that is seen and touched by us. These are the physical parts of the computer. Which make up the body of our computer. like; Keyboard, mouse, cabinet, monitor, printer etc. is all hardware. Firmware :Firmware is a type of software that is associated with your hardware, Firmware is a software installed at the time of manufacturing any hardware, including hardware such as keyboards, hard drives, BIOS, graphic cards and printers or moreover It comes embedded in any of your home appliances such as TVs, washing machines etc. The firmware contains instruction programs to perform basic functions of any hardware.

38. Understand the similarities and differences between IPv4 and IPv6 as well as factors in adoption. Is IPv6 classful or classless? Why?

IPv4 (Internet Protocol version 4) addresses have 32 bits and are written as four decimal numbers called octets, for example, 92.106.50.200. Each octet, when written in binary, consists of exactly 8 bits. IPv6 (Internet Protocol version 6) addresses have 128 bits and are written as eight blocks of hexadecimal numbers A dual stack configuration enables a host to communicate with IPv4 and IPv6 hosts; the IPv4 and IPv6 protocol stacks run concurrently on a host. IPv4 is used to communicate with IPv4 hosts, and IPv6 is used to communicate with IPv6 hosts. When dual stack is implemented on hosts, intermediate routers and switches must also run both protocol stacks. Tunneling allows IPv6 hosts or sites to communicate over the existing IPv4 infrastructure. A device encapsulates IPv6 packets within IPv4 packets for transmission across an IPv4 network, and then the IPv6 packets are de-encapsulated by another device at the other end. Subnetting in IPv6 is simpler than subnetting in IPv4, and differs from IPv4 in substantial ways: IPv6 addressing uses no classes. There are no IPv6 equivalents to IPv4's Class A, Class B, or Class C networks. Every IPv6 address is classless. IPv6 does not use subnet masks. A single IPv6 subnet is capable of supplying 18,446,744,073,709,551,616 IPv6 addresses.

1. Be familiar with the layers of the OSI model and what each layer involves.

Layer 1—Physical (Cables, i.e Cat 6 RJ45) Layer 2—Data Link (Switches / LLC, MAC, IP, CRC = Frames) Layer 3—Network (Router, IP address, or Packet) Layer 4—Transport (TCP/ UDP/ port/segment to break up datas with ordered numbers in order to send it) Layer 5—Session (Session ID) Layer 6—Presentation (Encryption/Syntax) Layer 7—Application (user interface) http/https All People Seem To Need Data Processing 7, 6, 5 = Application 4, 3 = Transportation 2, 1 = Architecture

12. What information is contained in a MAC address?

MAC addresses contain two parts, are 48 bits long, and are written as hexadecimal numbers separated by colons—for example, 00:60:8C:00:54:99. The first 24 bits (six hex characters, such as 00:60:8C in our example) are known as the OUI (Organizationally Unique Identifier), which identifies the NIC's manufacturer. A manufacturer's OUI is assigned by the IEEE (Institute of Electrical and Electronics Engineers) The last 24 bits make up the extension identifier or device ID and identify the device itself. Manufacturers assign each NIC a unique extension identifier, based on the NIC's model and manufacture date, so that, in theory, no two NICs share the same MAC address.

14. Mail protocols, characteristics of each.

Simple Mail Transfer Protocol (SMTP): used to route electronic mail through the internetwork. SMTP is used: Between mail servers for sending and relaying mail. By all email clients to send mail. By some email client programs, such as Microsoft Outlook, to receive mail from an Exchange server. Post Office Protocol 3 (POP3): is used to retrieve email from a remote server and download it to a local client over a TCP/IP connection. Internet Message Access Protocol version 4 (IMAP4): IMAP4 is an email retrieval protocol designed to enable users to access their email from various locations without the need to transfer messages or files back and forth between computers. Messages remain on the remote mail server and are not automatically downloaded to a client system.

26. Client to site and site to site VPN models.

Site-to-site VPN: Tunnels connect multiple sites on a WAN. At each site, a VPN gateway on the edge of the LAN establishes the secure connection. Each gateway is a router or remote access server with VPN software installed and encrypts and encapsulates data to exchange over the tunnel. Meanwhile, clients, servers, and other hosts on the protected LANs communicate through the VPN gateways as if they were all on the same, private network and do not themselves need to run special VPN software. Site-to-site VPNs require that each location have a static public IP address. Client-to-site VPN: also called host-to-site VPN or remote-access VPN—Remote clients, servers, and other hosts establish tunnels with a private network through a VPN gateway at the edge of the LAN, Each remote client on a client-to-site VPN must run VPN software to connect to the VPN gateway. The tunnel created between them encrypts and encapsulates data. This is the type of VPN typically associated with remote access. As with site-to-site VPNs, clients and hosts on the protected LAN communicate with remote clients by way of the VPN gateway and are not required to run VPN software. To establish a client-to-site VPN, only the VPN gateway location needs a static public IP address.

16. How a router creates a broadcast domain boundary. ???

Subnetting

19. What makes TCP a reliable delivery protocol?

TCP provides services that ensure accurate and timely delivery of network communications between two hosts. TCP provides the following services to ensure message delivery: -Sequencing of data packets -Flow control -Error checking -Acknowledgement of packets sent -Retransmission of lost packets

31. Telnet - what it is, what it does and doesn't do.

Telnet service—The Telnet protocol is used by the Telnet client-server command-line application to allow an administrator or other user to "remote in" or control a computer remotely. Telnet is included in many operating systems, but transmissions in Telnet are not encrypted, which has caused Telnet to be largely replaced by other, more secure programs, such as the ssh command in the Linux operating system.

2. What is the difference between a switch and a router?

The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks. A host on one LAN cannot communicate with a host on another LAN without a router to manage that communication and stand as a gateway between the networks.

6. Understand the concept of encapsulation.

The process of adding a header to the data inherited from the layer above - Transport Layer Segment (Ports for D and S, segment sequences) Packets (IP header Add) Frames (NEW header and trailer) Binary Codes (electrical or light signals)

9. Look at the system life cycle.

The process of designing, implementing, and maintaining an entire network. A major part of this process is the removal and disposal of outdated assets, and the addition of compatible, updated devices

21. What happens when there's a network collision?

When the transmissions of two nodes interfere with each other, a collision happens. After a collision, each node waits a random amount of time and then resends the transmission. A collision domain is the portion of a network in which collisions can occur. Hubs connecting multiple computers in a star-bus topology resulted in massive collisions.

29. Hypervisor types and characteristics/examples of each.

creates and manages a VM, and manages resource allocation and sharing between a host and any of its guest VMs. Together, all the virtual devices on a single computer share the same CPU, hard disks, memory, and physical network interfaces. Yet each VM can be configured to use a different operating system, and can emulate a different type of CPU, storage drive, or NIC, than the physical computer it resides on. Meanwhile, to users, a VM appears and acts no differently from a physical computer running the same software Type 1: Installs on a computer before any OS and is therefore called a bare-metal hypervisor. It partitions the hardware computing power to multiple VMs, each with their own OS. Popular examples include XenServer by Citrix, ESXi by VMware, and Hyper-V by Microsoft. Type 2: Installs in a host OS as an application and is called a hosted hypervisor. Client Hyper-V and VirtualBox, which you've seen in the Capstone Projects, are examples of Type 2 hypervisors, as are the popular VMware Player and Linux KVM. A Type 2 hypervisor is not as powerful as a Type 1 hypervisor because it is dependent on the host OS to allot its computing power. VMs hosted by a Type 2 hypervisor also are not as secure or as fast as a Type 1 hypervisor's VMs.

36. What is the term for an interface that handles multiple VLANs?

trunk port- connects the switch to a router or another switch => this interface manages traffic from multiple VLANS trunking => a single switch can support traffic belonging to several VLANs across the network Trunking protocols assign and interpret the VLAN tags in Ethernet frames, thereby managing the distribution of frames through a trunk IE VTP

33. What is a network TAP and what does it do?

type of monitoring tool in-line monitoring—Install a device, called a network TAP (test access point) or packet sniffer, in line with network traffic. As you can see in Figure 11-2, the device usually has four ports: Two ports send and receive all traffic, usually between a switch and a router. A third port mirrors the traffic, sending it to a computer running monitoring software in promiscuous mode, such as Wireshark. The fourth port is used for device configuration.


Conjuntos de estudio relacionados

Cardiovascular system study guide

View Set

Chapter 15 - Small Business Finance: Using Equity, Debt, & Gifts

View Set

17 - Public Finance: Expenditures and Taxes

View Set

His 102 Exam 1 (Ch. 15 16 17 18 19 20 21)

View Set

Chapter 57: Management of Patients with Female Reproductive Disorders

View Set

Fundamentals of Management Chapter 1 McGraw Hill

View Set