Networking Ch. 1-4

Ace your homework & exams now with Quizwiz!

Unicast address

Specifies a single node on a network

•Any of these server types can co-exist on the same machine (T/F)

T

Wall jacks (TIA/EIA standards)

T I A/E I A standard calls for each wall jack to contain at least one voice and one data outlet

ping (Packet Internet Groper)

Used to verify that T C P/I P is: •Installed •Bound to the N I C •Configured correctly •Communicating with the network

UDP

User Datagram Protocol. Used instead of TCP when guaranteed delivery of each packet is not necessary. UDP uses a best-effort delivery mechanism. •an unreliable, connectionless protocol:

•Port numbers are divided into three types:

Well-known ports - 0 to 1023 Registered ports - 1024 to 49151 Dynamic and private ports - 49152 to 65535

•To view a Window's workstation's A R P table, enter the command:

arp -a

•TLD servers hold information about

authoritative servers owned by various organizations

•Dynamic I P addresses are assigned _____

automatically assigned by a DHCP (Dynamic Host Configuration Protocol) server

VoIP gateway device

converts signals from a campus's analog phone equipment into IP data that can travel over the Internet, or which converts VoIP data from an internal IP network to travel over a phone company's analog telephone lines

INFO

unrestricted top-level domain

reversing an OS patch

use the patch's automatic uninstall utility

reverse a shared application upgrade

use the upgrade's automatic uninstall utility or maintain a complete copy of the previous installation of the application an reinstall over the upgrade

ORG

noncommercial organization

MAC (Media Access Control) address

•Hardware address of the source and destination NICs

•The route command allows you to view a host's routing table: (what command to use on Windows, Linux and Cisco IOS)

•On a Linux or UNIX system, use the command route •On a Windows-based system, use the command route print •On a Cisco I O S, use the command show ip route

Patch panel

•Panel of data receptors that can be mounted to a wall or a rack -Provides central termination point when many patch cables converge in a single location

alternative names for a MAC address

physical address, hardware address, or Data Link layer address

•Use ____ (command) to test for network connectivity

ping

what are network diagrams useful for

planning where to insert a new switch or determining how a particular router, gateway, or firewall interact

Connectivity devices

specialized devices that allow two or more networks or multiple parts of one network to connect and exchange data

Each OS (operating system) is configured to use one of two models to connect to network resources: ...

the peer-topeer model or the client-server model

Name resolution

the process of discovering the IP address of a host when you know the FQDN

•T C P uses a _____ to establish a connection

three-way handshake

Types of cables

•Patch cable—A relatively short length of cabling with connectors at both ends •Horizontal cabling—Connects workstations to the closest data room and to switches housed in the room •Backbone cabling—Consists of cables or wireless links that provide interconnection between the entrance facility and M D F and between M D F and I D Fs

What layer of OSI is the harware and harware protocols, ethernet and wifi

2. Data Link layer 1. Physical layer

Global unicast address prefix + first bits

2000::/3 + first 3 bits are always 001

•Class E begin with octets ____-____ and are used for _____________

240-254; research

Client

A computer making a request from another

-Fully qualified domain name (F Q D N)

A unique character-based name

DNS

Application layer client-server system of computers and databases

Router categories

Core routers, also called interior routers Edge routers, or border routers Exterior routers

Payload

Data that is passed between applications or utility programs and the OS

Session layer

Describes how data between applications is synched and recovered if messages don't arrive intact at the receiving application

link local unicast address prefix

FE80::/64

•Data rooms are often serviced by ____ that are separate from the rest of the building

H V A C systems

logical topology

Has to do with software, how access to the network is controlled, including how users and programs initially gain access to the network, and how specific resources, such as applications and databases, are shared on the network

•Domain names must be registered with an Internet naming authority that works on behalf of ____

ICANN

•IPv6 networks use a version of ICMP called ______

ICMPv6

what explains how to properly handle substances such as chemical solvents and how to dispose of them?

Material Safety Data Sheet (MSDS)

NET

Networks (such as an ISP)

Electrical and tool safety is generally regulated by

O S H A (Occupational Safety and Health Administration)

Multicast address

Packets are delivered to all nodes on a network

POP3

Post Office Protocol 3

Port Address Translation (P A T)

Process of assigning a TCP port number to each ongoing session between a local host and Internet host

continuity

(each cable segment transmits data reliably)

bend radius

(radius of the maximum arc into which you can loop a cable without impairing data transmission)

client-server network model

(which is sometimes called the client-server architecture or client-server topology), resources are managed by the NOS via a centralized directory database. The database can be managed by one or more servers, so long as they each have a similar NOS installed

antages of using peer-to-peer networks:

- They are simple to configure. For this reason, they may be used in environments in which time or technical expertise is scarce. • - They are often less expensive to set up and maintain than other types of networks. A network operating system, such as Windows Server 2016, is much more expensive than a desktop operating system, such as Windows 10 Professional.

P2P (peer-to-peer) network model

- the operating system of each computer on the network is responsible for controlling access to its resources without centralized control (no computer has more authority than another). - The computers, called nodes or hosts on the network, form a logical group of computers and users that share resources - Each computer on a P2P network controls its own administration, resources, and security.

changes to existing software - Patch

-A correction, improvement, or enhancement

•S L A (service-level agreement) + example

-A legally binding contract or part of a contract that defines the aspects of a service provided to a customer -Example: The service provided by an I S P

changes to existing software - Upgrade

-A major change to a software package that enhances the functionality and features of the software

changes to existing software - Rollback

-Also called backleveling or downgrading -Process of reverting to a previous version after attempting to patch or upgrade it

•When a computer is struggling to establish a network connection (action to take)

-Check its T C P/I P configuration settings

•If you are getting D H C P errors or if multiple clients are having trouble connecting to the network (actions)

-Check the settings on your D H C P server -Make sure the D H C P scope is large enough to account for the number of clients the network must support •Consider implementing a shorter lease time on larger networks

•S O W (statement of work)

-Documents in detail the work that must be completed for a particular project

•M O U (memorandum of understanding)

-Documents the intentions of two or more parties to enter into a binding agreement, or contract

•M L A (master license agreement)

-Grants a license from a creator, developer, or producer to a third party for the purposes of marketing or sublicensing, or distributing the product to consumers

I P v 4 addresses

-I P v 4 addresses have 32 bits and are written as four decimal numbers called octets •Each of the four octets can be any number from 0 to 255

Common network configuration errors:

-Incorrect netmask -Incorrect gateway -Duplicate IP address

(cable management) Documentation

-Keep your cable plant documentation accessible -Label every data jack or port, patch panel, and connector -Use color-coded cables for different purposes Update your documentation as you make changes to the network

changes to existing software - Installation

-New software to be installed on relevant devices and incorporated with network resources

•R F P (request for proposal)

-Request to vendors to submit a proposal for a product or service your company wants to purchase

•If the computer is not obtaining an I P address and related information from a D H C P server (action to take)

-Static settings might be using the wrong information -Try switching to D H C P

•Three transmission sent before data transmission: (TCP)

-Step 1—Request for a connection (S Y N) -Step 2—Response to the request (S Y N/A C K) -Step 3—Connection established (A C K)

O S P F (Open Shortest Path First) Characteristics

-Supports large networks—Imposes no hop limits (unlike R I P) -Uses a more complex algorithm for determining best paths -Shared data—Maintains a database of other routers' links -Low overhead, fast convergence—Demands more memory and C P U power for calculations, but keeps network bandwidth to a minimum and provides a very fast convergence time -Stability—Uses algorithms that prevent routing loops Multi-vendor routers—Supported by all modern routers

•tracert or traceroute (why might a trace test stop?)

-The device the trace is attempting to reach is down -It's too busy to process lower-priority messages such as U D P or I C M P -It does not accept the U D P or I C M P transmissions being sent because a firewall blocks these types of messages

•Information that can be obtained from the netstat command includes:

-The port on which a T C P/I P service is running -Which network connections are currently established for a client -How many messages have been handled by a network interface since it was activated -How many data errors have occurred on a particular network interface

•When terminating twisted-pair cabling, don't leave more than ____ of exposed cable before a termination

1 inch

•Class D begin with octets ____-____ and are used for _____________

224-239; multicasting

•A R P is a Layer _____ protocol that uses ____ in Layer ____

2; IP; 3

What layer of OSI is IP, ICMP, and ARP

3. Network Layer

What layer of osi is TCP or UDP

4. Transport layer

•Data portion of an Ethernet frame may contain from __to __bytes

46 to 1500 bytes

What layer of OSI is the TCP Suite and protocols HTTP, HTTPS, SMTP, TRPS

6. Presentation layer and 5. Session layer

What layer of OSI is the world wide web, email, FTP

7. Application Layer

Data Link layer MAC address

A MAC address is embedded on every NIC on the globe and is assumed to be unique to that NIC. A MAC address is 48 bits, written as six hex numbers separated by colons, as in 00:60:8C:00:54:99. Nodes on a LAN find each other using their MAC addresses also called physical address

Windows domain

A logical group of computers that a Windows Server can control

A method used by I P v 6 to transport I P v 6 packets through or over an I P v 4 network

A method used by I P v 6 to transport I P v 6 packets through or over an I P v 4 network

Tunneling

A method used by I P v 6 to transport I P v 6 packets through or over an I P v 4 network

•Administrative distance (A D)

A number indicating the protocol's reliability

•Transport layer port numbers

A port is a number used by the Transport layer to find an application. It identifies one application among several that might be running on a host. For example, a web server application is usually configured to listen for incoming requests at port 80

OSI (Open Systems Interconnection) reference model

A seven-layer model developed to categorize the layers of communication

•On I P v 4 networks, neighbor discovery is managed by ___ with help from ___

ARP; ICMP

A user can sign on to the network from any computer on the network and gain access to the resources that A D allows. What is this managed by?

Active Directory Domain Services (AD DS)

•Routers rate the reliability and priority of a routing protocol's data based on these criteria:

Administrative distance (A D) Convergence time Overhead

•I S-I S (Intermediate System to Intermediate System) + characteristics

An I G P and link-state routing protocol •Uses a best-path algorithm similar to O S P F •Is designed for use on core routers only (unlike O S P F) •Not handcuffed to I P v 4 (like O S P F) so it's easy to adapt to I P v 6 •Service providers generally prefer I S-I S because it's more scalable than O S P F

•Network layer I P address

An IP address is assigned to nearly every interface, which is a network connection made by a node on a network. An IP address can be used to find any computer in the world if the IP address is public on the Internet. Applications such as browsers can store and retrieve IP addresses. But for routing purposes, an IP address is used only at the Network layer

•E I G R P (Enhanced Interior Gateway Routing Protocol) + characteristics

An advanced distance-vector protocol that combines some of the features of a link-state protocol •Often referred to as a hybrid protocol •Fast convergence time and low network overhead •Easier to configure and less C P U-intensive than O S P F •Supports multiple protocols and limits unnecessary network traffic between routers Originally proprietary to Cisco routers

A remote application

An application that is installed and executed on a server, and is presented to a user working at a client computer.

____ don't share their resources directly with each other; instead, access is controlled by _______

Clients; entries in the centralized domain database

Edge routers, or border routers

Connect an autonomous system with an outside network

Socket + example

Consists of host's I P address and the port number of an application running on the host •Colon separates the two values •Example—10.43.3.87:23

Demarc (demarcation point)—

Device that marks where a telecommunications service provider's network ends and the organization's network begins

Gateway

Device that nodes use for access to the outside world

Core routers, also called interior routers

Direct data between networks within the same autonomous system (A S)

•netstat

Displays T C P/I P statistics and details about T C P/I P components/connections on a host

Rack diagram

Drawing that show devices stacked in a rack system

Link-state routing protocols

Enables routers to communicate beyond neighboring routers in order to independently map the network and determine the best path

Work area

Encompasses workstations, printers, and other network devices

Port numbers

Ensure data is transmitted to the correct process among multiple processes running on the computer

Unique local unicast address prefix

FC00::/7 OR FD00::/8

multicast address prefix

FF00::/8

Network diagrams (3 things)

Graphical representations of a network's devices and connections •May show physical layout, logical topology, I P address reserves, names of major network devices, and types of transmission media •provide broad snapshots of a network's physical or logical topology

CNAME (Canonical Name) record

Holds alternative names for a host

T X T (Text) record

Holds any type of free-form text

AA A A (Address) record

Holds the name-to-address mapping, the I P address is an I P v 6 type I P address

Racks

Holds various network equipment

___ on IPV6 networks performs the functions of ICMP and ARP on IPv4 networks

ICMPv6

•Ethernet ____ (gen???) is the current standard. What does it do?

II •Adds both a header and a trailer to the payload •Creates a frame around the payload

____ adds its own Network layer header to the segment or datagram

IP

The principal protocol used by the Network layer is ____

IP (Internet Protocol)

•Routing tables contain _____ and ______ that identify a network that a host or another router belongs to

IP addresses; network masks

what does IP rely on to find the best route for a packet? explain and examples

IP relies on several supporting protocols to find the best route for a packet when traversing several networks on its way to its destination. These supporting protocols include ICMP (Internet Control Message Protocol) and ARP (Address Resolution Protocol). You'll learn more about these protocols later

Explain autoconfiguration IpV6

IP v 6 addressing is designed so that a computer can autoconfigure its own link local IP address Step 1—The computer creates its I P v 6 address •Uses F E 8 0::/64 as the first 64 bits (called prefix) •Last 64 bits can be generated in two ways: -Randomly generated -Generated from the network adapter's MAC address •Step 2—The computer checks to make sure its I P address is unique on the network •Step 3—The computer asks if a router on the network can provide configuration information (message is called a R S or router solicitation) •If a router responds with D H C P information, the computer uses whatever information this might be (called a R A or router advertisement) -Such as the I P addresses of D N S server or the network prefix •Process is called prefix discovery -The computer uses the prefix to generate its own link local or global I P v 6 address by appending its interface I D to the prefix

IMAP4

Internet Message Access Protocol v4

top-level domain

Last part of the FQDN -> Domains (including .net, .org, .com, .mil. and the set .xx country codes) at the end of a domain name are the highest level of the domain name hierarchy.

Protocols

Methods and rules for communication between networked devices

physical topology

Mostly refers to a network's hardware and how computers, other devices, and cables fit together to form the physical network

The peer-to-peer model can be achieved using any assortment of desktop, mobile, or tablet operating systems, but the client-server model requires one or more _______

NOSes (network operating systems), which control access to the entire network

Session Layer Most tasks are performed by the ___ when an application makes an ___ call to the ___

OS; API; OS

Four types of changes to existing software

Patch Upgrade Rollback Installation

reverse an OS upgrade

Prior to the upgrade, make a complete backup of the system; to roll back, restore the entire system from the backup; uninstall an operating system upgrade only as a last resort

Encapsulation

Process of adding a header to the data inherited from the layer above

System life cycle (SLC)

Process of designing, implementing, and maintaining an entire network

Address translation

Process where a gateway device substitutes the private I P addresses with its own public address •When these computers need access to other networks or Internet

Routing metrics

Properties of a route used by routers to determine the best path to a destination

I C M P (Internet Control Message Protocol)

Protocol used by the echo request/reply to carry error messages and information about the network

decapsulation

Removing a header or trailer from a lower OSI layer.

Network layer

Responsible for moving messages from one node to another until they reach the destination host

Presentation layer + example

Responsible for reformatting, compressing, and/or encrypting data in a way that the receiving application can read Example •An email message can be encrypted at the Presentation layer by the email client or by the O S

Transport layer

Responsible for transporting Application layer payloads from one application to another

•Two variations of N A T to be aware of:

S N A T (Static (or Source) Network Address Translation) D N A T (Dynamic Network Address Translation)

_____is used to send email to a recipient's email server, and _____or _____ is used by the client to receive email

SMTP; POP3; IMAP4

DNS server

Server responsible for tracking computer names and their IP addresses

SMTP

Simple Mail Transfer Protocol

Physical layer

Simplest layer and is responsible for sending bits via a wired or wireless transmission

A (Address) record

Stores the name-to-address mapping for a host

•The ___, ___, and ____ layers are intertwined

The Application, Presentation, and Session layers

•Overhead

The burden placed on the underlying network to support the protocol

AD (Active Directory)

The centralized directory database that contains user account information and security for the entire group of computers

S N A T (Static (or Source) Network Address Translation)

The gateway assigns the same public IP address to a host each time it makes a request to access the Internet

D N A T (Dynamic Network Address Translation)

The gateway has a pool of public address that it is free to assign to a local host when it makes a request to access the Internet

Inventory management + benefits

The monitoring and maintaining of all assets that make up a network: •Simplifies maintaining and upgrading a network •Provides network administrators with information about the costs and benefits of certain types of hardware or software

BIND (Berkeley Internet Name Domain)

The most popular DNS server software. BIND is free, open source software that runs on Linux, UNIX, and Windows platforms.

Network mapping

The process of discovering and identifying the devices on a network:

Network services

The resources a network makes available to its users •Includes applications and the data provided by these applications

What makes U D P more efficient than T C P

UDP provides no error checking, sequencing, or flow control (so while it's not as reliable/secure it doesn't spend time on that and therefore is more efficient)

Types of I P v 6 addresses

Unicast address Multicast address Anycast address see ch3 slide 18

IGP (interior gateway protocols)

Used by core routers and edge routers within autonomous systems and are often grouped according to the algorithms they use to calculate best paths:

EGP (exterior gateway protocols)

Used by edge routers and exterior routers to distribute data outside of autonomous systems •The only E G P currently in use is B G P

Routing protocols

Used by routers to communicate with each other to determine the best path

P T R (Pointer) record

Used for reverse lookups

Subnet mask

Used to indicate what portion of an I P address is the network portion (network ID) and what part is the host portion (host ID)

•The Transport layer header addresses the receiving application by a number called ____

a port number

Ethernet

a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems. •Most important Data Link layer standard •Capable of running on a variety of network media •Offers excellent throughput at a reasonable cost •Most popular network technology used on modern LANs

VoIP telephone equipment

also known as IP telephony, is the use of any network (either public or private) to carry voice signals using TCP/IP protocols

A hub

an inefficient and outdated networking device that has been replaced by switches. A hub accepted signals from a transmitting node and repeated those signals to all other connected nodes in a broadcast fashion. On Ethernet networks, hubs once served as the central connection point for a star topology.

Link (sometimes called local link)

any LAN bounded by routers

server

any computer or program that provides a service, such as data or other resources, to other devices

•I P v 6 devices use Neighbor Discovery Protocol (N D P) to ________

automatically detect neighboring devices and automatically adjust when neighboring nodes fail or are removed

•Do not exceed the cable's prescribed _____

bend radius

•A R P relies on _______

broadcasting

COM

commercial

Wiring schematic

graphical representation of a network's wired infrastructure •In detailed form, it shows every wire necessary to interconnect network devices

•TCP/IP protocols add a ____ to data inherited from the layer above it

header

•A topology that combines topologies is known as a _________

hybrid topology

•D N S name servers are organized in what way?

in a hierarchical structure •At the root level, 13 clusters of root server hold information used to locate top-level domain (T L D) servers

Where are the protocols of layer 1 and 2 programmed?

into firmware of a computer's N I C and other hardware

IP address

is an address assigned to each node on a network, which the Network layer uses to uniquely identify them on the network.

Application programming interface (A P I) call

is the method an application uses when it makes a request of the O S

A router

joins two or more networks and passes packets from one network to another

•In addition to protecting against ESD ...

lways shut down and unplug a computer before working inside it

•Static I P addresses are assigned ______

manually by the network administrator

•I P operates at the ______layer of the O S I model: (what actions does it perform?)

network layer; •Specifies where data should be delivered •Identifies the data's source and destination I P addresses

•Reverse D N S lookup—To find the host name of a device whose I P address you know (how do you do this?)

nslookup 69.23.208.74

Controlling how users and programs get access to resources on a network is a function of the ________ used on the network

operating system

•Each organization that provides host services is responsible for ________

providing and maintaining its own D N S authoritative servers for public access

Rack height is measured in _____ with the industry standard being ___tall—about _ feet. Half-racks are usually ___ - ___ tall.

rack units (RU or U); 42U; 6 feet; 18U-22U

ARPA

reverse lookup domain (special internet function)

•T I A/E I A's joint 568 Commercial Building Wiring Standard: •Also known as ______

structured cabling

Authoritative server

the authority on computer names and their IP addresses for computers in their domains

what does the T I A/E I A's joint 568 Commercial Building Wiring Standard describe? where is it applied? where is it best?

the best way to install networking media to maximize performance and minimize upkeep •Apply no matter what type of media, transmission technology, or networking speeds are involved •Based on hierarchical design and assumes a network is based on the star topology

(In TCP) After the three initial messages, _______

the payload or data is sent

reverse a client software upgrade

use the upgrade's automatic uninstall utility, or reinstall the previous version of the client on top of the upgrade

the NOS is responsible for:

• Managing data and other resources for a number of clients • Ensuring that only authorized users access the network • Controlling which types of files a user can open and read • Restricting when and from where users can access the network • Dictating which rules computers will use to communicate • In some situations, supplying applications and data files to clients

disadvantages of using traditional peer-to-peer networks:

• They are not scalable, which means, as a peer-to-peer network grows larger, adding or changing significant elements of the network may be difficult. • They are not necessarily secure, meaning that in simple installations, data and other resources shared by network users can be easily discovered and used by unauthorized people. • They are not practical for connecting more than a few computers because it's too time consuming to manage the resources on the network. For example, suppose you want to set up a file server.

Client-server network advantages relative to peer-to-peer networks

• User accounts and passwords to the network are assigned in one place. • Access to multiple shared resources (such as data files or printers) can be centrally granted to a single user or groups of users. • Problems on the network can be monitored, diagnosed, and often fixed from one location. • Client-server networks are also more scalable than peer-to-peer networks. In other words, it's easier to add computers and other devices to a client-server network.

Several types of records, called resource records are kept in a D N S database

•A (Address) record •A A A A (Address) record •C NAME (Canonical Name) record •P T R (Pointer) record •N S (Name Server) record •M X (Mail Exchanger) record •S R V (Service) record TXT (Text) record

Pathping

•A Windows utility that combines elements of both ping and tracert to provide deeper information about network issues along a route •Sends multiple pings to each hope along a route, then compiles information into a single report

A backbone

•A central conduit that connects the segments (pieces) of a network •Might use higher transmission speeds and different cabling than network cables connected to computers

In client-server applications

•A client computer requests data or a service from a second computer, called the server

Routing table

•A database that maintains information about where hosts are located and the most efficient way to reach them •Routers rely on them to identify which router is the next hop to reach a particular destination host

Router

•A device that manages traffic between two or more networks •Can help find the best path for traffic to get from one network to another

tcpdump

•A free, command-line packet sniffer that runs on Linux and other Unix O Ss •Captures traffic that crosses a computer's network interface •Output can be saved to a file that you can filter or play back •You must either use the sudo command or log in as root to access tcpdump

Discovering neighbor devices

•A process used by routers to learn about all of the devices on their networks:

Network Address Translation (N A T)

•A technique designed to conserve public I P addresses needed by a network

Star topology

•All devices connect to one central device (usually a switch)

nslookup (name space lookup)

•Allows you to query the D N S database from any computer on a network: •To find the host name of a device by specifying its I P address, or vice versa •Useful for verifying a host is configured correctly or for troubleshooting D N S resolution problems

O S P F (Open Shortest Path First)

•An I G P and a link-state protocol used on interior or border routers •Introduced as an improvement to R I P

D M Z or demilitarized zone

•Area between two firewalls

Dynamic routing

•Automatically calculates the best path between two networks and maintains this information in a routing table •Router can detect problems with failed or congested routes and reroute messages through a different path

dig (domain information groper)

•Available on Linux and macO S •Provides more detailed information than nslookup and uses more reliable sources of information to output its results

Microsoft D N S Server

•Built-in D N S service in the Windows Server O S

•I C M P announces transmission failures to the sender but ____

•But does not correct errors it detects

•Ways the resolution process can get more complex:

•Caching server typically is not the same machine as the authoritative server -Caching server exists only to resolve names for its own local clients •Name servers within a company might not have access to root servers •A T L D name server might be aware of an intermediate name server rather than the authoritative name server

Layer 3 switch

•Capable of interpreting Layer 3 data and works much like a router: •Usually faster and less expensive •Primary difference is the way the hardware is built

Layer 4 switch

•Capable of interpreting Layer 4 data: •Also known as content or application switches •Enables switch to perform advanced filtering, keep statistics, and provide security functions Typically used as part of a network's backbone

Static electricity can cause two types of damage

•Catastrophic failure—destroyed beyond use •Upset failure—shorten the life of a component

M D F (main distribution frame/facility)

•Centralized point of interconnection for an organization's LAN or WAN (also called M C or main cross connect)

•Incorrect time (what to do)

•Check a domain computer's time source from a Command Prompt window by entering w32tm /query /source

IPv4 classes (+ types)

•Class A, Class B, Class C, Class D, and Class E Public classes: A, B, C are available for use on the internet

•Protecting against static electricity:

•Computer components are grounded inside a computer case

Routers can do the following:

•Connect dissimilar networks (LANs and WANs) •Interpret Layer 3 and often Layer 4 addressing •Determine the best path for data to follow from point A to point B •Reroute traffic if the path of first choice is down but another path is available

•Three characteristics of T C P:

•Connection-oriented—T C P ensures that a connection or session is established by using a three-step process called a three-way handshake •Sequencing and checksums—T C P sends a character string called a checksum that is checked by the destination host along with a sequence number for each segment •Flow control—Gauges rate of transmission based on how quickly recipient can accept data

Four addressing methods

•Data Link layer MAC address •Network layer I P address •Transport layer port numbers •Application layer F Q D Ns, computer names, and host names

Lifting heavy objects—Follow these guidelines

•Decide which side of object to face so load is most balanced •Stand close to the object with your feet apart •Keep your back straight, bend knees and grip load •Lift with your legs, arms, and shoulders (not your back or stomach) •Keep the load close to your body and avoid twisting your body while you're holding it •To put the object down, keep your back as straight as possible and lower object by bending your knees

Application layer

•Describes the interface between two applications, on separate computers

•An A R P table can contain two types of entries:

•Dynamic—Created when a client makes an A R P request that could not be satisfied by data already in the A R P table Static—Those someone entered manually using the ARP utility (arp command)

where can a MAC address be found?

•Embedded on every network adapter and are considered short-range addresses that can only find nodes on the local network

Fire Suppression Systems

•Emergency alert system •Portable fire extinguishers •Emergency power-off switch •Suppression agent

Data room

•Enclosed space that hold network equipment (also called data closet, data center, equipment room, or telecommunications room)

Exceptions to Ethernet frame size limitations

•Ethernet frames on a V LAN can have an extra 4-byte field between the Source address field and the Type field •Some special-purpose networks use a proprietary version of Ethernet that allows for a jumbo frame

Routers may perform any of the following optional functions:

•Filter broadcast transmissions •Prevent certain types of traffic from getting to a network •Support simultaneous local and remote connectivity •Provide high network fault tolerance through redundant components such as power supplies •Monitor network traffic and report statistics Diagnose internal or other connectivity problems and trigger alarms

•Traditional MAC addresses contain two parts:

•First 24 bits are known as the O U I (Organizationally Unique Identifier) or manufacturer-I D -Assigned by the I E E E •Last 24 bits make up the extension identifier or device I D -Manufacturers assign each N I C a unique device I D

Routing metrics list

•Hop count •Theoretical bandwidth and actual throughput •Delay, or latency, on a potential path •Load, or the traffic or processing burden •M T U (maximum transmission unit) or the largest I P packet size in bytes allowable without fragmentation •Routing cost, or a value assigned to a particular route •Reliability of a potential path Topology of a network

nslookup modes

•Interactive—To test multiple D N S servers at one time •Noninteractive—Test a single D N S server

(DMS Server Software) For a more secure network (things to do)

•Internal and external DNS queries should be handled by different DNS servers •Can use a firewall to filter or block traffic between networks

TCP IP layers and their functions

•Layers 7, 6, and 5—Data and instructions, known as payload, are generated by applications running on source host •Layer 4—A Transport layer protocol, usually T C P or U D P, adds a header to the payload •Includes a port number to identify the receiving app •Layer 3—Network layer adds it own header and becomes a packet •Layer 2—Packet is passed to Data Link layer on N I C, which encapsulates data with its own header and trailer, creating a frame •Layer 1—Physical layer on the N I C receives the frame and places the transmission on the network

•Essential documentation:

•Logical and physical connections on a network •Inventory management •I P address utilization •Vendors •Internal operating procedures •Policies •Standards

•Having up-to-date and detailed documentation of your network is essential for the following reasons:

•Makes communication with coworkers more efficient •Speeds up troubleshooting efforts •Puts information at your fingertips when facing similar problems in the future

•I P is an unreliable, connectionless protocol means what?

•Means that I P does not guarantee delivery of data and no session is established before data is transmitted •I P depends on T C P to ensure messages are put back together in the right order and to ensure each message reaches the correct application on the receiving host

Servers that have a N O S installed require:

•More memory, processing, and storage capacity

Static routing + example

•Network administrators configures a routing table to direct messages along specific paths •Example—A static route between a small business and its ISP

fragmentation

•Network layer protocol will divide large packets into smaller packets •Process called fragmentation

Network mappings tools

•Nmap—One of the most popular tools used for network mapping •Zenmap—N map's G U I option

OSI Layers in order

•Physical, Data Link, Network, Transport, Session, Presentation, Application

Four common types of D N S servers

•Primary D N S server—The authoritative name server for the organization -Holds the authoritative DNS database for the organization's zones •Secondary D N S server—Backup authoritative name server for the organization •Caching D N S server—Accesses the public D N S data and caches the D N S information it collects •Forwarding D N S server—Receives queries from local clients but doesn't work to resolve the queries

The same change management principles apply to any type of change:

•Process all changes through the proper channels •Minimize negative impacts on business procedures •Plan thoroughly to maximize the changes of a successful change on the first attempt •Document each change throughout the process

Protocol header

•Protocols add their own control information in an area at the beginning of the payload (called a header)

Application layer protocols are used by programs that fall into two categories

•Provide services to a user, such as a browser and Web server •Utility programs that provide services to the system, such as S N M P that monitor and gather information about network traffic

I D F (intermediate distribution frame)—

•Provides an intermediate connection between the M D F and end-user equipment on each floor and in each building

•Common software and hardware changes for managing change and maintaining a network efficiency and availiability

•Range from installing patches to replacing network backbone

Switch

•Receives incoming data from one of its ports and redirects it to another port or multiple ports •Will send the data to its intended destination

•Two types of D N S requests:

•Recursive—A query that demands a resolution or the answer "It can't be found" •Iterative—A query where the local server issues queries to other servers -Other servers only provide information if they have it Do not demand a resolution

Exterior routers

•Refers to any router outside the organization's A S -Direct data between autonomous systems

S L C includes

•Removal and disposal of outdated assets •Addition of compatible, updated devices

•Managing change while maintaining network's efficiency and availability: + what is required for enterprise work?

•Requires good planning •Network users need to know when to expect certain network resources to be unavailable •You may also need to know the change management documentation that might be required for an enterprise-scale network

Difference between router and switch:

•Router is like a gateway between networks and belongs to two or more local networks •Switch belongs only to its local network

ipconfig

•Shows current T C P/I P addressing and domain name information on a Windows computer •Use ipconfig/all to see a more complete summary of T C P/I P addressing information

A U D P header contains only four fields

•Source port, Destination port, Length, and Checksum •Note: Use of Checksum field in U D P is optional in I P v 4, but required in I P v 6

Two main Transport layer protocols are

•T C P (Transmission Control Protocol)—Makes a connection with the end host, checks whether data was received; called a connection-oriented protocol •U D P (User Datagram Protocol)—Does not guarantee delivery by first connecting and checking whether data is received; called a connectionless protocol

Two primary protocols

•TCP (Transmission Control Protocol) •IP (Internet Protocol)

•TCP/IP—A suite of protocols including:

•TCP, IP, UDP, ARP, and many others

•M T U (maximum transmission unit)

•The largest size that routers in a message's path will allow at the Network Layer

Protocol data unit (PDU) + alternative names

•The technical name for a group of bits as it moves from one layer to the next and from one LAN to the next •Technicians loosely call this group of bits a message or a transmission

Convergence time

•Time it takes to recognize a best path in the event of a change or network outage

Duplicate MAC Addresses

•Two devices on the same network with the same MAC address is a problem •MAC addresses can be impersonated -A security risk called SPOOFING •Happens most often when managing multiple virtual devices on a large network •Most switches will detect the problem and produce helpful error messages

•Specialized products can monitor the critical factors of a data closet's environment:

•Unacceptable temperature •Humidity •Airflow conditions

Tips for labeling and naming conventions

•Use names that are as descriptive as possible •Only include fields that are essential in identifying the device •Don't overcomplicate the name with useless or redundant information •Use established naming conventions •Think big-picture-down-to-details •Consider any security risks from details included in your naming convention •Use color-coded cables for different purposes and use cable tags to identify each cable's purpose •Label the ports and jacks that cables connect to •Where labels won't fit on the device, draw a simple diagram of each device that indicates how each port is used •Use a portable label maker and use labels that are durable and are designed to stick to plastic and metal

What is UDP useful for

•Useful for live audio or video transmissions over the Internet •Also more efficient for carrying messages that fit within one data packet

ifconfig

•Utility to view and manage T C P/I P settings •If your Linux or UNIX system provides a G U I •Open a shell prompt, then type ifconfig

physical layer - can be transmitted as

•Wavelengths in the air •Voltage on a copper wire •Light (via fiber-optic cabling)

OSHA guidelines when using power tools:

•Wear personal protective equipment (P P E) •Keep all tools in good condition and properly store tools not in use •Use the right tool for the job and operate the tool according to the manufacturer's instructions Watch out for trip hazards, so you and others don't stumble on a tool or cord

Before touching a component, ground yourself by

•Wearing an E S D strap around your wrist that clips onto the chassis or computer case •Touching the case before touching any component inside the case •Storing a component inside an antistatic bag

List of several popular client-server applications

•Web service •Email services •F T P service •Telnet service •Remote applications •Remote Desktop

Dual stacked

•When a network is configured to use both I P v 4 and I P v 6

•I C M P can indicate:

•When part of a network is congested •When data fails to reach its destination •When data has been discarded because the allotted T T L has expired

tracert and traceroute

•Windows tracert utility uses I C M P echo requests to trace the path from one networked node to another, identifying all intermediate hops between the nodes •Linux, UNIX, and O S X systems use the traceroute utility to send U D P messages to a random port on the destination node (concept is the same as tracert) •Both utilities employ a trial-and-error approach to discover the nodes at each hop from source to destination

Use a cable tester to verify ____

•continuity

Sensitive electronic components can be damaged by

•electrostatic discharge (E S D)

where does the link layer put control information?

•in a Link layer header and at the end of the packet in a trailer

What is DNS made up of

•namespace—The entire collection of computer names and their associated IP addresses stored in databases on D N S name servers around the globe •name servers—Hold databases, which are organized in a hierarchical structure •resolvers—A D N S client that requests information from D N S name servers

What info does the Material Safety Data Sheet include?

•physical data, toxicity, health effects, first aid, storage, shipping, disposal, and spill procedures

•Command-link tools are a great resource to troubleshoot network problems

•ping •ipconfig (Windows only) •ifconfig (Linux only) •nslookup dig (Linux only)

•M S A (master service agreement) + example

-A contract that defines the terms of future contracts between parties -Such as payment terms or arbitration arrangements

Troubleshooting steps used by most expert networking troubleshooters

1. Identify problem (Gather information, Identify symptoms, Question users, Determine if anything has changed) 2. Establish theory of probable cause (Question the obvious) 3. Test theory to determine cause (If theory confirmed, determine next steps, If theory not confirmed, establish new theory or escalate) 4. Establish action plan 5. Implement solution or escalate the problem 6. Verify full functionality (Implement preventative measures if applicable) 7.Document findings, actions, outcomes

•The header and FCS make up the ____ (how many bytes) "frame" around the data

18-byte

Distance-vector routing protocols

Calculate path on the basis of the distance to that destination

Global unicast address vs Link local unicast address

Can be routed on the Internet (global) vs Can be used for communicating with nodes in the same link

Anycast address

Can identify multiple destinations, with packets delivered to the closest destination

who sets the standard for diagram symbols used to represent network devices?

Cisco Systems

IPv6 addresses

IPv6 addresses have 128 bits and are written as eight blocks of hexadecimal •Each block is 16 bits •Leading zeros in a four-character hex block can be eliminated •If blocks contain all zeroes, they can be written as double colons (::), only one set of double colons is used in an I P address

M X (Mail Exchanger) record

Identifies a mail server and is used for email traffic

S R V (Service) record

Identifies the hostname and port of a computer that hosts a specific network services besides email

Entrance facility

Incoming network (such as Internet) connects with the school or corporate network

N S (Name Server) record

Indicates the authoritative name server for a domain

•B G P (Border Gateway Protocol) + characteristcs

The only current E G P and is known as the "protocol of the Internet" •Can span multiple autonomous systems •A path-vector routing protocol that communicates via B G P-specific messages that travel between routers •Determines the best paths based on many different factors •Can be configured to follow policies that might avoid a certain router or instruct a group of routers to prefer a particular route The most complex of the routing protocols

•T C P operates in the _________ of O S I model

Transport layer

Neighbors (ipv6)

Two or more nodes on the same link

what determines the link layer protocol that is used? + examples

Type of networking hardware or technology used on a network •Ethernet and Wi-Fi are examples

NOS examples

Windows Server 2016, Ubuntu Server, and Red Hat Enterprise Linux (Ubuntu and Red Hat are versions of Linux)

I C M P

a Network layer, core protocol that reports on the success or failure of data delivery •Provides critical information for troubleshooting network problems

•Three switches daisy-chained together in a single line is said to use_______________

a bus topology

•In U D P, the message is called ____

a datagram

Grounding

a device is connected directly to the earth

what is the entire link layer called

a frame

network

a group of computers and other devices (such as printers) that are connected by some type of transmission media

An interface

a node's attachment to a link

•The entire Network layer message is called ____

a packet

A network begins at the ____and ends at a ___

demarc; workstation

A topology

describes how the parts of a whole work together. When studying networking, you need to understand both the physical topology and the logical topology of a network

•A R P works in conjunction with I P v 4 to _______

discover the MAC address of a host or node on the local network •And to maintain a database that maps IP addresses to MAC addresses on the local network

What does TCP do if message is too large

divides it into smaller messages called segments

•The ping utility sends out a signal called an _____request to another device (request for a response) •Other computer responds in the form of _____

echo; an echo reply

•Required process will vary but expect the following regarding documentation (when wanting to change something in an organization):

•Submit a change request document •Understand and follow the approval process •The change is project managed (change coordinator is usually assigned) •Provide additional documentation that could include: -Network configuration -IP address utilization -Additions to the network -Physical location changes Close the change


Related study sets

All Driving signs MUST KNOW!!👍🏾 🚗

View Set

The Second Industrial Revolution

View Set

Ch.11 Health Promotion of the Toddler and Family

View Set

CH. 18 Management of Patients with Upper Respiratory Tract Disorders

View Set

Ch 8 Transport across membranes: Overcoming the permeability barrier

View Set

Module 23 - How does mass affect a star?

View Set