1/243
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
LANs (Local Area Networks)
are the private networks found in homes, offices, and schools.
LANs can vary in size
from a single room to an entire building.
WLAN (Wireless Local Area Networks)
can exist within a LAN or on their own
Protocols
A language used by the computer to speak to each
All computers today uses a protocol suite,
Transmission control Protocol/Internet protocol
TCP and UDP are used by other protocol
to send and receive data
TCP
Transmission Control Protocol
Transmission Control Protocol
Reliable • Connection-oriented • Virtual circuit • Sequenced • Acknowledgements • 24 -60 bytes (high overhead
UDP
User Datagram Protocol
User Datagram Protocol
Unreliable • Connectionless • No virtual circuit • Un-sequenced • No acknowledgments • 8 bytes (lightweight)
File Transfer Protocols used to
share files with users in a LAN or a WAN
File Transfer Protocol
TCP Port 20, 21 • Supports authentication, authorization, and directory browsing • Unencrypted –not recommended, use sftp
Trivial File Transfer Protocol
Used to push(put) or pulls(get) files from a server • Commonly use to manage devices like IP phones, routers and switches • Does NOT support authentication, authorization, or directory browsing • UDP port 69 • Unencrypted –not recommended, use sftp
Secure File Transfer Protocol
is a secure implementation of FTP
Secure File Transfer Protocol (SFTP)
Supports all the same functions as FTP but with encryption • SFTP is an extension of SSH which is why they use the same port number • TCP Port 22
Simple Mail Transfer Protocol sends
outgoing mail to a server • Sends outgoing mail to a server • TCP Port 25
Post Office Protocol (POP3)
Downloads incoming mail from a server • TCP Port 110
Internet Message Access Protocol (IMAP)
synchronizes incoming mail from a server • TCP Port 143
Telnet
provides remote command line access to interact with a server • Considered insecure and should no longer be used, use SSH instead • Used TCP Port 23
Secure Shell
provides encrypted remote command line access to interact with a server • SSH version 2 added SFTP and SCP support • TCP Port 22
Domain Name Service (DNS)
provides name to IP address resolution for host • Resolves Domain name to IP address • TCP/UDP Port 53
Dynamic Host Configuration Protocol
provides various configurations to clients in an IP network via broadcast • UDP port 67 is the server port, and 68 is the client port
Hyper Text Transfer Protocol
is used to transmit webpages • TCP Port 80
Hyper Text Transfer Protocol Secure
used to securely transmit encrypted webpages using SSLor TLS • TCP Port 443
Network Basic Input/Output System
provides various network communication features in a Windows network • Used in Windows before IP networking • NetBIOS over TCP/IP is still used in Windows • TCP/UDP Port 137/139
Simple Network Management Protocol is
used to query, configure, and monitor host in a LAN • SNMPv3 encrypts communication where previous versions did not • UDP Port 161/162
Lightweight Directory Access Protocol
is used in domain-based network environments to facilitate system and user management. • TCP/UPD Port 389
Server Message Block (SMB)
provides file sharing, network browsing, and printing services • Commonly used in Windows networks but supported in Linux, macOS, and many other devices
CIFS(Common Internet File System)
is an open implementation used on Linux and macOS • TCP Port 445
Remote Desktop Protocol
is • used to securely remotely access a Windows desktop • TCP Port 3389
Wireless Networking
Allows devices to connect, to transfer and receive data.
2.4 GHz Spectrum
Long range communications because it has better penetration through barriers • Slowerdata rates compared to 5GHz • Higher rate of interference because of its longer range • Has 11 Channels in total
2.4 has a Higher rate of interference because
of its longer range
2.4 overlapping channels
1,6,11
What the purpose of overlapping channels
to minimize interference
5 Gz has short range communication
because of poor penetration through barriers
Which has faster data rates 2.4 of 5Gz
5Gz
how many channels does 5Gz have
45
How many non-overlapping channels does 5Gz have
non-overlapping
20Mhz use
36,40,44,48,149,153,157,161,165
40MHz use
38,46,151,159
Why does 5Gz have a low rate of interference
Because of its shorter range
Wifi 1 is called
802.11a
Wifi 2 is called
802.11b
Wifi 3 is called
802.11g
Wifi 4 is called
802.11n
Wifi 5 is called
802.11ac
Wifi 6 is called
802.11ax
What the frequency of wifi 1
5Gz
What the frequency of wifi 2
2.4GHz
What is the frequency of wifi 3
2.4GHz
What the frequency of wifi 4
2.4GHz,5GHz
What the frequency of wifi 5
2.4GHz,5GHz
What the frequency of wifi 6
2.4GHz,5GHz
Wifi 1 is compatible with
802.11n/ac/ax
Wifi 2 is compatible with
802.11g/n/ac/ax
Wifi 3 is compatible with
802.11b/n/ac/ax
Wifi 4 is compatible with
802.11a/b/g/ac/ax
Wifi 5 is compatible with
802.11a/b/g/n/ax
Wifi 6 is compatible with
802.11a/b/g/n/ac
Which wifi uses MIMO
Wifi 4
Which wifi uses MU-MIMO (4×4)
Wifi 5
Which wifi uses MU-MIMO (8×8)
Wifi 6
long range fixed wireless devices are used to
connect wireless devices over miles
Long-range fixed wireless are installed and used
point-to-point directional antennas
May have to go to the FCC to get a license
for the radio frequency
Radio-frequency identification
Uses electromagnetic fields to automatically identify and track tags attached to objects
items that use radio-frequency identification
access cards, ezpass toll collections, and inventory management
What is the SSID
Service Set Identifier
What i the Service Set Identifier
The name of the wireless network
What are the steps of an access point configuration
Change the default SSID, Set to an easy-to-identify, unique name, assign a static IP, change the default administration username and password.
What kind of IP should be assigned for the access point configuration
Static
Are SSIDs case-sensitive?
Yes
When assigning access point configuration 2.4GHz should use which channels
1,6,11
Should 5GHZ worry about busy channels as much as 2.4GHz
No, but bust channels should still be avoided.
The further away you are from the access point, the more the signal will
Degrade
Which wireless standard transmits further, 2.4GHz or 5GHz?
2.4GHz
How do barriers affect the transmission signal of an access point.
It reduces the distance of the wireless network.
Walls with ___ will reflect wireless signals limiting their transmission distance.
Pipes and Vents
Which kinds of walls degrades wireless signals more thick or thinner walls
Thicker
interference can be caused by
other wireless networks, devices, microwaves, toaster ovens, HVAC systems, and other high-voltage appliances.
DNS
Translate Domain name to IP address
DHCP
Gives out an IP address on a network
Fileshare
Shares files and folders on a network
Print Servers
Shares printers
Mail servers
Allows users to connect and send and receive email
Syslog
Receives logs from devices in a network
Web Servers
Serves web pages using the HTTP or HTTPS protocol
Authentication
Ensures you are the correct person.
Authorization
Ensure you can access the right data
Accounting
Keeps tracks of what users are doing in their network
Authentication uses
passwords, key chains, biometrics
Authorization is usually done with
file permission
Spam gateways
Keeps spam from entering your emails
Unified threat management (UTM)
A combination of antimalware, firewall and intrusion detection system (IDS)
Load balancers
Allows multiple servers served the same amount of traffic
Proxy servers
Request webpages on behalf of users. Can be used to filter out web traffic, such as blocking users from seeing facebook
Legacy/Embedded systems are
Older systems still on a network