Advanced Networking Reviewer

0.0(0)
studied byStudied by 11 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

flashcard set

Earn XP

Description and Tags

For Final Exam

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

Networking Fundamentals

  • A network is a collection of devices connected together to share data and resources. The main purpose is to provide access to information and communication services.

  • LAN

  • WAN

2
New cards

LAN

Connects devices in a small area such as an office or school.

3
New cards

WAN

  • Covers a large geographic area such as the internet.

  • The Internet is the largest ___ in existence.

4
New cards

TCP/IP Model

  • Application Layer

  • Transport Layer

  • Internet Layer

  • Link Layer

  • The ___ inspired the OSI model but uses only 4 layers instead of 7.

5
New cards

Application Layer

Handles user interaction (HTTP, FTP, SMTP).

6
New cards

Transport Layer

Ensures end-to-end delivery (TCP, UDP).

7
New cards

Internet Layer

Logical addressing and routing (IP, ICMP).

8
New cards

Link Layer

Deals with physical connections (Ethernet, MAC).

9
New cards

Switches and MAC Addresses

  • ___ operate at Layer 2 (Data Link) and forward frames based on ___ stored in their ___ table.

  • A ___ is a 48-bit unique identifier burned into the network interface card.

10
New cards

Cisco CLI and Configuration Modes

  • ___ devices use Command Line Interface (CLI) modes for configuration and troubleshooting.

  • User EXEC mode

  • Privileged EXEC mode

  • Global Configuration mode

  • Interface Configuration mode

  • Using '?' in CLI lists available commands starting with a specific letter.

11
New cards

User EXEC mode

Basic monitoring (Switch>)

12
New cards

Privileged EXEC mode

Advanced monitoring/config (Switch#)

13
New cards

Global Configuration mode

System-wide settings (Switch(config)#)

14
New cards

Interface Configuration mode

Port-specific settings (Switch(config-if)#)

15
New cards

VLANs and Trunking

  • VLAN (Virtual Local Area Network) divides a switch into smaller broadcast domains. 802.1Q ___ allows ___ to span multiple switches.

  • VLAN 1 is the default VLAN in Cisco switches.

16
New cards

Spanning Tree Protocol (STP)

  • ___ prevents Layer 2 loops in switched networks by organizing ports into states: Blocking, Listening, Learning, Forwarding.

  • Root Bridge

  • Root Port

  • Designated Port

  • Without ___, a simple loop can cause a broadcast storm that crashes the network.

17
New cards

Root Bridge

The central reference point in STP.

18
New cards

Root Port

Lowest cost path to the root bridge.

19
New cards

Designated Port

Best path for a given segment.

20
New cards

IP Addressing and Subnetting

  • IPv4 uses 32 bits, IPv6 uses 128 bits. IPv6 solves the problem of IPv4 address exhaustion.

  • IPv4 has about 4.3 billion addresses, while IPv6 supports 340 undecillion addresses.

21
New cards

Routing Concepts

  • Directly Connected

  • Static Route

  • Dynamic Route

  • Default Route

  • OSPF uses a link-state algorithm, while EIGRP uses a hybrid approach.

22
New cards

Directly Connected

Automatically added when interfaces are up.

23
New cards

Static Route

Manually configured by an administrator.

24
New cards

Dynamic Route

Learned through protocols like RIP, OSPF, or EIGRP.

25
New cards

Default Route

Used when no specific route exists (0.0.0.0/0).

26
New cards

WAN Concepts

  • WANs connect devices across long distances using service providers. Examples include MPLS, VPNs, and leased lines.

  • WANs are slower and more expensive than LANs due to distance and infrastructure.

27
New cards

Network Security

  • Network devices can be secured through passwords, banners, and disabling unused ports.

  • Console and VTY password protection.

  • Message of the Day (MOTD) banners for login warnings.

  • Disable unused ports using 'shutdown' or 'port-security'.

  • A well-configured switch can prevent unauthorized devices from joining the network.