Section 2

studied byStudied by 2 people
0.0(0)
Get a hint
Hint

A set of protocols used to connect network devices to each other.

1 / 165

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

166 Terms

1

A set of protocols used to connect network devices to each other.

TCP/IP

New cards
2

Responsible for the communication protocols between nodes. The protocols in this layer include hypertext transfer protocol (HTTP and HTTPS), Secure Shell (SSH), and network time protocol (NTP), among many others.

TCP/IP Application Layer

New cards
3

Responsible for the end-to-end transport of data. The protocols that live in this layer are transmission control protocol (TCP) and user datagram protocol (UDP).

TCP/IP Transport Layer

New cards
4

Defines the logical transmission protocols for the whole network. The main protocols that live in this layer are internet protocol (IP), internet control message protocol (ICMP), and address resolution protocol (ARP).

TCP/IP Network Layer

New cards
5

Establishes how data should be physically sent through the network.

TCP/IP Network Interface Layer

New cards
6

This network model consists of a seven-layer architecture that organizes the sending of data from hosts across a network

The OSI (Open System Interconnection) model

New cards
7

This layer is responsible for the physical connections of the devices in the network. This layer is implemented through the use of devices such as hubs, repeaters, modem devices, and physical cabling.

OSI Physical Layer or Layer 1

New cards
8

This layer is responsible for the error-free delivery of data to the receiving device or node. This layer is implemented through the use of devices such as switches and bridge devices, as well as anything with a network interface, like wireless or wired network cards.

OSI Data Link Layer or Layer 2

New cards
9

This layer is responsible for the transmission of data between hosts in different networks as well as routing of data packets. This layer is implemented through the use of devices such as routers and some switches.

OSI Network Layer or Layer 3

New cards
10

This layer provides services to the application layer and receives services from the network layer. It is responsible for the reliable delivery of data. It segments and reassembles data in the correct order for it to be sent to the receiving device. It may also handle the reliable delivery of data and any retries of data that are lost or corrupted (for example, TCP does this). This layer is often called the heart of OSI.

OSI Transport Layer or Layer 4

New cards
11

This layer is responsible for connection establishment, session maintenance, and authentication.

OSI Session Layer or Layer 5

New cards
12

This layer is responsible for translating data from the application layer into the format required to transmit the data over the network as well as encrypting the data for security if encryption is used.

OSI Presentation Layer or Layer 6

New cards
13

This layer is responsible for network applications (like HTTP or FTP) and their production of data to be transferred over the network.

OSI Application Layer or Layer 7

New cards
14

A device necessary for sending and receiving data over analog lines, such as phone or cable lines.

Modem

New cards
15

A device that acts as a point of connection between two or more networks that forwards data packets between networks. To have internet in your home, you need an this device that connects the networks on the internet to the network of your home. You can access the internet’s network either through a wired Ethernet port of via Wi-Fi.

Router

New cards
16

This device is used to connect devices in a specific network and allows them to communicate efficiently within the network. It is a more complex version of a hub, in that they have the capability to add security measures and function far more intelligently, sending traffic directly from the sender to the receiver without the other devices being aware of the communication. Thus, this device is less chatty and allows for more simultaneous conversations between devices. Most internet routers include a this in the form of wired or wireless Ethernet connections.

Switch

New cards
17

This device is similar to a router in that it connects two or more networks. The difference is that the router analyzes data packets to determine where to send the packet next, whereas this device simply forwards the data to the next network without analysis. This make for fast data transfer that lacks versatility. These devices are not widely used in modern networks, as routers and switches are the favored devices.

Bridge

New cards
18

This is a device used to strengthen, replicate, and regenerate signals that are weakened (for example, because of distance) during transmission. In many large homes, the Wi-Fi signal does not extend to the end of the house farthest from the router. A range extender is a form of this device that takes the distorted Wi-Fi signal and transmits is to the formerly dead zone.

Repeater

New cards
19

This device connects the router to the network, takes the data packets from the router, and sends them to all of the devices connected on the network.

Hub

New cards
20

Operates at the Network and Data Link layers.

Switch (OSI)

New cards
21

Operates at the Network layer.

Router (OSI)

New cards
22

Operates at the Data Link and Physical layers.

Modem (OSI)

New cards
23

Operates at the Data Link layer.

Bridge (OSI)

New cards
24

Operates at the Physical layer.

Repeater (OSI)

New cards
25

This device is a data link layer device. It is available either as a standalone or integrated with other devices, such as wireless routers or modems that can plug in physical devices. It keeps the traffic between the source and destination ports from interfering with other devices in the network.

Switch

New cards
26

This device operates at the network layer and can connect your home network to the Internet. Or, in a business or institutional scenario, it can connect your webserver to your database server.

Router

New cards
27

This can operate at multiple layers of the OSI model, including data link, network, transport, session, and application - and in certain circumstances, presentation as well.

Firewall

New cards
28

At what layers does the firewall defines what traffic should go between two networks?

data link and network

New cards
29

At what layer are the firewall filter settings are port-based?

transport

New cards
30

The firewall that operates at the network and transport layers is called what?

the Layer 4 firewall

New cards
31

The firewall that works at the session, presentation, and application layers is what?

the Layer 7 firewall

New cards
32

What layer firewall is also smart enough to decrypt and analyze the content flowing through, thereby adding one more level of filtering to the IP address and port combination?

The Layer 7 firewall

New cards
33

What is a powerful tool that can help prevent malicious attacks like Structured Query Language, also known as SQL injection, or other malware?

A firewall

New cards
34

These types of are created when pairs of wires are twisted around each other to protect and cancel out interference from each other and outside sources. They are widely used as analog phone cables and in copper Ethernet cables.

UTP Cables

New cards
35

These types of cables are analog cables made of copper but specifically engineered with a metal shield intended to block signal interference. They are mostly used by cable TV companies to connect their customers to the company’s facilities.

Coaxial Cables

New cards
36

These types of cables use glass or plastic threads within cables to transfer data using light (lasers or LEDs) as opposed to traditional metal cables using electricity. They are useful for high bandwidth needs and transfer data digitally, making them more reliable and less susceptible to interference.

Fiber Cables

New cards
37

These types of cables are made up of one single glass or plastic fiber and can carry higher bandwidth for longer distances compared to multimode cables. They are typically used for longer distances and higher bandwidth applications.

Single-mode Fiber Cables

New cards
38

These types of cables are wider in diameter and allow for the transmission of light modes across the cable. They are effective over medium distances and are generally used within a LAN. They are less expensive than single-mode fiber.

Multimode Fiber Cables

New cards
39

These types of cables are used to connect two computing devices of the same type directly to each other. The transmit connector on one end of the wire is connected to the receive connector on the other. These cables are used less frequently today due to built-in capabilities in many standards.

Crossover Cables

New cards
40

These types of cables are used to connect a device to a wall outlet or networking panel. They are commonly used to wire servers in a rack to a switch or connect devices to a network. They are similar in appearance to crossover and UTP cables.

Patch Cables

New cards
41

The ________________, an association of professional electronic and electrical engineers responsible for creating networking standards.

IEEE (Institute of Electrical and Electronics Engineers)

New cards
42

The IEEE standard for wired Ethernet networks.

802.3

New cards
43

The IEEE standard for wireless networks.

802.11

New cards
44

A wired Ethernet standard that provides 1 Gbps transmission over UTP cables.

1000BASE-T

New cards
45

The ability to power a low-power device without plugging it into an electrical outlet, reducing cabling.

Power over Ethernet (PoE)

New cards
46

A wireless networking standard that adds multiple-input multiple-output (MIMO) technology, increasing range and bandwidth.

802.11n

New cards
47

A wireless networking standard that delivers high data rates, up to 1.3 Gbps, in a three-signal design.

802.11ac

New cards
48

A wireless networking standard operating in frequency bands below 1 GHz, designed for IoT devices with limited bandwidth needs over larger distances.

802.11ah

New cards
49

The rebranded name for the 802.11ax standard, which adds support for the 6 GHz frequency range and provides speeds of approximately 1-10 Gbps.

Wi-Fi 6

New cards
50

Command that allows for superuser access so that a user can run commands as an administrator.

sudo

New cards
51

Command that shows how interfaces are set up in a machine.

ifconfig

New cards
52

Command that defines the paths a data packet takes between networks.

route

New cards
53

Command used to verify connectivity and latency.

ping

New cards
54

Command that helps resolve a name associated with an IP address.

nslookup

New cards
55

Local Area Network, a network that connects computers within a limited area, such as a home or office.

LAN

New cards
56

Wide Area Network, a network that connects computers over a large geographical area.

WAN

New cards
57

a software emulation of a computer system.

Virtual Machine

New cards
58

the complete domain name for a specific host on the internet.

FQDN (Fully Qualified Domain Name)

New cards
59

Command that shows the routers and infrastructure devices on the route from one machine to another.

traceroute

New cards
60

Command used to find the owner of a domain and more information about that domain.

whois

New cards
61

A basic tools for testing connectivity to other hosts. It sends an internet control message protocol (ICMP) echo request to a host and listens for the reply. If a reply is received, it will display the time it took and the time to live (TTL) left. It has many options for setting attributes of the request, like the maximum TTL, IPv4/IPv6, and the number of requests to send. It is useful in troubleshooting connectivity with other devices. If a reply is not received, you will receive a timeout message, which could indicate connectivity issues, firewall issues, or both issues with the other device. In addition, due to the time to get a response, the latency between two devices can be measured, enabling a network engineer to troubleshoot performance problems or a network architect to determine where to place devices to minimize response time to other systems and users.

Ping

New cards
62

Commnand(s) used to trace the route an IP packet takes to a destination, displaying each hop (next router) in a numerical list.They are used to trace the route an IP packet takes to a destination. It displays each hop (next router) in a numerical list with the hop’s IP address and the time it takes to receive the packet. It can be useful in determining where a ping fails, troubleshooting performance issues, and other aspects regarding connectivity.

Traceroute/Tracert

New cards
63

Command similar to traceroute/tracert, it displays the path taken by a packet from its source to its destination, primarily used in Linux. It is useful because it can be used by any user instead of needing superuser privileges.

Tracepath

New cards
64

Provides the user with IP, subnet mask, and default gateway information for each network adapter, primarily used in Windows. Adding /release can be used to release all connections and renew all adapters.

Ipconfig

New cards
65

Used to configure kernel network interfaces, primarily used in Linux. It is implemented at the time of booting to configure the necessary interfaces. Once the interfaces are configured, it is used for debugging or tuning the system.

Ifconfig

New cards
66

Displays the IP to physical (MAC) address mappings for hosts in the ARP cache, used for adding, removing, or modifying entries. The hosts need to be on the local network, as these addresses are discovered by broadcasting to everyone on the network and noting the reply from the owner; broadcast traffic is not allowed through a router so that the system will maintain the MAC address of the router.

ARP

New cards
67

Displays information about active ports and their state, useful in troubleshooting and capacity management. Adding -r displays routing information for network adapters. It is available in Windows, MacOS, and Linux.

Netstat

New cards
68

Displays DNS information and troubleshoots DNS problems, useful in displaying names to IP address mappings.

Nslookup

New cards
69

Queries DNS name servers, helpful in troubleshooting DNS problems, and displays answers from the query. It is a replacement for nslookup.

Dig

New cards
70

Is a command that looks up who owns a domain or block of IP addresses on the internet, including name, email address, and physical address, primarily used in Linux. However, there are many privacy options that hide this information from being returned

Whois

New cards
71

Displays the current route tables on a host, used to add or remove routes. This is used by the local host to determine where to send traffic (0.0.0.0 means the default gateway, where the router sends things if it is not otherwise defined in the routing table).

Route

New cards
72

Securely copies files between servers leveraging SSH for authentication and encryption.

SCP

New cards
73

Copies files from one host to another host, data is unencrypted. If encryption is needed, it uses SSL/TLS (Secure Sockets Layer, replaced by Transport Layer Security; the same encryption used in https). Transfer uses TCP (transmission control protocol) for reliability and is often used on the internet and other wide-area networks, where errors may be more common.

FTP

New cards
74

Transfers files between client and server using UDP, usually used on reliable (local) networks.

TFTP

New cards
75

Displays information about a user or users on a remote system, including things such as last log-in time and username, primarily used in Linux.

Finger

New cards
76

Scans networks to find hosts and open ports, commonly used to determine what is deployed on a network for vulnerability analysis, security scans, and related activities. It is not native to either Linux or Windows but can be downloaded for free and used with both.

Nmap

New cards
77

The command traceroute is used for

Linux systems

New cards
78

The command tracert is used for

Windows systems.

New cards
79

Command that displays TCP/IP packets and other network packets that are being transmitted over the network system. It is a form of protocol analyzer (sometimes called a sniffer) and is designed to show the contents of network packets in human-readable form for troubleshooting, security analysis, etc. It is not native to either Linux or Windows but can be downloaded for free and used with both.

tcpdump

New cards
80

Command(s) that allow a user to manage accounts and devices remotely. The main difference between the two is that one is encrypted, and thus all data is secure from eavesdropping, while the other is unencrypted.

telnet/ssh

New cards
81

A network centered around a person and their devices, allowing for communication between devices such as computers, smartphones, and speakers using Bluetooth in the case of wireless connections or USB in the case of wired connections.

Personal Area Network (PAN)

New cards
82

A wireless technology used for short-range communication between devices in a PAN.

Bluetooth

New cards
83

A wired connection used for communication between devices in a PAN.

USB

New cards
84

The ability of devices to work together seamlessly, often seen in Apple products through their iCloud integration.

Integration

New cards
85

When a mobile phone acts as a gateway for other devices to connect to the internet.

Wi-Fi hotspot

New cards
86

A network consisting of computers connected within a limited area, often using Ethernet or Wi-Fi. or both.

Local Area Network (LAN)

New cards
87

A wired connection used for communication between devices in a LAN.

Ethernet

New cards
88

A set of protocols used for communication on LANs, allowing for the transfer of data between devices.

TCP/IP

New cards
89

A wireless technology used for communication between devices in a LAN.

Wi-Fi

New cards
90

The area within which devices can connect to a LAN, often determined by the range of the Wi-Fi signal.

Coverage area

New cards
91

A LAN with wireless connectivity, allowing devices to connect and communicate via Wi-Fi.

Wireless Local Area Network (WLAN)

New cards
92

A wireless technology used for communication between devices in a WLAN.

Wi-Fi

New cards
93

A point of entry or access to the internet for devices connected to a WLAN.

Gateway

New cards
94

A service that allows guests to connect to a WLAN and use the network and internet.

Hotspot service

New cards
95

The ability for users and devices to move freely within the coverage area of a WLAN.

Mobility

New cards
96

A network dedicated to storage devices, allowing servers to access devices like tape libraries and disk arrays.

Storage Area Network (SAN)

New cards
97

Disturbance or disruption caused by other network traffic, which SANs aim to reduce during data transfer.

Interference

New cards
98

A high-speed network technology often used in SANs for storage device communication.

Fibre Channel

New cards
99

The process of moving data from one device or storage system to another within a SAN.

Data transfer

New cards
100

Provides networking of multiple LANs across a limited area. Each LAN would typically be constrained to a single building (or even just a part of a building), and this would link them together in much the same way that a WAN does but over a smaller geographic area. It typically connects LANs owned by a single company, university, government agency, etc.

Campus area network (CAN)

New cards

Explore top notes

note Note
studied byStudied by 5 people
... ago
5.0(1)
note Note
studied byStudied by 14 people
... ago
5.0(1)
note Note
studied byStudied by 79 people
... ago
5.0(4)
note Note
studied byStudied by 2 people
... ago
4.0(1)
note Note
studied byStudied by 73 people
... ago
5.0(1)
note Note
studied byStudied by 27 people
... ago
4.5(2)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 32 people
... ago
4.5(2)

Explore top flashcards

flashcards Flashcard (335)
studied byStudied by 33 people
... ago
5.0(1)
flashcards Flashcard (115)
studied byStudied by 14 people
... ago
5.0(1)
flashcards Flashcard (27)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (44)
studied byStudied by 8 people
... ago
5.0(1)
flashcards Flashcard (94)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (75)
studied byStudied by 307 people
... ago
4.5(2)
flashcards Flashcard (172)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (632)
studied byStudied by 70 people
... ago
5.0(1)
robot