Networks Test 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

crossover cable orientation

1->3 2->6 4->4 5->5 7->7 8->8

Types of protocols that transport data over networks

1. TCP (connection oriented) 2. UDP (connectionless)

Features you want in Serves OS package

1. want to be able to manage users, hardware, and software (LDAP 2. file/hardware serving 3. scalable 4. connectivity 5. fault tolerence 6. security 7. include/add-in: web server email server streaming media Remote access server 8. virtualization

What are the IPv4 addresses for a private network?

10.X.X.X 172.16.X.X - 172.31.X.X 192.168.X.X (usually a home network)

802.11b

11 Mbps 2.4 GHz about 35 meters can configure specific channels

IPv6

128 bit address broken into 8 groups of 16 bits each. Reported as 8 groups of 4 Hex numbers, separated by semicolons

The TCP/IP port used for SFTP is ____________ and for FTP is ______________ .

22 / 21

802.11n

300 Mbps 2.4 of 5 GHz about 70 meters newer and quickly overtaking 802.11g in popularity

802.11g

54 Mbps 2.4GHz about 35 meters widely depolyed

What is a private network

A private IP address is an IP address that's reserved for internal use behind a router or other Network Address Translation (NAT) device, apart from the public.

______________________________________ is used to resolve an IP address to MAC address.

ARP

ARP

Address Resolution Protocol uses broadcast transmissions to identify the MAC address of computers the IP address routes the traffic to the correct subnet, when the subnet is reached, the ARP protocol broadcasts the IP address to all computers on the subnet

_______________________________________ is a protocol that lets network administrators manage centrally and automate the assignment of IP addresses in an organization's network

DHCP

DHCP

Dynamic Host Configuration Protocol protocol that automates the assignment of IP addresses within a network when machines request them

EMI

Electromagnetic interference interference caused by machinery or electrical devices or natural phenomena such as electrically charged raindrops when the EMI reaches a computer or network, it can interfere and degrade signals when interference is significant, data transmissions are blocked common source of EMI is devices with motors, laser printers, microwave ovens

FTP

File Transfer Protocol used to upload and download files to and from computer on the Internet and within some internal networks uses TCP for guarenteed delivery of the files can access FTP from command prompt

Why is virtualization software important?

Having it on one complete file allows you to move it around and use it on different machines as needed, and virtualization is cheaper in the long run.

HTTP

Hypertext Transfer Protocol defines how files on the World Wide Web (WWW) are formatted, transmitted, and rendered in web browsers HTTP = port 80 HTTPS = port 443

sockets

IP address with the port number to access that port on the browser (ex: 10.30.20.2:80)

IANA Purpose

Internet Assigned Numbers Authority is a department of ICANN that controls the regulation of port numbers for standardization

ICANN

Internet Corporation for Assigned Names and Numbers organization that controls and assigns all public IP addresses and authorizes all domain names.

IMAP

Internet Message Access Protocol email protocol more commonly used on internal networks rather than on the internet current version is IMAP4 difference between POP3 and IMAP4: messages are not automattically downloaded to the client and can be retained on the server with IMAP4 - IMAP4 servers allow users to view email message headers individually and choose hich to open

_____________________________ is the primary authentication protocol used within a Microsoft domain.

Kerberos

Layer 2 Tunneling Protocol

L2TP VPN protocol combination of the Layer 2 Forwarding (L2F) protocol from Cisco and PPTP FROM MICROSOFT IPSec is used with L2TP to provides security for the VPN connection L2TP = UDP port 1701

LDAP

Lightweight Directory Access Protocol used to query directories such as Microsoft's Active Directory Domain Services allows individuals to query the directory to locate and manage resources within the domain transmits data across the network in clear text SLDAP sues SSL or TLS to prevent attackers from using sniffers to capture data SLDAP uses digital certificate for authentication LDAP = port 389 SLDAP - port 636

Packets have two sets of addresses

MAC Addresses IPv4 Addresses

Use for IP addresses

Needed in order to send any data from one machine to another. No IP addresses = no data transmission

IP Address has two components:

Network ID and host ID

IP Address has two parts:

Network ID/Host ID Subnet ID

What is the difference between POP3 protocol and IMAP protocol?

POP3 protocol deleted emails from a server IMAP leaves the email on the server

Point-to- Point Tunneling Protocol

PPTP VPN protocol provides a secure connection over a public network such as the internet primarily used in microsoft networks PPTP = port 1723

POP3

Post Office Protocol v3 protocol used to retrieve email from an email server

________________________________________ is a windows client application that allows an authorized user to use SSH to connect to a remote device.

PuTTY

Among other uses the ___________________________________ protocol allows a help-desk professional to take control of a user's desktop and provide assistance.

ROS

RFI

Radio frequency interfernece interference from broadcasted radio signals when a transmitter is close enough and/or transmits the signals at high enough amplitudes, unintended systems can pick it up Sources of RFI: cordless phones, bluetooth devices

RDS

Remote Desktop Services add on to microsoft windows servers can host applications or entire desktops that are accessible to users on the network

protocol used to send e-mail is ___________________________________________________.

SMTP

_____________________________________ is an encryption protocol that creates a secure encrypted session and has replaced the non-secure Telnet protocol.

SSH

SSH

Secure Shell encryption protocol that creates a secure encrypted session that can be used by other protocols example: SFTP is FTP encrypted with SSH has replaced telnet in many applications SSH is more secure than telnet and more suitable for use on the internet

SSL

Secure Sockets Layer encryption protocol used for a wide assortment of purposes SSL protects HTTP as HTTPS provides security in: confidentiality Integrity Authentication uses digital certificates for confidentiality, integrity, and authentication VPNs have emerged using SSL as a tunneling protocol

SMTP

Simple Mail Transfer Protocol primary protocol used to deliver email over the internet and within internal networks email servers use SMTP to send and recieve email between each other user systems use SMTP to send email to SMTP servers

SNMP

Simple Network Management Protocol management protocol used to manage network devices such as routers and swithces many different applications are available that use SNMP SNMP - UDP port 161

Connection Oriented Protocol

TCP starts with an establishes session using a three-way handshake process. This three way handshake process ensures a connection is established before data is transmitted. TCP: connection oriented using ports and sockets

One of its primary uses of the protocol _______________________________ is to boot a diskless device into a local area network from a server.

TFTP

Connectionless Protocol

UDP sends data using a best-effort method. it doesn't establish a session, so it doesn't provide guaranteed delivery UDP: connectionless protocol used to send short messages, or datagrams in a network

Reasons to tunnel

VPN, so that private packet is sent within a public packet. Software removes the outside packet so that the private packet can enter the private network. IPv6 traffic can travel on IPv4 line by having IPv6 packet within the payload of IPv4 packet.

Valid IPv4 Addresses

Valid IP addresses have four decimals separated by three dots only valid decimal number are 0-255

VPN

Virtual Private Network provides access to an internal network over a public network such as the internet the client accesses the internet using any available means - the client then connects to the VPN server, which is reached through the internet - after authenticationg with the server, the VPN server provides connectivity to the internal network. The VPN server is accessible to any client that has access to the internet

VoIP

Voice over IP streaming media such as streaming audio, video, and VoIP all use UDP delivers voice communications and multimedia over the internet

power surge

a power surge last longer than a power spike and is usually less of an increase in voltage may be only about 20% above normal but will last around a minute

power spikes

a short duration increase in voltage it can cause damage to equipment most common source: lightning strikes

APIPA

address always starts with169.254.x.x subnet mask is always 255.255.0.0 Automatic Private Internet Protocol Addressing the APIPA address provides limited connectivity for clients on the network

what makes a network private

addresses are assigned internally and not known to the outside world. Have to be converted to public before entering or leaving the network. Lots of security

wireless advantages/disadvantages

advantages: cheaper, mobile, quick setup disadvantages: interference and straight line of sight needed, lower security, cannot span a long distance

How do you determine the default gateway?

all the computers in subnet A will be configured with a default gateway of 192.168.1.1 and the computers in subnet B will be configured with a default gateway of 192.168.4.1 End with a 1 because often assigned the first IP address available beyond the subnet ID. Ex: 172.16.30.1 for a subnet ID of 172.16.30.

difference between server software and client software

client software only allows connection to network and does not have any networking capabilities Server software allows you to manage all hardware, software, and users in a network as well as access to that network. Usually on a dedicated machine.

Telnet

command-line interface that allows bidirectional communication with network devices and other systems on the network all commands are typed at a command prompt instead of using point-and-click methods within a windows GUI benefit: allows terminal emulation (can connect remotely) sessions include: telenet server, client, window (command prompt), and a transferring protocol

purpose and advantages of UTP categories

connecting machines to a network inside buildings Advantages: cheaper, easier to work with and maneuver Disadvantages: vulnerable to RFI and EMI

connection oriented protocol vs. connectionless

connection oriented have confirmation sent that a packet has been received by receiving machine, while connectionless sends data and does not receive confirmation, but sends with best efforts

opening and closing ports with a firewall

control panel -> windows firewall -> Allow a program or feature through windows firewall -> change settings -> HTTP (port 80)

Cross talk

data that crosses from one transmission line to another can result in a degraded signal or data jumping from one wire to another results in two prolbems: corruption of data loss of confidentiality

Network limitations

distance data transfer rates line of sight twists pre-foot etc

DNS

domain naming system service that resolves host names to IP addresses clients send name resolution requests to a DNS server adn the DNS server responds with the IP addresses

Fiber Optics - where found, advantages, disadvantages

either glass or a type of plastic that carries light pulses lost of benefits over twisted pair, but more expensive can carry signals up to 40 km advantages: immune to interference immune to crosstalk interception is difficult lightweight disadvantages: expensive tough to work with need converter to go from electrical to light signal outdoors and in between buildings for longer distances

Problems with connectivity

electromagnetic interference radio frequency interference power spikes interception of signals fire hazards cross talk

Windows 2016 server three versions:

essential standard data center

purpose of network or subnet ID

identifies the subnetwork, or subnet where the computer is located network ID is always expressed with trailing zeros portion of the IPv4 address that is used to identify the network of the machine sending or receiving the data.

firewall problems

important for security, open and close ports as a security measure to control traffic.

purpose of subnet mask

in internal networks, IP addresses are accompanies by a subnet mask subnet mask identifices the portion of the IP address that is the network ID common subnet masks: 255.0.0.0 255.255.0.0 255.255.255.0 TCP/IP uses the subnet mask to determine which portion of the IP address is the netwrok ID and which portion is the HOST ID when the subnet mask is configured at its maximum value (255), that indicated that the corresponding portion of the IP address is part of the network ID and the remaining portion of the IP address is the host ID consider an IP address of 192.168.1.5 with a subnet mask of 255.255.255.0 - since the first three decimals of the subnet mask are 255, the first three decimals of the IP address make up the network ID used determine what part of the 32 bit IP address is the subnet ID and what part is the host ID. Must know subnet mask to determine if machine is local or remote

power sags

occurs when the AC voltage falls below normal for a period of time when a DC power supply doesn't receive enough AC power, it can't provide enough DC power to the internal system results in the system turning off

encapsulating packets

one packet as the payload in another packet, usually with encryption

kerberos

primary authentication protocol used within a microsoft domain and is managed as part of active directory helps guard the secrets within active directory uses complex process of issuing time-stamped tickets to users after the log on - users present these tickets when tryhing to access resrouces - if tickets are valid, access is granted uses symmetric cryptography to encrypt tickets Kerberos = port 88

surge protector

protects against power spikes and surges. if excessive voltage reaches the surge protector, a built in circuit breaker pops and prevents the voltage from reaching the equipment have different ratings based on response time and power threshold sensitivity

Twisted Pair - where found, advantages, disadvantages?

single cable with four pairs of copper wires twisted around each other distance = 100 meters (can use repeaters to extend distance

IPv4

standard IP addressing scheme since the 1980s it's used to get TCP/IP traffic from one computer to another computer over a network

straight through cable versus cross over cable

straight through cable: pin 1 in one connector is wired to pin 1 in the other connector, pin 2 is wired to pin 2, etc. connect dissimiliar devices on the network example: a computer connected to a hub, switch, or router would use a straight through cable Cross over cable: connect similiar devvices to each other have specific pins in one connector crossed over to differenct pins in the other connector straight thru used from machine to switch. Switch crosses the connection before sent to the receiving machine

Default Gateway

the IP address of the router on the local subnet the default gateway will usually provide a pther to the internet

Why do you need IPv6

there are only about 3.7 billion IP addresses and IPv6 is 128 bits, which provides much room for growth. (trillion of trillions more IP addresses other advantages: native support for IPSec More efficient routing Easy host configuration

A ________________________________ protocol allows a foreign or non -encrypted packet to be encapsulate in another packet for part of the data transmission.

tunneling

tunneling

tunneling is embedding a packet as a payload in another packet, usually with encryption private networks can now send things through public networks without knowing that they are from private networks Example: tunneling a IPv6 packet in a IPv4 packet so it works better

UPS

uninterruptible power supply provides continous power to a system even if a power sag occurs or if power is lost for a short period primary purpose is to provide power to a system by battery long enough to complete a logical shutdown or for generators to come online and stablize not inteended as a long-term power source

Purpose of host ID

uniquely identifies the computer within a subnet the host ID is whatever remains after identification of the network ID portion of the IPv4 address that is used to identify the machine sending or receiving the data.


Kaugnay na mga set ng pag-aaral

Cumulative Final Exam BioPsy 220

View Set

Groundwater Resources and the Water Table

View Set

Chapter 1 Section 2: The Olmec, Toltec, and Maya

View Set

Project Management Subsidiary Plans

View Set

Understanding Nutrition 1- Questions chapter 10&11

View Set