Networking +

0.0(0)
studied byStudied by 2 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/243

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

244 Terms

1
New cards

LANs (Local Area Networks)

are the private networks found in homes, offices, and schools.

2
New cards

LANs can vary in size

from a single room to an entire building.

3
New cards

WLAN (Wireless Local Area Networks)

can exist within a LAN or on their own

4
New cards

Protocols

A language used by the computer to speak to each

5
New cards

All computers today uses a protocol suite,

Transmission control Protocol/Internet protocol

6
New cards

TCP and UDP are used by other protocol

to send and receive data

7
New cards

TCP

Transmission Control Protocol

8
New cards

Transmission Control Protocol

Reliable • Connection-oriented • Virtual circuit • Sequenced • Acknowledgements • 24 -60 bytes (high overhead

9
New cards

UDP

User Datagram Protocol

10
New cards

User Datagram Protocol

Unreliable • Connectionless • No virtual circuit • Un-sequenced • No acknowledgments • 8 bytes (lightweight)

11
New cards

File Transfer Protocols used to

share files with users in a LAN or a WAN

12
New cards

File Transfer Protocol

TCP Port 20, 21 • Supports authentication, authorization, and directory browsing • Unencrypted –not recommended, use sftp

13
New cards

Trivial File Transfer Protocol

Used to push(put) or pulls(get) files from a server • Commonly use to manage devices like IP phones, routers and switches • Does NOT support authentication, authorization, or directory browsing • UDP port 69 • Unencrypted –not recommended, use sftp

14
New cards

Secure File Transfer Protocol

is a secure implementation of FTP

15
New cards

Secure File Transfer Protocol (SFTP)

Supports all the same functions as FTP but with encryption • SFTP is an extension of SSH which is why they use the same port number • TCP Port 22

16
New cards

Simple Mail Transfer Protocol sends

outgoing mail to a server • Sends outgoing mail to a server • TCP Port 25

17
New cards

Post Office Protocol (POP3)

Downloads incoming mail from a server • TCP Port 110

18
New cards

Internet Message Access Protocol (IMAP)

synchronizes incoming mail from a server • TCP Port 143

19
New cards

Telnet

provides remote command line access to interact with a server • Considered insecure and should no longer be used, use SSH instead • Used TCP Port 23

20
New cards

Secure Shell

provides encrypted remote command line access to interact with a server • SSH version 2 added SFTP and SCP support • TCP Port 22

21
New cards

Domain Name Service (DNS)

provides name to IP address resolution for host • Resolves Domain name to IP address • TCP/UDP Port 53

22
New cards

Dynamic Host Configuration Protocol

provides various configurations to clients in an IP network via broadcast • UDP port 67 is the server port, and 68 is the client port

23
New cards

Hyper Text Transfer Protocol

is used to transmit webpages • TCP Port 80

24
New cards

Hyper Text Transfer Protocol Secure

used to securely transmit encrypted webpages using SSLor TLS • TCP Port 443

25
New cards

Network Basic Input/Output System

provides various network communication features in a Windows network • Used in Windows before IP networking • NetBIOS over TCP/IP is still used in Windows • TCP/UDP Port 137/139

26
New cards

Simple Network Management Protocol is

used to query, configure, and monitor host in a LAN • SNMPv3 encrypts communication where previous versions did not • UDP Port 161/162

27
New cards

Lightweight Directory Access Protocol

is used in domain-based network environments to facilitate system and user management. • TCP/UPD Port 389

28
New cards

Server Message Block (SMB)

provides file sharing, network browsing, and printing services • Commonly used in Windows networks but supported in Linux, macOS, and many other devices

29
New cards

CIFS(Common Internet File System)

is an open implementation used on Linux and macOS • TCP Port 445

30
New cards

Remote Desktop Protocol

is • used to securely remotely access a Windows desktop • TCP Port 3389

31
New cards

Wireless Networking

Allows devices to connect, to transfer and receive data.

32
New cards

2.4 GHz Spectrum

Long range communications because it has better penetration through barriers • Slowerdata rates compared to 5GHz • Higher rate of interference because of its longer range • Has 11 Channels in total

33
New cards

2.4 has a Higher rate of interference because

of its longer range

34
New cards

2.4 overlapping channels

1,6,11

35
New cards

What the purpose of overlapping channels

to minimize interference

36
New cards

5 Gz has short range communication

because of poor penetration through barriers

37
New cards

Which has faster data rates 2.4 of 5Gz

5Gz

38
New cards

how many channels does 5Gz have

45

39
New cards

How many non-overlapping channels does 5Gz have

non-overlapping

40
New cards

20Mhz use

36,40,44,48,149,153,157,161,165

41
New cards

40MHz use

38,46,151,159

42
New cards

Why does 5Gz have a low rate of interference

Because of its shorter range

43
New cards

Wifi 1 is called

802.11a

44
New cards

Wifi 2 is called

802.11b

45
New cards

Wifi 3 is called

802.11g

46
New cards

Wifi 4 is called

802.11n

47
New cards

Wifi 5 is called

802.11ac

48
New cards

Wifi 6 is called

802.11ax

49
New cards

What the frequency of wifi 1

5Gz

50
New cards

What the frequency of wifi 2

2.4GHz

51
New cards

What is the frequency of wifi 3

2.4GHz

52
New cards

What the frequency of wifi 4

2.4GHz,5GHz

53
New cards

What the frequency of wifi 5

2.4GHz,5GHz

54
New cards

What the frequency of wifi 6

2.4GHz,5GHz

55
New cards

Wifi 1 is compatible with

802.11n/ac/ax

56
New cards

Wifi 2 is compatible with

802.11g/n/ac/ax

57
New cards

Wifi 3 is compatible with

802.11b/n/ac/ax

58
New cards

Wifi 4 is compatible with

802.11a/b/g/ac/ax

59
New cards

Wifi 5 is compatible with

802.11a/b/g/n/ax

60
New cards

Wifi 6 is compatible with

802.11a/b/g/n/ac

61
New cards

Which wifi uses MIMO

Wifi 4

62
New cards

Which wifi uses MU-MIMO (4×4)

Wifi 5

63
New cards

Which wifi uses MU-MIMO (8×8)

Wifi 6

64
New cards

65
New cards

long range fixed wireless devices are used to

connect wireless devices over miles

66
New cards

Long-range fixed wireless are installed and used

point-to-point directional antennas

67
New cards

May have to go to the FCC to get a license

for the radio frequency

68
New cards

Radio-frequency identification

Uses electromagnetic fields to automatically identify and track tags attached to objects

69
New cards

items that use radio-frequency identification

access cards, ezpass toll collections, and inventory management

70
New cards

What is the SSID

Service Set Identifier

71
New cards

What i the Service Set Identifier

The name of the wireless network

72
New cards

What are the steps of an access point configuration

Change the default SSID, Set to an easy-to-identify, unique name, assign a static IP, change the default administration username and password.

73
New cards

What kind of IP should be assigned for the access point configuration

Static

74
New cards

Are SSIDs case-sensitive?

Yes

75
New cards
76
New cards

When assigning access point configuration 2.4GHz should use which channels

1,6,11

77
New cards

Should 5GHZ worry about busy channels as much as 2.4GHz

No, but bust channels should still be avoided.

78
New cards

The further away you are from the access point, the more the signal will

Degrade

79
New cards

Which wireless standard transmits further, 2.4GHz or 5GHz?

2.4GHz

80
New cards

How do barriers affect the transmission signal of an access point.

It reduces the distance of the wireless network.

81
New cards

Walls with ___ will reflect wireless signals limiting their transmission distance.

Pipes and Vents

82
New cards

Which kinds of walls degrades wireless signals more thick or thinner walls

Thicker

83
New cards

interference can be caused by

other wireless networks, devices, microwaves, toaster ovens, HVAC systems, and other high-voltage appliances.

84
New cards

DNS

Translate Domain name to IP address

85
New cards

DHCP

Gives out an IP address on a network

86
New cards

Fileshare

Shares files and folders on a network

87
New cards

Print Servers

Shares printers

88
New cards

Mail servers

Allows users to connect and send and receive email

89
New cards

Syslog

Receives logs from devices in a network

90
New cards

Web Servers

Serves web pages using the HTTP or HTTPS protocol

91
New cards

Authentication

Ensures you are the correct person.

92
New cards

Authorization

Ensure you can access the right data

93
New cards

Accounting

Keeps tracks of what users are doing in their network

94
New cards

Authentication uses

passwords, key chains, biometrics

95
New cards

Authorization is usually done with

file permission

96
New cards

Spam gateways

Keeps spam from entering your emails

97
New cards

Unified threat management (UTM)

A combination of antimalware, firewall and intrusion detection system (IDS)

98
New cards

Load balancers

Allows multiple servers served the same amount of traffic

99
New cards

Proxy servers

Request webpages on behalf of users. Can be used to filter out web traffic, such as blocking users from seeing facebook

100
New cards

Legacy/Embedded systems are

Older systems still on a network