MT - Basic Networking Module 1-2-3

0.0(0)
studied byStudied by 10 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/167

flashcard set

Earn XP

Description and Tags

MT

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

168 Terms

1
New cards

Network

A system that connects computers and other devices to share resources and communicate.

2
New cards

End Device

  • Also known as a host

  • The device where a message originates or is received.

3
New cards

Different Kinds of End Devices:

  • Desktop Computer

  • Laptop

  • Printer

  • IP Phone

  • Wireless Tablet

  • TelePresence Endpoint

4
New cards

Intermediary Device

  • Devices such as switches, routers, and firewalls that interconnect end devices and manage data flow.

  • Regenerate and retransmit data signals.

  • Maintain information about what pathways exist in the network.

  • Notify other devices of errors and communication failures.

5
New cards

Different Kinds of Intermediary Devices:

  • Wireless Router

  • LAN Switch

  • Router

  • Multilayer Switch

  • Firewall Appliance

6
New cards

Medium

  • Communication across a network is carried through a ______ which allows a message to travel from source to destination.

  • Also known as Media

7
New cards

Media/Medium Types:

  • Metal Wires within Cables

  • Glass or plastic fibers within cables (fiber-optic cable)

  • Wireless transmission

8
New cards

Metal wires within cables

Medium type that uses electrical impulses

9
New cards

Glass or plastic fibers within cables (fiber-optic cable)

Medium type that uses pulses of light.

10
New cards

Wireless transmission

Medium type that uses modulation of specific frequencies of electromagnetic waves.

11
New cards

Network diagrams

  • Often called Topology diagrams

  • Use symbols to represent devices within the network.

12
New cards

Physical Topology Diagrams

Illustrate the physical location of intermediary devices and cable installation.

13
New cards

Logical Topology Diagrams

Illustrate devices, ports, and the addressing scheme of the network.

14
New cards

Common Types of Networks:

  • Small Home Networks

  • Small Office/Home Office

  • Medium to Large Networks

  • World Wide Networks

15
New cards

Small Home Networks

Connect a few computers to each other and the Internet

16
New cards

Small Office/Home Office

Enables computer within a home or remote office to connect to a corporate network

17
New cards

Medium to Large Networks

Many locations with hundreds or thousands of interconnected computers

18
New cards

World Wide Networks

Connects hundreds of millions of computers world-wide– such as the internet

19
New cards

Network Infrastructures vary greatly in terms of:

  • Size of the area covered

  • Number of users connected

  • Number and types of services available

  • Area of responsibility

20
New cards

Two most common types of networks:

  1. Local Area Network (LAN)

  2. Wide Area Network (WAN)

21
New cards

Local Area Network (LAN)

  • A network infrastructure that spans a small geographical area, such as a home or office.

  • Interconnect End devices in a limited area

  • Administered by a single organization or individual.

  • Provide high-speed bandwidth to internal devices.

  • Are connected to each other using WANs.

22
New cards

Wide Area Network (WAN)

  • A network infrastructure that spans a wide geographical area, connecting multiple LANs.

  • Interconnects LANs over wide geographical areas.

  • Typically administered by one or more service providers

  • Typically provide slower speed links between LANs

  • May use copper wires, fiber optic cables, and wireless transmissions

23
New cards

Internet

  • It is a worldwide collection of interconnected LANs and WANs.

  • Not owned by any individual or group.

24
New cards

The following groups were developed to help maintain structure on the internet:

  • Internet Engineering Task Force (IETF)

  • Internet Corporation for Assigned Names and Numbers (ICANN)

  • Internet Architecture Board (IAB)

25
New cards

Intranet

A private network that uses internet technology to share information within an organization.

26
New cards

Extranet

A controlled private network allowing access to partners and vendors to specific data.

27
New cards

Home and Small Office Internet Connections

  • Cable

  • DSL

  • Cellular

  • Satellite

  • Dial-up Telephone

28
New cards

Cable

  • High bandwidth

  • Always on

  • Internet offered by cable television service providers

29
New cards

DSL

  • High bandwidth

  • Always on

  • Internet connection that runs over a telephone line

30
New cards

Cellular

Uses a cellphone network to connect to the internet

31
New cards

Satellite

  • Major benefit to rural areas without Internet Service Providers

  • This can provide a connection when a wired solution is not available

32
New cards

Dial-up Telephone

  • An inexpensive

  • Low bandwidth option using a modem

33
New cards

Businesses Internet Connections

  • Dedicated Lease Line

  • Ethernet WAN

  • Business DSL

  • Satellite

34
New cards

Dedicated Lease Line

These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking.

35
New cards

Ethernet WAN

This extends LAN access technology into the WAN.

36
New cards

Business DSL

It is available in various formats including Symmetric Digital Subscriber Lines (SDSL)

37
New cards

The Converging Network

  • Carry multiple services on one link including:

    • data

    • voice

    • video

  • Can deliver data, voice, and video over the same network infrastructure.

  • The network infrastructure uses the same set of rules and standards.

38
New cards

Network Architecture

Refers to the technologies that support the infrastructure that moves data across the network.

39
New cards

There are four basic characteristics that the underlying architectures need to address to meet user expectations:

  • Fault Tolerance

  • Scalability

  • Quality of Service (QoS)

  • Security

40
New cards

Fault Tolerance

  • Network limits the impact of a failure by limiting the number of affected devices.

  • Multiple paths are required for fault tolerance.

  • Reliable networks provide redundancy by implementing a packet switched network:

    • Packet switching splits traffic into packets that are routed over a network.

    • Each packet could theoretically take a different path to the destination.

  • This is not possible with circuit-switched networks which establish dedicated circuits.

41
New cards

Scalability

  • Can expand quickly and easily to support new users and applications without impacting the performance of services to existing users.

  • Network designers follow accepted standards and protocols in order to

    make the networks scalable.

42
New cards

Quality of Service (QoS)

  • It is the primary mechanism used to ensure reliable delivery of content for all users.

  • The router can more easily manage the flow of data and voice traffic.

43
New cards

There are two main types of network security that must be addressed:

  1. Network infrastructure security

  2. Information Security

44
New cards

Network Infrastructure Security

  • Physical security of network devices

  • Preventing unauthorized access to the devices

45
New cards

Information Security

Protection of the information or data transmitted over the network

46
New cards

Three goals of network security:

  1. Confidentiality

  2. Integrity

  3. Availability

47
New cards

Confidentiality

Only intended recipients can read the data

48
New cards

Integrity

Assurance that the data has not be altered with during transmission

49
New cards

Availability

Assurance of timely and reliable access to data for authorized users

50
New cards

Network Trends

  • Bring Your Own Device (BYOD)

  • Online collaboration

  • Video communications

  • Cloud computing

51
New cards

Bring Your Own Device (BYOD)

  • Allows users to use their own devices giving them more opportunities and greater flexibility.

  • Means any device, with any ownership, used anywhere.

  • Allows end users to have the freedom to use personal tools to access information and communicate using their:

    • Laptops

    • Netbooks

    • Tablets

    • Smartphones

    • E-readers

52
New cards

Collaborate

  • Work with others over the network on joint projects.

  • Tools including Cisco WebEx gives users a way to instantly connect and interact.

  • It is a very high priority for businesses and in education.

53
New cards

Video Communication/Video Calls

  • Are made to anyone, regardless of where they are located.

  • It is a powerful tool for communicating with others.

  • It is becoming a critical requirement for effective collaboration.

54
New cards

Cloud Computing

  • Storing and accessing data and applications over the internet instead of local servers.

  • Applications can also be accessed using the Cloud.

  • Allows businesses to deliver to any device anywhere in the world.

  • It is made possible by data centers.

  • Smaller companies that can’t afford their own data centers, lease server and storage services from larger data center organizations in the Cloud.

55
New cards

Public Cloud

Cloud services offered over the public internet, available to anyone.

56
New cards

Private Cloud

Cloud services used exclusively by a single organization.

57
New cards

Hybrid Clouds

  • Made up of two or more Cloud typesfor example, part custom and part public.

  • Each part remains a distinctive object but both are connected using the same architecture.

58
New cards

Custom Clouds

  • Built to meet the needs of a specific industry, such as healthcare or media.

  • Can be private or public.

59
New cards

Security Threats

Potential risks to a network's integrity, confidentiality, and availability.

60
New cards

Different kinds of External Threats:

  • Viruses, worms, and Trojan horses

  • Spyware and adware

  • Zero-day attacks

  • Threat Actor attacks

  • Denial of service attacks

  • Data interception and theft

  • Identity theft

61
New cards

Different kinds of Internal Threats:

  • Lost or stolen devices

  • Accidental misuse by employees

  • Malicious employees

62
New cards

Security Solutions

  • Security must be implemented in multiple layers using more than one security solution.

  • Network security components for home or small office network:

    • Antivirus and anti-spyware software should be installed on end devices.

    • Firewall filtering used to block unauthorized access to the network.

63
New cards

Larger networks have additional security requirements:

  • Dedicated firewall system

  • Access Control Lists (ACL)

  • Intrusion Prevention Systems (IPS)

  • Virtual Private Networks (VPN)

64
New cards

Shell

  • The user interface that allows users to request specific tasks from the computer.

  • These requests can be made either through the CLI or GUI interfaces

65
New cards

Kernel

Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements

66
New cards

Hardware

The physical part of a computer including underlying electronics

67
New cards

Graphical User Interface (GUI)

  • Allows the user to interact with the system using an environment of graphical icons, menu, and windows.

  • It is more user-friendly and requires less knowledge of the underlying command structure that controls the system

  • Examples of these are: Windows, macOS, Linux KDE, Apple IOS, and Android

  • Can fail, crash, or simply not operate as specified. For these reasons, network devices are typically accessed through a CLI.

68
New cards

PC operating system enables user to do the following:

  • Use a mouse to make selection and run programs

  • Enter text and text-based commands

69
New cards

CLI-based network operating system enables a network technician to do the following:

  • Use a keyboard to run CLI-based network programs

  • Use a keyboard to enter text and text-based commands

  • View output on a monitor

70
New cards

Console

A physical management port used to access a device in order to provide maintenance, such as performing the initial configurations.

71
New cards

Secure Shell (SSH)

Establishes a secure remote CLI connection to a device, through a virtual interface, over a network

72
New cards

Telnet

Establishes an insecure remote CLI connection to a device over the network.

73
New cards

Terminal Emulation Programs

  • Are used to connect to a network device by either a console port or by an SSH/Telnet connection

  • There are several terminal emulation programs to choose from, such as PuTTY, Tera Term, and SecureCRT

74
New cards

User EXEC Mode

  • Allows access to only a limited number of basic monitoring commands

  • Identified by the CLI prompt that ends with the > symbol

75
New cards

Privileged EXEC Mode

  • Allows access to all commands and features

  • Identified by the CLI prompt that ends with the # symbol

  • To move from User EXEC Mode to Privileged EXEC Mode, use the enabled command

    • Switch> enable
      Switch#

76
New cards

Global Configuration Mode

  • Used to access configuration options on the device

  • To move in and out of Global Configuration Mode, use the configure terminal command

    • Switch# configure terminal
      Switch(config)#

  • To return to Privileged EXEC mode, use the exit command

    • Switch(config)#exit
      Switch#

77
New cards

Line Configuration Mode

  • Used to configure console, SSH, Telnet, or AUX access.

  • To move in and out of Line Configuration Mode, use the line command followed by the management line type.

    • Switch(config)#line console 0
      Switch(config-line)#

  • To return to Global Configuration Mode, use the exit command

    • Switch(config-line)#exit
      Switch(config)#

78
New cards

Interface Configuration Mode

Used to configure a switch port or router interface

  • Switch(config-if)#

79
New cards

Subconfiguration Modes

  • To move out of any Subconfiguration Mode to get back to Global Configuration Mode, use the exit command.

    • Switch(config-line)#exit
      Switch(config)#

  • To return to Privileged EXEC Mode, use the end command or key combination CTRL+Z.

    • Switch(config-line)#end
      Switch#

  • To move directly from one Subconfiguration Mode to another, type in the desired Subconfiguration Mode command.

    • Switch(config-line)#interface FastEthernet 0/1
      Switch(config-if)#

80
New cards

Keyword

This is a specific parameter defined in the operation system

81
New cards

Argument

This is not predefined; it is a value or variable defined by the user

82
New cards

Boldface

Indicates commands and keywords that are entered as shown.

83
New cards

Italics

Indicates an argument for which you supply values

84
New cards

[Square brackets]

Indicate an optional element (keyword or argument)

85
New cards

{Braces}

Indicate a required element (keyword or argument)

86
New cards

Braces and Vertical Line within Square Brackets ( [x {y | z}] )

  • Indicate a required choice within an optional element.

  • Spaces are used to clearly delineate parts of the command

87
New cards

ping

  • The command is ____ and the user-defined argument is the ip-address of the destination device.

  • For example, ping 10.10.10.5

88
New cards

traceroute

  • The command is __________ and the user-defined argument is the ip-address of the destination device.

  • For example, traceroute 192.168.254.254

89
New cards

Communications Fundamentals

Networks can vary in size and complexity. It is not enough to have a connection, devices must agree on “how” to communicate.

90
New cards

Three elements of any Communication

  • There will be a source (sender).

  • There will be a destination (receiver).

  • There will be a channel (media) that provides for the path of communications to occur.

91
New cards

Communications Protocols

  • All communications are governed by protocols.

  • Protocols are the rules that communications will follow.

  • These rules will vary depending on the protocol.

92
New cards

Rule Establishment

  • Individuals must use established rules or agreements to govern the conversation.

  • The first message is difficult to read because it is not formatted properly. The second shows the message properly formatted:

    knowt flashcard image

  • Protocols must account for the following requirements:

    • An identified sender and receiver

    • Common language and grammar

    • Speed and timing of delivery

    • Confirmation or acknowledgment requirements

93
New cards

Network Protocol Requirements

  • Message encoding

  • Message formatting and encapsulation

  • Message size

  • Message timing

  • Message delivery options

94
New cards

Message Encoding

  • Is the process of converting information into another acceptable form for transmission.

  • Decoding reverses this process to interpret the information.

95
New cards

Message Formatting and Encapsulation

  • When a message is sent, it must use a specific format or structure.

  • Message formats depend on the type of message and the channel that is used to deliver the message.

96
New cards

Message Size

Encoding between hosts must be in an appropriate format for the medium.

  • Messages sent across the network are converted to bits

  • The bits are encoded into a pattern of light, sound, or electrical impulses.

  • The destination host must decode the signals to interpret the message.

97
New cards

Message Timing

Includes the following:

  • Flow Control

  • Response Timeout

  • Access Method

98
New cards

Flow Control

Manages the rate of data transmission and defines how much information can be sent and the speed at which it can be delivered.

99
New cards

Response Timeout

Manages how long a device waits when it does not hear a reply from the destination.

100
New cards

Access Method

Determines when someone can send a message.

  • There may be various rules governing issues like “collisions”. This is when more than one device sends traffic at the same time and the messages become corrupt.

  • Some protocols are proactive and attempt to prevent collisions; other protocols are reactive and establish a recovery method after the collision occurs.