345 Midterm

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

1000 MB

1 GB

1000 Bytes

1 KB

1000 KB

1 MB

8 binary bits(smallest data communication) = 1 symbol or 1 letter

1 byte(smallest data storage)

Windows Ping (4 replies) = CentOS ?

# ping (must stop manually)

False

At layer 2 of the OSI model, the network to network data communiations or the routing is handled.

True

In the UNC protocol used for network resource access, a server's IP address can be used in place of its name.

Star

In the above picture, the network topology is (like a snowflake)

Mesh

In the above picture, the physical network topology is (star in pentagon)

False

In this UNC example \\mis1\myresources, "mis1" is the name of the network share that is located on the the server named "myresources".

False

It is considered that Ethernet was invented in 1980.

Network

Layer 3 of OSI

False

Layer 4 of the OSI model is called the network layer.

Presentation

Layer 6 of OSI

Application

Layer 7 of OSI

Physical

Layer one of OSI

00-0C-29

Refer to the following physical address: 00-0C-29-E5-84-25 What is the vendor ID or the vendor's OUI?

255.248.0.0

Suppose a IPv4 network has 19 bits in its host ID portion. What will be the subnet mask for this network?

Transport layer protocols:

TCP and UDP

True

The Internet layer in the TCP/IP model is equivalent to the Network layer in the OSI model.

False

The OSI model has 5 communication layers

Full-duplex

The above picture describes which type of transmission mode in terms of data flow directions? (information going in both directions between two computers)

True

The acronym WAN stands for Wide Area Network.

False

The data carried by TCP protocol can not be tracked.

False

The default networking model for Windows operating system is the domain based model.

False

The physical address is defined at layer 3 of the OSI model.

/

The root directory of the entire file system hierarchy of a Linux OS is represented by:

True

To manage a large number of client computers effectively, they can be put in a Windows domain which is created on servers called domain controllers.

True

To protect an enterprise network, we can consider using firewalls, perimeter networks or security zones.

Data sending

Top to Bottom

False

UDP protocol provides guaranteed delivery of data.

True

Using Windows advanced firewall, any TCP or UDP port can be blocked.

OSI layer 3

What layer device is a router

layer 2

What layer hardware is a switch?

broadcast

When a server on a network sends a message to all computers or devices on the network, which type of data casting is this?

Class A

Which class is the following classful IP address? 12.17.5.3

netstat

Which of the following CLI commands can be used to view the active communication connections or sessions on a computer?

80

Which of the following WKP port number is typically used on Web servers? 25 53 80 636

Microsoft Azure

Which one of the follwoings is Microsoft's major cloud computing technology?

Microsoft Office 365

Whihc of the followings is an example of Software as a service (SaaS)?

PaaS flexibility

YES (some flexibility available)

IaaS flexibility

YES (ultimate flexibility)

4

You are working on a computer and see that it has an IPv6 address of 2001:0001::41f0:f763. How many groups of 0s have been compressed

o simplex

a sends to b only, b cannot go back to a (traditional radio, traditional cable)

o full duplex

a sends to b, b sends to a, can at the same time (telephone, modern computer systems)

Group policy definition

a set of rules that provides the centralized management and control of user accounts and computer accounts in an AD environment

routing protocols

adapt quickly to changes in the network

Operating System

manages all the resources (resource allocator) and controls all of the operations (program executions) on a computer

• UDP (user datagram protocol) (network data) (gps)

o Connectioin-less (path is determined during transmission) o Non-reliable o Uses best-effort o "network state data' transmission

• TCP pg.46 (user data) (no gps) (receiver tells sender they got the message)

o Connection-oriented (path is determined first before transmission) o Uses three-way handshake (client, server,...) o Reliable o For user data transmission

• Dropping leading zeros

o Fe80::184:e9f8:a71b:304

• Approaches for error detection

o Redundancy: Using some redundancy can allow us to detect, and possibly correct, some errors of this type The disadvantage is: too much overhead o Parity bit

Concept of peer to peer (bitcoin)

• All computers on a network are equal to each other • Limitation: small number of users (around ten)

Classful IPv4 > CIDR (Classless Inter-Domain Routing)

• CIDR is a subnetting method that enables administrators to place the division between the network bits and the host bits anywhere in the address, not just between octets o Prefix: number of binary bits in the network portion in IP address

WAN (Wide Area Network)

• Connect remote sites • Covers hundreds or thousands of miles

data-casting

(how many computers can receive the message at the same time)

True

Microsoft Windows desktop client operating systems are generally designed for two scenarios: home users and business users.

RIP

Which of the followings is a type of routing protocol that determines the optimal routing path based on the number of hops in a route between a source and destination computer?

Windows ipconfig = CentOS ?

# ifconfig

Windows Ipconfig /? = CentOS ?

# man ifconfig

M=the total number of subnets (outcomes) required

# of bits needed? N=log(m)/log(2)

extended star

(based of star, 4 small stars with central connection point, used on campus) <EXTENDED OR HYBRID (can divide them up into basic) TOPOLOGY

hierarchical

(central connection point of top, used on campuses(this)) <EXTENDED OR HYBRID (can divide them up into basic) TOPOLOGY

ring

(closed loop, computers connected to one another, travel in one direction,90s) <BASIC TOPOLOGY

star

(late 80s to 90s, low cost, open standard, easy to operate, need central connection point, most widely used)<BASIC TOPOLOGY

True

A cloud service typically has a monthly allowance on the amount of traffic included in the monthly cost.

2001::9e76:04c9:009b:3f57:0e98

A computer has an IPv6 address of 2001:0000:0000:9e76:04c9:009b:3f57:0e98. How can this address be simplified using the zero compression approach?

2001::9e76:4c9:9b:3f57:e98

A computer has an IPv6 address of 2001:0000:0000:9e76:04c9:009b:3f57:0e98. How can this address be written using both the dropping leading zeros and zero compression methods?

LAN

A group of computers are connected in a single location such as in a room or on a floor of a building. What is this type of network called?

False

A router is a type of networking device that is typically used to connect client devices or desktop computers to a network.

True

A subnet is a network that can be independently managed.

False

An NAT device can only convert private IP addresses to public IP addresses.

00-C0-F0-27-64-E2

An example of a physical address is ____. 02-AA-BB-CC-E2 00-C0-F0-27-64-E2 137.28.100.100 AA-02-AA-BB-CC-E2-AF

False

Deploying a firewall to protect an entire enterprise network is called domain-level security.

Microsoft Azure

Microsoft Azure is a growing collection of integrated cloud services—analytics, computing, database, mobile, networking, storage, and web services.

True

Microsoft Windows firewall is a software program that can be configured to block incoming or outgoing data traffic based on TCP port numbers.

Airport

Microsoft Windows firewall supports 3 types of location profiles or settings. Which one of the followings is NOT one of them?

10 seconds

To transmit 1,000,000,000 bits of data using a device that has a data transmission rate of 100Mbps, how long will it take?

SMTP

When you send an email, which of the following application layer protocols will be used? SNMP POP HTTP SMTP

ping

Which of the following CLI commands can be used to check end to end connectivity?

SaaS

Which of the following cloud services can NOT be configured?

256.10.1.100

Which of the following is NOT a valid IP address? 137.28.10.10 256.10.1.100 137.28.100.100 20.30.40.50

TCP

Which of the following protocols is not a routing protocol?

IP

Which of the following protocols is not an Application Layer protocol? SMTP POP3 IP FTP

Microsoft Office 365

Which of the followings is NOT a cloud computing service model?

Enable automatice update on a client computer.

Which of the followings is a way to enhance client security?

Windows Server 2016

Which of the followings is not a client OS?

ifconfig

Which one of the following commands allows us to view IP address assigned to a CentOS computer?

switch

connects computers

• Netstat -n

converts foreign to whole numbers instead of letters

o half duplex

data travels one direction at a time, a sends to b, b sends to a, can't at the same time (walkie talking system)

OS mobility

desktop OS vs mobile OS

Computer network

group of connected computers and devices that can transmit data and communicate to each other using the same protocols(set of rules that govern a connection process, how computers connect with one another, must follow same protocol)

Why GP?

group policy centralized management of user and computer configuration settings throughout a network

range coverage

-each wireless network is identified by service set identifier (ssid) -antenna and range

Client OS characteristics

-for individual users -2-4 CPUs -optimized for foreground applications -running foreground applications is the default for client OS

switch

-has physical ports for multiple connections -transmits data based on physical addresses -defined at layer 2

using NAT to protecting an internal network

-intranet: internal LAN -private IP addresses --10, 172, 192 -NAT --translates private IPs to public --translate public IPs to private

OSPF (Open Shortest Path First)

-link state routing protocol defined in RFC 2328 -uses link costs with the lowest values to determine the best path to the destination -widely used on large enterprise networks

5 tasks that can be centrally managed

-manage and control user desktop settings -implement security -run scripts -enable folder redirection -automate software deployment

TCP 20 Bytes

User Transport Layer

use of a proxy server

understanding proxy servers -caching -filtering -content checking

o Client port numbers

dynamic range 49152-65535 not registered anyone can use 16384 whole/port numbers, can have that many sessions, local is client

domain

logical group of computers and users -characterized by centralized authentication and administration -authentication provided through centralized Active Directory -UWEC network domain and group policy

10 gigabit ethernet

10000 mbps

Server

provide service

Presentation Layer

• Determines how to format and present the data o Coding o Compression o Encryption(SSI

mesh

(star where they are all connected to each other(full mesh)[number of links: {n*n-1}/2], very expensive because it requires many cables to be connected, most dependable among all of them, building to building, site to site connections)<EXTENDED OR HYBRID (can divide them up into basic)) TOPOLOGY

False

A computer's MAC or physical address is defined at layer 3 of the OSI model.

False

A router is an OSI layer 4 device.

24

Based on the IPv4 addressing system, how many binary bits are allocated to the host ID portion of a class A network?

126

Based on the classful IPv4 addressing system, how many valid class A networks are available?

8

Based on the original IPv4 addressing system design, how many binary bits are allocated to the host ID portion of a class C IP address?

a server

Based on the screen shot above from a computer, we can say this computer is a [adjust for best performance of : background services]

8

Given the following IP address with its subnet mask. How many bits are in the host ID portion: 190.120.150.166, subnet mask 255.255.255.0

True

Given the following IP address with its subnet mask. The network ID is: 158.20.0.0 158.20.50.66, subnet mask 255.255.0.0

True

IEEE 802.3 represents a family of Ethernet networking standards.

True

IEEE802.3an standard specifies a data transmission rate of 1 Gbps.

True

IaaS allows ultimate flexibility in cloud service configurations.

yum install httpd

Which of the following allows a web site to be created on a CentOS server?

IaaS

Linode offers cloud service at which service level?

SaaS flexibility

NO (SLA is typically used to manage cloud performance)

UDP 8 Bytes

Network Transport Layer

True

The location of a cloud server is a factor to consider when we choose a cloud server to use.

OS editions

home editions vs enterprise/professional editions

OS user orientation

home/casual users vs enterprise users

Server OS other name

multi-user OS

• Redundancy approach: repeat each bit

o Repeat each bit twice. For bit x, transmit xx. If the receiver gets two different bits, it requests retransmission. This is an error-detecting code - it allows one error to be detected, but it is not error-correcting, since retransmission is necessary o Repeat each bit three times. For each bit x, transmit xxx. Now the receiver can correct a single error

• The minimum number of binary bits (x) are needed to represent m different outcomes

o X=[logm/log2] > open square brackets round up o Number of bits for 35 students log(35)/log(2)=5.12928=6 bits Always used 5 digits after decimal place Log(2)=.30103

o Broadcast

one-to-all (sent to everyone on the network; emergency messages, notifications) - what makes a computer network alive, simple, user-friendly [application dependent?]

o Multicast

one-to-many (selective casting, subscription casting; subscriptions to something)

exploring types of names used in networks

progression of name resolution -FQDN (computer name + domain name) -domain name -computer name (NetBIOS name; often called host name) -port number L4 -IP address L3 -MAC address L2

OS openness

proprietary OS vs open source OS

Windows Domain = CentOS ?

realm

cloud install PHP language

yum install PHP

Original Ethernet

• 10 Mbps • Use csma/cd protocol • Use bus topology

cloud OS update

yum update

Windows Firewall Settings

-software (or hardware) that protects your computer in two ways: --monitors incoming traffic from the internet or a network --monitors outgoing traffic from your computer to the internet or a network --rule types -location context --public --home/work --domain

MAC address table/bridge table

-switch -map a physical port to a MAC address

remote connection

-telnet protocol used -PuTTY is a popular program --free and open source terminal emulator for remote connections -it supports several network protocols including SCP, SSH, telnet, rlogin, and raw socket connection -it can also connect to a serial port

file transfer

-transfer files to the server in the cloud using SFTP protocol (FTP over SSH) -use: filezilla --filezilla is a free software, cross-platform FTP application, consisting of filezilla client and filezilla server. client binaries are available for Windows

name of a client computer

-way to identify a computer on a network -also called 'host name' -using default name is not a good practice -rename a client computer is often needed --must have local administrative rights

FastEthernet

• 100 Mbps standards • Use csma • Star topology

Client OS other names

individual OS, desktop or mobile OS

domain-based

most modern networks are based on ? client-server computing

local (standalone) computer vs. domain computer

name of client computer: -BIOS name ('host name') -host name vs. FQDN -FQDN: host name + domain name -FQDN is associated with domain

• Common ports:

o 21 FTP o 22 Secure shell o 23 telnet o 25 SMTP o 110 POP3 o 143 IMAP4 o 80 HTTP o 443 HTTPS o 53 DNS

Parity check code

o A bit string has odd parity value of 0 if the number of 1s in the string is odd o A bit string has odd parity value of 1 if the number of 1s in the string is even

• Zero compression

o Can only do this once o Fe80:0000:0000:0000:0184:e9f8:a71b:0304 Fe80::0184.....

• A, B, C, D, E pg. 92 • Classful IPv4 has 5 classes

o Classes D and E reserved o Class A 1-126 o Class B 128-191 o Class C 192-223

o Unicast

one-to-one (email, purchasing off amazon)

o Special apps

registered port number range 1024-49151 some registered 48128 whole/port numbers, can have that many sessions

routing

the process of deciding the optimal path to send a packet -based on a certain math algorithm

routers

use dynamic routing protocols to build their route tables and advertise route information

o Server port numbers

well known port numbers (wkp) 0-1023 reserved with iana 1024 whole/port numbers, can have that many session, foreign is server

cloud install Apache server

yum install httpd

Ethernet

• Ether + network > EtherNet > Ethernet • Invented initially as a LAN technology by Robert Mecalfe and David Boggs at Xerox in 1973 • Defined at layer 2 with layer 1 specifications • Standardized as IEEE 802.3 standards

OS computer roles

client OS vs server OS

bus

(single networking cable to have all computers connected, used early 70s-80s, cable break causes network to be paralyzed, singles travel in both directions) <BASIC TOPOLOGY

data rate

(specifies how fast device can transmit to a network, or how much data in one second is transmitted)

802.11ac trends

-developed from 2011 to 2013 and approved in January 2014 -will be rolled out in waves

RIP (Routing Information Protocol)

-distance vector routing protocol -uses the number of hops to determine the best path to a destination -used on small networks

Wireless Ethernet (WLAN)

-802.11 family of networking standards -emerging WIFI technology

What is Cent-OS?

-CentOS Linux is a community-supported distribution derived from Red Hat Enterprise Linux (RHEL) -CentOS Linux is functionally compatible with RHEL -CentOS Linux is no-cost and free to redistribute -Each CentOS version is maintained for up to 10 years --each CentOS version is periodically updated (roughly every 6 months) -a new CentOS version is released approx. every 2 years -has client version vs server version

router example

-Cisco 2600 series router -modular -expandable -un-fixed interface

DNS hierarchy

-DNS root servers -top level domain DNS servers -second level domain DNS servers -third and lower level domain DNS servers

router

-OSI layer 3 device -basic internet building block -transmits data based on IP address -examines each IP packet, what is network ID? -maintains routing table for network to network data transmissions -routing table stores info about network connections -uses routing protocols to determine the best path -interconnect independent subnets

File sharing and security

-UNC format --\\servername\share-name --\\IP address\share-name --\\servername.domain-name\share-name -proper credentials needed to access the share --domain user account for domain resource sharing --local used account needed for local sharing -permissions (R, change/write, full control)

2 types of cloud service environment

-VM based cloud service -Containerized cloud service

domain model with Active Directory

-a domain can support hundreds and thousands of domain clients -AD DS -DC -Group Policy

Group Policy

-a way to set up specific configurations for users and computers within an Active Directory domain -can use group policy to control desktop settings -can use group policy to control user behaviors

perimeter network

-area between the internet and intranet -single firewall vs dual firewall

characteristics of a strong password

-at least six characters long -contains characters from each of the following groups: uppercase and lowercase, numbers, symbols -has at least one symbol character in the 2nd through 6th positions (~ ! @ # $)

client computer security: areas to consider

-checking your windows update settings -virus protection -user account control: creating strong passwords -firewall settings -domain security: join/register a client to a domain -network share and security: UNC, permissions

Microsoft Internet Information Services (IIS)

-configure a firewall to control incoming traffic -using IIS as an example -web service as server role

client/server domain-based networking

-dedicated server: physical computers dedicated to run one or more services to serve the needs of the users of other computers on a network -centralized domain-based management -super masters (domain controllers (DC)) -dedicated network staff (expertise) -highly scalable (thousands of users) -one DC up to 5000 users

when will routing be needed?

-determining network IDs -if not on same subnet, routing will be needed and default gateway used

Server OS characteristics

-manages access to a centralized resource or service on a network -designed for multi-user environment -optimized to run back-end applications (web services, ad services, file services) -multiprocessing capabilities (multiple CPUs) --MS server up to 128 CPUs -multiple server roles exist

what would be a server computer (hardware)?

-multiple CPUs -redundant power -redundant network connection -have to run 24/7

Peer to peer or workgroup

-network of computers that allow each other to their files, printers, or internet connection -by default, all Windows computers are placed in a workgroup named WORKGROUP -not scalable (network size: 10-20) -no central security (issue=inherent security weakness)

characteristics of a complex password

-not contain user's account name or parts of full name with 2 consecutive characters -at least six characters long -contains characters from 3/4 groups: uppercase, lowercase, numbers, symbols

essential characteristics of cloud computing

-on demand self service -broad network access -resource pooling -rapid elasticity -measured service

Operating System Basic Functions

-provide an interface to access the hardware (booting a computer) -create an operating environment (API) to run applications -support networking and communications by implementing network protocols and managing network resources (file and print sharing)

WIFI: Wireless ethernet implementation details

-same frame formats as wired Ethernet -CSMA/CA utilized -star topology -family of standards -data rate evolves rapidly

Domain Controllers (DCs)

-servers that host domain security database -requires at least one server system configured as a domain controller -a dedicated server -where domain policy is edited and stored

Network security risks on the internet

-the internet is considered an un-managed network --all internet addresses are public --the internet is TCP/IP based-known to anyone --the world wide web travels over the internet -organizational networks (internal) need to be protected from the internet --use a firewall (hardware; network device) --create an intranet and protect it using NAT --use proxy server --create a perimeter network using firewalls

18.7 Million bits

A book has 550 pages. Assume each page has 50 lines, and each line has 85 characters. If we convert this book into a digital document with no overhead, what is the amout of data generated?

True

After a Windows domain has been created, if a user wants to log on to the domain, then a domain user account must be centrally created.

True

After a client computer has joined to a domain, it can be centrally controlled by domain controllers.

True

An IP address in CIDR notation is 66.16.76.25/16. The equivalent subnet mask is 255.255.0.0

False

An example of UNC format for network file sharing is c:\MyData\spring2018.

Data Receiving

Bottom to top

True

CentOS is an open source OS developed based on Red Hat Enterprise Linux (RHEL).

Types of Physical Ports

E-Ethernet (10 Mbps) F-FastEthernet (100 Mbps) G-GigabitEthernet (1 Gbps) 10G-GigabitEthernet (10 Gbps)

True

Each IPv6 address consists of two components: the network ID and the host ID. Host ID is also called extended unique identifier (EUI).

True

Each IPv6 address has 32 hexadecimal digits.

True

Each type of data commuication application needs to be supported by a corresponing application layer protocol.

22 Bytes

Ethernet Header

4 Bytes

Ethernet Trailer

65536

How many TCP or UDP port numbers are possible?

True

If data needs to be transmitted from one subnet to another, a router and a default gateway will need to be used.

16384

In the IPv4 addressing system, how many class B network ID's are possible? (You may use the MS-Windows or your Calculator.)

49514

In the screen shot above, for the highlighted line, what is the TCP port number used on the local computer? Proto: TCP; Local Address: 10.34.0.80:49514; Foreign Address: 192.231.219.68:80; State: Time Wait

80

In the screen shot above, for the highlighted line, what is the TCP port number used on the remote computer? Proto: TCP; Local Address: 10.34.0.80:49514; Foreign Address: 192.231.219.68:80; State: Time Wait

Transport

Layer 4 of OSI

Session

Layer 5 of OSI

Data Link

Layer two of OSI

cloud computing definition

National Institute of Standards and Technology (NIST) defines cloud computing as: a model for enabling convenient and on-demand network access to a shared pool of configurable computing resources, and these resources (such as networks, servers, storage, applications, and services) can be rapidly provisioned and released with minimal management effort or service provider interaction

False

On a client/server network, all computers are equal to each other.

False

On a computer, only 10 communication sessions can be established as needed.

True

On a domain-based Widnows network, a client computer is identified by its FQDN.

True

On a domain-based Windows network,a domain user account can be used to log on to the domain using any domain computers.

False

On an enterprise network where a DMZ is created, typically key data servers such as personnel database servers are put in the DMZ.

routing protocols examples

RIP-Routing Information Protocol OSPF-Open Shortest Path First

Client

Receive service

True

The logical address is used to determine on which network or subnet a computer is located.

True

The data string 110010011 with 1 odd parity bit is received. Based on the algorithm learned in class, we can say no transmission error has occurred.

True

The password "iS345$589" is a strong password.

Internet Information Services

Which of the following allows a web site to be created on a Windows computer?

cloud start the web server

systemctl start httpd systemctl enable httpd(start at boot)

Active Directory Domain Services (AD DS)

technology that runs the domain security database

gpresult.exe/R

view group policy on a client

Gigabit Ethernet

• 1000 mbps standards

IPv4 protocol

• Defined at the internet layer • Responsible for: o Logical addressing system o Routing Source computer sends packets via local LAN Router forwards packet to another router until destination

Network Layer

• Determines the best route to destinations • Using logical addresses o IPv4 - allows google internet to scale up with no technical difficulties • Protocols: o IPv4 o IPv6 o ARP o IGMP o ICMP: Internet Control Message Protocol > PING command uses this from your computer to destination computer; PING to Death attach overwhelm network o IPSec o RIP - best route determination o OSPF - best route determination • Ipconfig > CLI • CLI: Command Line Interface vs. GUI: Graphic User Interface

Network interface card (network adapter)

• Each computer/device needs a NIC or adapter to be connected to a network • Each NIC provides a device with at least one unique physical address o Each physical address uniquely identifies a device locally o Exception: NIC used on servers typically has multiple physical addresses

Transport Layer

• End to end connectivity o Host to host o Device to device o User to user • Handles flow control, reliability, and error checking o TCP (for user data) Connection-oriented Three-way handshake o UDP (for network configuration data) Connectionless Best effort o User generation and machine generated data both go to layers

Session Layer

• Establish, maintain, and terminate sessions • Could be combined with other layers such as transport layer • Computer networks use port numbers to define sessions • Channel between point a and point be .______. Phone call can have people on call waiting, have multiple browsers open-multiple sessions open, 2^16 bits=65536 sessions, VISA can process like 35000 a second-each connection is a session o Number my computer > number remote computer

TCP/IP Model is a variation of the OSI model

• Four Layers o Application layer o Transport layer o Internet layer o Link layer

LAN (Local Area Network)

• Group of connected devices • Covers a small area; a floor, several floors in a building, a building, or a campus • Use of ethernet standard is dominant

Common application layer protocols

• HTTP o Allow web browsing • HTTPS o Allow secure web browsing • FTP • Telnet (mainframe age) • Remote Desktop Services o Microsoft RDP o For Mac, VNC (Virtual Network Computing)

Understanding the dual IP stack - coexisting

• IPv4-mapped IPv6 addresses o ::FFFF:192.168.1.5 OR o ::FFFF:C0A8:0105 (converted decimal to hex) o First 80 bits set to zero - 16 bits all binary ones - 32 bits IPv4 address

Application Layer

• Interfacing with user applications • Many application layer protocols available: DNS, HTTP, FTP, TFTP, DHCP, LDAP, POP3, SMTP, IMAP, SNMP, SMB • Web browsers: Internet Explorer, Firefox, ... HTTP • Email: Outlook, Mail, ... SMTP/POP3/IMAP • https://facebook.com > user data starts at top goes to bottom • File Transfer: WinSCP • Remote connection: puTTY

Application Layer Protocols: example

• Main protocols o SMTP o POP3 Other protocols: used to transmit network data • TFTP: often used for file transfer on network devices • SNMP • ICMP o Ping Command

Data Link Layer

• Mainly about linking a computer to a LAN • Uniquely identify a computer/device o Physical addresses • Logical Link Control o (LLC): link network segments together o Standardized by IEEE 802.2 committee • Media Access Control (MAC) o Defines physical addresses = MAC add. = hardw... add. o Standardized by different IEEE 802.x committees Ethernet Token Ring • Physical address: HEX, unique similar to IP address

Networking Enterprises (campus network: made up of two stars, also rings or meshes; ECASD; WiscNet)

• Multiple sites are connected • Dedicated server • Centralized policy and security management • Enterprise has no formal definition o Typically thousands of users o May have dozens of administrators

IPv6 2^128 bits

• Next generation internet addressing system o Resolves many problems in IPv4 o 128 bits long Can address 340 undecillion IP addresses 1 undecillion = 36 zeros > 10^36 340 x 10^36 o Accommodates foreseeable global network growth • Uses four digit groups of hexadecimal numbers, separated with using colons o Hexadecimal notation • Composed of 64 bit network ID, 64 host addressing bits; host called extended unique identifier • 2^64 = network addresses globally • 8 groups of four hex digits; 1 hex = 4 bits

Physical Layer

• Responsible for transmitting, receiving bits • Using transmission medium (cables, radio/wireless signals) • Different connectors used > physical interfacing (UTP connectors, etc.)

Subnet Mask

• Subnet mask is not network or IP address - only a way to separate the network address from the host address • Integral part of IPv4 networking • Each IP address has a subnet mask • Subnet mask o 32 bit long o 1's designate network bits, 0's designate host bits o Network ID + Host ID = Ind. IP address

Subnetting and IPv4 network

• The process of dividing an IPv4 network into subnets • Steps: o Determine how many bits to borrow o Figure out the new subnet mask o Creating subnet ID o Figure out host IDs for each subnet

The NIC physical address

• Unique 48 binary bit MAC address > converted into 12 hex digits • Divided the 12 hex digits into 2 groups o First six digits: vendor ID or OUI (first six hex digits) is assigned by IEEE o Last six digits: added in the factory 00-1B-77-85-55-DE First three OUI, last three factory assigned Organizationally unique identifier For each OUI, addresses to create 16^6 or 2^24 $1200 to get OUI


Set pelajaran terkait

4.04 Quiz: Solve Trigonometric Equations

View Set

Suresh AWS Speaker certification

View Set

Comprehension Mini-Quiz: Business Level (Generic) Strategies

View Set

Business Finance Ch9 HW- Connect

View Set

Developing Cardiovascular Fitness

View Set