Comprehensive Overview of Networking Concepts and Technologies

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/95

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

96 Terms

1
New cards

Layer 7 - Application Layer

The top layer of the OSI model that provides network services directly to end-user applications. It's where protocols like HTTP, FTP, SMTP, and DNS operate to format and exchange data.

2
New cards

Physical vs. Virtual Appliances

A dedicated hardware device with a specific function (e.g., a hardware firewall) versus a software-based version that runs on a virtual machine (VM).

3
New cards

IDS (Intrusion Detection System) vs. IPS (Intrusion Prevention System)

One type of system passively monitors and alerts on suspicious activity, while the other sits 'in-line' and can actively block malicious traffic.

4
New cards

Proxy Server

An intermediary server that sits between a client and a destination. It forwards client requests and can be used for filtering, caching, and anonymizing.

5
New cards

Storage Area Network (SAN)

A dedicated, high-speed network that provides block-level storage access to servers, making a pool of storage appear as locally attached disks.

6
New cards

Wireless LAN Controller (WLC)

A centralized device that manages, configures, and monitors multiple 'lightweight' access points on a network.

7
New cards

Content Delivery Network (CDN)

A geographically distributed network of servers that caches content close to end-users to reduce latency and improve content delivery speed.

8
New cards

Quality of Service (QoS)

A set of technologies used to manage network traffic to ensure the performance of critical applications by prioritizing specific types of data.

9
New cards

Network Functions Virtualization (NFV)

The concept of replacing dedicated hardware appliances (like routers and firewalls) with virtualized software equivalents that run on standard servers.

10
New cards

Virtual Private Cloud (VPC)

A logically isolated section of a public cloud where you can launch resources in a virtual network that you define and control.

11
New cards

Network Security Group (NSG) / Security List

A virtual firewall for cloud resources that contains a list of security rules to control inbound and outbound traffic based on IP, port, and protocol.

12
New cards

Internet Gateway vs. NAT Gateway

One type of cloud gateway allows communication between your VPC and the internet, while another type allows instances in a private subnet to initiate outbound traffic to the internet without being directly reachable.

13
New cards

Cloud Connectivity Options (VPN vs. Direct Connect/ExpressRoute)

Methods to connect an on-premises network to the cloud, including using an encrypted tunnel over the internet or a dedicated, private physical connection.

14
New cards

Internet Control Message Protocol (ICMP)

An IP protocol used by network devices to send error messages and operational information; it is the basis for utilities like ping and traceroute.

15
New cards

Generic Routing Encapsulation (GRE)

A tunneling protocol that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an IP network.

16
New cards

Internet Protocol Security (IPSec)

A secure network protocol suite that authenticates and encrypts data packets. It can operate in a mode that encrypts the entire packet or a mode that encrypts only the payload.

17
New cards

Authentication Header (AH) vs. Encapsulating Security Payload (ESP)

In IPSec, one component provides integrity and authentication but no encryption, while the other provides encryption, integrity, and authentication.

18
New cards

Internet Key Exchange (IKE)

The protocol used within the IPSec suite to negotiate security associations (SAs), algorithms, and keys.

19
New cards

Unicast

A one-to-one communication between a single sender and a single receiver.

20
New cards

Communication Method

A communication method where a message is sent from one source to the topologically nearest node out of a group of potential receivers that all share the same destination address.

21
New cards

Anycast

A network traffic pattern that flows into and out of a data center (e.g., from a user to a web server).

22
New cards

North-South Traffic

A network traffic pattern that flows between servers within the same data center (e.g., from an application server to a database server).

23
New cards

East-West Traffic

A network traffic pattern that flows between servers within the same data center (e.g., from an application server to a database server).

24
New cards

Direct Attach Copper (DAC) cable

Short, fixed-length cables with transceivers already attached on both ends, used for high-speed connections in data centers over short distances.

25
New cards

Twinaxial cable

A type of cable, similar to coaxial, but with two inner conductors instead of one, often used for high-speed, short-range signaling.

26
New cards

Ethernet transceiver

A module that converts electrical signals to optical/electrical signals to send and receive data over an Ethernet network.

27
New cards

Fibre Channel (FC) transceiver

A transceiver specifically designed for use in a Storage Area Network (SAN).

28
New cards

SFP (Small Form-factor Pluggable)

A compact, hot-pluggable transceiver that supports speeds like 1 Gbps or 10 Gbps.

29
New cards

QSFP (Quad Small Form-factor Pluggable)

A transceiver providing four channels, allowing for higher speeds like 40 Gbps (QSFP+) or 100 Gbps (QSFP28).

30
New cards

Fibre optic connectors

Common types include the small, square LC connector; the square, push-pull SC connector; and the bayonet-style ST connector.

31
New cards

Hybrid topology

A network topology that is a combination of two or more different basic topologies, such as star and bus.

32
New cards

Three-tier hierarchical model

A traditional network design with three layers: Core, Distribution, and Access.

33
New cards

Collapsed core architecture

A network design, often for smaller networks, where the Core and Distribution layer functions are combined into a single layer.

34
New cards

Spine and leaf architecture

A modern data center network topology where every access (leaf) switch connects to every core (spine) switch, providing high bandwidth and low latency.

35
New cards

Private IP address ranges

IP address ranges of 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.

36
New cards

APIPA (Automatic Private IP Addressing) range

The address range 169.254.0.0/16, which a host uses to self-assign an IP when it cannot contact a DHCP server.

37
New cards

Loopback address

The IPv4 address 127.0.0.1, which refers to the current device and is used for testing the local TCP/IP stack.

38
New cards

Variable Length Subnet Mask (VLSM)

A technique that allows network administrators to divide an IP address space into subnets of different sizes to avoid wasting IP addresses.

39
New cards

Classless Inter-domain Routing (CIDR)

A method for allocating IP addresses and routing that discards the traditional Class A/B/C structure and uses a 'slash notation' (e.g., /24) to represent the network prefix.

40
New cards

Class A, B, C octet ranges

The first octet ranges of 1-126, 128-191, and 192-223 used in traditional, classful IP addressing.

41
New cards

Software-Defined Networking (SDN)

A network architecture that decouples the control plane (decision-making) from the data plane (forwarding), allowing for centralized management.

42
New cards

SD-WAN

An application of SDN principles to Wide Area Networks to manage and optimize traffic across multiple WAN connections from a central controller.

43
New cards

Virtual Extensible LAN (VXLAN)

A network virtualization technology that creates a logical Layer 2 network on top of a physical Layer 3 network, overcoming the scaling limitations of VLANs.

44
New cards

Zero Trust Security Model

A security model based on the principle of 'never trust, always verify,' requiring strict identity verification for every person and device trying to access resources.

45
New cards

Zero Trust Architecture (ZTA)

A cloud-native architecture that combines network security functions with WAN capabilities to securely connect users and systems to applications anywhere.

46
New cards

Secure Access Service Edge (SASE)

The process of managing and provisioning computer data centers and networks through machine-readable definition files rather than manual configuration.

47
New cards

Infrastructure as Code (IaC)

The process of managing and provisioning computer data centers and networks through machine-readable definition files rather than manual configuration.

48
New cards

Border Gateway Protocol (BGP)

The primary exterior gateway protocol used to make routing decisions on the Internet between different autonomous systems (AS).

49
New cards

Enhanced Interior Gateway Routing Protocol (EIGRP)

A Cisco-proprietary, advanced distance-vector routing protocol known for fast convergence.

50
New cards

Open Shortest Path First (OSPF)

An open standard, link-state routing protocol that creates a map of the network and calculates the best path based on cost.

51
New cards

Administrative Distance

A value from 0-255 used by routers to select the best path when multiple routes to the same destination exist from different routing protocols. Lower is better.

52
New cards

Metric (routing)

A value used by a routing protocol to determine the best path to a destination. Different protocols use different values (e.g., hop count, cost, bandwidth).

53
New cards

Network Address Translation (NAT) / Port Address Translation (PAT)

A technology that translates private IP addresses to public IP addresses, often mapping multiple private IPs to a single public IP by using different port numbers.

54
New cards

First Hop Redundancy Protocol (FHRP)

A class of protocols that allows two or more routers to act as a single virtual router, providing a redundant default gateway for hosts.

55
New cards

Virtual IP (VIP)

A shared IP address used by an FHRP that is not tied to a specific physical interface and serves as the default gateway.

56
New cards

Subinterfaces

A logical router interface that allows a single physical interface to route traffic for multiple VLANs, a configuration known as 'router on a stick.'

57
New cards

VLAN (Virtual LAN)

A logical grouping of devices in the same broadcast domain, often configured on switches to segment a network.

58
New cards

VLAN database

A file on a switch that stores VLAN configuration information.

59
New cards

Switch Virtual Interface (SVI)

A virtual Layer 3 interface on a Layer 3 switch that allows the switch to perform inter-VLAN routing.

60
New cards

Native VLAN

A special VLAN on a trunk link where traffic is sent and received in its original, untagged format.

61
New cards

Trunk link

A link between two switches (or a switch and a router) that is configured to carry traffic for multiple VLANs.

62
New cards

Voice VLAN

A separate VLAN configured on a switch port specifically for carrying voice traffic from an IP phone, allowing for QoS to be applied.

63
New cards

802.1Q tagging

The IEEE standard for VLAN trunking that works by inserting a 4-byte tag into the Ethernet frame to identify its VLAN.

64
New cards

Link aggregation

The practice of combining multiple physical network links into a single logical link to increase throughput and provide redundancy.

65
New cards

Maximum Transmission Unit (MTU)

The largest size packet or frame (in bytes) that can be sent in a network. For Ethernet, the standard is 1500 bytes.

66
New cards

Jumbo frame

An Ethernet frame with a payload greater than the standard 1500-byte MTU, typically up to 9000 bytes.

67
New cards

Wi-Fi channel

A specific frequency range within a Wi-Fi band (e.g., 2.4 GHz or 5 GHz) used for communication.

68
New cards

Channel width

The size of a Wi-Fi channel. Wider channels (e.g., 40, 80 MHz) can carry more data but are more susceptible to interference.

69
New cards

802.11h

The newest Wi-Fi band, opened up by the Wi-Fi 6E standard, offering a large amount of uncongested spectrum.

70
New cards

6 GHz Wi-Fi band

A feature on dual-band access points that encourages clients to connect to the less congested 5 GHz band.

71
New cards

Band steering

The MAC address of a single Access Point (AP).

72
New cards

Basic Service Set Identifier (BSSID)

The human-readable name of the Wi-Fi network (the SSID) that can be shared by multiple APs in the same network to allow roaming.

73
New cards

Extended Service Set Identifier (ESSID)

A peer-to-peer Wi-Fi mode where wireless clients connect directly to each other without an AP.

74
New cards

Ad Hoc Mode

The standard Wi-Fi mode where wireless clients connect to a central Access Point (AP).

75
New cards

Infrastructure Mode (Wi-Fi)

A self-contained, standalone AP that is managed individually; also known as a 'fat' AP.

76
New cards

Autonomous access point

An AP that requires a Wireless LAN Controller (WLC) for its configuration and management; also known as a 'thin' AP.

77
New cards

Lightweight access point

The primary wiring point for a building's network where outside lines terminate and main equipment is located.

78
New cards

MDF (Main Distribution Frame)

A secondary wiring closet used to connect devices in a specific area (like a single floor) back to the main wiring closet.

79
New cards

IDF (Intermediate Distribution Frame)

A unit of measure for the height of devices designed for a 19-inch rack, equal to 1.75 inches.

80
New cards

Rack Unit

A patch panel that terminates and manages fiber optic cable connections within a network rack.

81
New cards

Fiber Distribution Panel

A component of rack management that involves calculating the total power consumption of all devices to ensure it does not exceed the circuit's capacity.

82
New cards

Power Load

Key information tracked for every network device, typically including its name, location, owner, and lifecycle status.

83
New cards

Asset inventory

A contract between a service provider and a customer that defines the specific level of service to be provided, including metrics for uptime and performance.

84
New cards

Service-Level Agreement (SLA)

The process of tracking and controlling changes to the configuration of network devices, including maintaining a baseline and documenting changes.

85
New cards

Configuration Management

Summarized network traffic data collected from devices like routers and switches, often used for traffic analysis and monitoring.

86
New cards

Flow Data

A database on a managed device that stores objects and parameters that can be queried or set by a network management system.

87
New cards

Management Information Base (MIB)

A password-like string used by SNMP to provide access to a device's MIB data.

88
New cards

SNMP community string

A solution that collects and analyzes security alerts, logs, and event data from across the network in real-time.

89
New cards

Security Information and Event Management (SIEM)

Common solution types include those for monitoring performance (bandwidth/latency), faults (failures/errors), configuration (changes), and security (threats).

90
New cards

Four main types of monitoring solutions

Besides an IP address, this service can also provide clients with a subnet mask, default gateway, and DNS server addresses.

91
New cards

DHCP options

A method used by IPv6 hosts to automatically generate their own IP address without a DHCP server, using their MAC address and a network prefix from a router.

92
New cards

Stateless Address Autoconfiguration (SLAAC)

A suite of security protocols that adds a layer of security to DNS by enabling responses to be validated with digital signatures.

93
New cards

Domain Name Security Extensions (DNSSEC)

Different types include 'A' (hostname to IPv4), 'AAAA' (hostname to IPv6), 'CNAME' (alias), 'MX' (mail server), and 'PTR' (IP to hostname).

94
New cards

DNS Records

One type of DNS server holds the master, read/write copy of a zone's records, while the other holds a read-only copy for redundancy.

95
New cards

Primary vs. Secondary DNS server

A DNS server that accepts requests from clients and does the full work of finding the answer by querying other DNS servers if necessary.

96
New cards

Recursive DNS Server

A DNS server that accepts requests from clients and does the full work of finding the answer by querying other DNS servers if necessary.