Computer Networking Semester 2 Unit 8

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

AP modes

An AP can be set to operate as a traditional access point, a repeater, or a wireless bridge

classless addressing

An IP addressing convention that alters the rules of classful IPv4 addressing to create subnets in a network.

VLAN hopping

An attack in which the attacker generates transmissions that appear, to the switch, to belong to a protected VLAN.

native VLAN

An untagged VLAN on a switch that will automatically receive all untagged frames.

VTP (VLAN Trunk Protocol)

Cisco's protocol for exchanging VLAN information over trunks.

installing a second NIC

How do you improve fault tolerance

24 bits

How many bits of a Class A IP address are used for host information?

CIDR block

In CIDR notation, the forward slash plus the number of bits used for the network ID. For example, the CIDR block for 199.34.89.0/22 is /22.

magic number

In the context of calculating subnets, the difference between 256 and the interesting octet (any octet in the subnet whose value is something other than 0 or 255). It can be used to calculate the network IDs in all the subnets of a larger network.

Auto-negotiate mode

Most switches run in whaat?

-some advanced devices have all the functions of a managed switch but add Layer 3 capabilities -these switches offer a performance advantage over traditional routers

Multilayer switches

-geographic locations -departmental boundaries -device types

Networks are commonly segmented according to one of which groupings?

-operate at the Network layer and work with packets -advanced devices that connect separate logical networks to form an internetwork -can be used to create complex internet works with multiple paths creating fault tolerance and load sharing

Routers

A set of rules that routers use to exchange information so that all routers have accurate information about an internetwork to populate their routing tables

Routing protocols

-10 Mbps half-duplex -100 Mbps half-duplex -10 Mbps. Full-duplex -100 Mbps full-duplex

Switch port modes of operations are?

802.1Q

The IEEE standard that specifies how VLAN and trunking information appears in frames and how switches and bridges interpret that information.

trunking

The aggregation of multiple logical connections in one physical connection between connectivity devices. In the case of VLANs, a trunk allows two switches to manage and exchange data between multiple VLANs.

site prefix

The first four blocks or 64 bits of an IPv6 address that normally identify the network. Also called global routing prefix.

global routing prefix

The first four blocks or 64 bits of an IPv6 address that normally identify the network. Also called site prefix.

trunk port

The interface on a switch capable of managing traffic from multiple VLANs.

access port

The interface on a switch used for an end node. Devices connected to access ports are unaware of VLAN information.

-double tagging -switch spoofing

What are the two approaches to VLAN hopping

Network documentation is easier to manage.

What do well-chosen subnets accomplish?

it can limit network performance

What if a NIC is slow?

identify the physical characteristics the card must match

What is important in selection a network adapter?

2h - 2 = Z

What is the formula for determining the number of possible hosts on a network?

Eight

What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?

-Don't use the default VLAN. -Change the native VLAN to an unused VLAN ID. -Disable auto-trunking on switches that don't need to support traffic from multiple VLANs. -On switches that do carry traffic from multiple VLANs, configure all ports as access ports unless they're used as trunk ports. -Specify which VLANs are supported on each trunk instead of accepting a range of all VLANs. -Use physical security methods such as door locks to restrict access to network equipment.

What mitigation efforts will reduce the risk of VLAN hopping

-incorrect port mode -incorrect VLAN assignment -VLAN isolation

What should you consider if you have configuration errors?

802.1Q

Which IEEE standard determines how VLANs work on a network?

256 - the interesting octet 2h

Which formulas can be used to calculate the magic number?

The fourth one

Which hexadecimal block in an IPv6 address is used for the Subnet ID?

To increase the number of networking devices on a network

Which of the following is not a good reason to segment a network?

Trunk

Which port mode on a switch enables that port to manage traffic for multiple VLANs?

DHCP relay agent

While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need to make the central DHCP server accessible across VLANs?

shared system memory

a NIC's onboard processor selects a region of RAM on the computer and writes to it as though it were buffer space on the adapter

Preboot Execution Environment (PXE)

compliant adapters allow a computer to download and OS instead of booting it from a local hard drive-this feature is used on diskless workstations that do not store the OS locally

VLAN support

enable this setting to assign wireless networks to wired VLANs

Automatic link aggregation

enables you to install multiple NICs in one computer and aggregate the bandwidth

Traffic priority

if your AP is configured for multiple networks you can assign a priority to packets coming from each network

adjustable transmit power

lets you control the power and range of the wireless network signal

network interface cards

makes the connection between a computer and the network medium-performance and reliability of this are crucial to the computer's network performance

RAM buffering

means NIC includes additional memory to provide temporary storage for incoming and outgoing network data that arrives at the NIIC faster than it can be sent out

Bus mastering

permits a network adapter to take control of the computer's bus to initiate and manage data transfers to and from the computer's memory

Wi-Fi Multimedia

provides quality of service (QoS) settings for multimedia traffic, giving priority to streaming audio or video

shared adapter memory

the adapter's buffers map directly to RAM on the cojmputer

Advanced Configuration and Power Management Interface

this offers Wake-on-LAN

multiple SSIDs

two or more wireless networks can be created with different security settlings

Fragment-free switching

-Is a method in which the switch reads enough of the fame to guarantee that its at least the minimum size for the network type -medium speed switching performance -all errors except undersized frames forwarded

Cut-through switching

-Is the fastest method in which the switch reads only enough of the incoming frame to determine the frame's source and destination addresses -fastest switching performance -all errors forwarded

Store-and-forward switching

-Requires that the switch read the entire frame into its buffers before forwarding it -slowest switching performance -no error frames forwarded

Switches

-Work at the Data Link (Layer 2) of the OSI model -send broadcast frames out of all ports -each port is considered a collision domain -ports can operate in full-duplex mode -allows connected devices to transmit and receive simultaneously eliminating the possibility of a collision

onboard co-processors

-enable the card to process incoming and outgoing network data without requiring service from the CPU -security features on some-high-end NICs allow them to handle several protocol functions, such as IPsec and other encryption services related to authentication and payload protection -Quality of service (QoS) allows prioritizing time-sensitive data

tag

A VLAN identifier added to a frame's header according to specifications in the 802.1Q standard.

native VLAN mismatch

A configuration error where switch ports on each end of a trunk are configured with different native VLAN assignments. Also called a VLAN mismatch.

VLAN mismatch

A configuration error where switch ports on each end of a trunk are configured with different native VLAN assignments. Also called a native VLAN mismatch.

ANDing

A logical process of combining bits.

-enhance security -improve performance -simplify troubleshooting

A network administrator might separate a networks traffic into smaller portions to accomplish what?

VLAN (virtual local area network or virtual LAN)

A network within a network that is logically defined by grouping ports on a switch so that some of the local traffic on the switch is forced to go through a router, thereby limiting the traffic to a smaller broadcast domain.

default VLAN

A preconfigured VLAN on a switch that includes all the switch's ports and cannot be renamed or deleted.

ip helper-address

A robust Cisco command that can be configured to create and send helper messages that support several types of UDP traffic, including DHCP, TFTP, DNS, and TACACS+.

CIDR notation

A shorthand method for denoting the distinction between network and host bits in an IP address.

CIDR (Classless Interdomain Routing)

A shorthand method for identifying network and host bits in an IP address.

DHCP relay agent

A small application that works with a centrally managed DHCP server to provide DHCP assignments to multiple subnets and VLANs.

VLSM (Variable Length Subnet Mask)

A subnetting method that allows subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the needed IP address space.

Managed switches

A switch that can be configured via a command-line interface or a web-based management GUI, and sometimes can be configured in groups.

managed switch

A switch that can be configured via a command-line interface or a web-based management GUI, and sometimes can be configured in groups.

unmanaged switch

A switch that provides plug-and-play simplicity with minimal configuration options and has no IP address assigned to it.


Kaugnay na mga set ng pag-aaral

Hebrews 1:1-13 Old Testament Cross References

View Set

Chapter 19: Postpartum Woman at Risk

View Set

Life Insurance Underwriting and Policy Issue

View Set

Chapter - 3 Job-Order Costing: Cost Flows and External Reporting SmartBook

View Set

Krugman's Economics for AP®, 1e, Module 35

View Set

MHE1, AAHE2, AAHE3, AAHE4, AAHE5, AAHE6

View Set