Networking

studied byStudied by 2 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 137

flashcard set

Earn XP

Description and Tags

Studying networking terms & practical applications

138 Terms

1

Network

A connection of technological devices

New cards
2

The Internet

Network consisting of many smaller networks within itself

New cards
3

IP Address

Internet Protocol - a way of identifying a host on a network

New cards
4

Public IP Address

Used to identify a device on the internet

New cards
5

Private IP Address

Used to identify a device amongst other devices

New cards
6

ISP

Internet Service Provider

New cards
7

IPv4

2³² available addresses - number divided into four octets of (0-255)

New cards
8

IPv6

2^128 available addresses - number divided into 8 hexadecimal numbers

New cards
9

MAC Address

Media Access Control - physical network interface microchip on a device’s motherboard, 12 character hexadecimal number split into two’s and separated by a colon

New cards
10

ICMP

Internet Control Message Protocol - used by ping to send packets to determine the performance of a connection between devices

New cards
11

LAN

Local Area Network

New cards
12

Star Topology

Devices are individually connected via a central networking device such as a switch or a hub

New cards
13

Bus Topology

Relies upon a single connection known as a backbone cable

New cards
14

Ring Topology

Devices are connected directly to each other to form a loop

New cards
15

Switch

Dedicated devices within a network that are designed to aggregate multiple other devices using ethernet. These various devices plug into a switch’s port

New cards
16

Router

Router’s connect networks and pass data between them

New cards
17

Routing

Label given to the process of data traveling across networks. Involves creating a path between networks so this data can be successfully delivered.

New cards
18

Subnetting

Splitting up a network into smaller, miniature networks within itself. Achieved by splitting up the number of hosts that can fit within the network, represented by a number called a subnet mask

New cards
19

How do subnets use IP Addresses?

1: identify the network address

2: identify the host address

3: identify the default gateway

New cards
20

ARP Protocol

Address Resolution Protocol - allows a device to associate its MAC address with an IP Address on the network. Each device on a network will keep a log of the MAC address associated with other devices on it’s cache.

New cards
21

ARP Request

A message is broadcasted to every other device on a network asking if the device’s MAC address matches the requested IP address

New cards
22

ARP Reply

If the device doesn’t have the requested IP, the reply is returned to the initial device which will now remember this and store it in it’s cache

New cards
23

DHCP

Dynamic Host Configuration Protocol - When a device connects to a network, if it has not already been manually assigned an IP address, it sends out a request (DHCP Discover) to see if any DHCP servers are on the network. The DHCP server then replies back with an IP address the device could use (DHCP Offer). The device then sends a reply confirming it wants the offered IP Address (DHCP Request), and then lastly, the DHCP server sends a reply acknowledging this has been completed, and the device can start using the IP Address (DHCP ACK).

New cards
24

OSI Model

Open Systems Interconnection Model - provides a critical framework dictating how all networked devices will send, receive, and interpret data

New cards
25

Layer 7 - Application

The application layer is the layer in which protocols and rules are in place to determine how the user should interact with data sent or received

New cards
26

Layer 6 - Presentation

The presentation layer acts as a translator for data to and from the application layer. The receiving computer will also understand data sent to a computer in one format destined for another format.

New cards
27

Layer 5 - Session

The session layer synchronizes the two computers to ensure that they are on the same page before data is sent and received. Once these checks are in place, the session layer will begin to divide up the data sent into smaller packets of data and begin to send these packets one at a time

New cards
28

Layer 4 - Transport

The transport layer plays a vital part in transmitting data across a network using one of two different protocols, TCP or UDP

New cards
29

TCP

Transmission Control Protocol. TCP is designed with reliability and guarantee in mind. It reserves a constant connection between the two devices for the amount of time it takes for the data to be sent and received, and incorporates error checking into its design

New cards
30

UDP

User Datagram Protocol. Not nearly as advanced as TCP, or boast as many features as TCP. There is no synchronization between the two devices or guarantee the data is transmitted

New cards
31

Layer 3 - Network

The network layer is where the magic of routing & re-assembly of data takes place. Uses OSPF (Open Shortest Path First) and RIP (Routing Information Protocol) to determine the most optimal path

New cards
32

Routing

Determines the most optimal path in which chunks of data should be sent

New cards
33

Layer 2 - Data Link

The data link layer focuses on the physical addressing of the transmission. It receives a packet from the network layer and adds in the physical MAC address of the receiving endpoint.

New cards
34

NIC

Network Interface Card - exists inside of every network-enabled computer and comes with a unique MAC address to identify it

New cards
35

Layer 1 - Physical

The physical layer references the physical components of the hardware used in networking and is the lowest layer you will find. Devices use electrical signals to transfer data between each other in a binary numbering system

New cards
36

Packets and Frames

Small pieces of data that when forming together make a larger piece of information or message. A frame exists at the data link layer of the OSI model, with no information such as an IP address. Packets are encapsulated and have IP address information.

New cards
37

Packet Efficiency

Packets are an efficient way of communicating data across network devices because it is exchanged in small pieces, and there is less of a chance of bottlenecking occurring across a network.

New cards
38

TCP Packets Headers

Time to Live - this field sets an expiry timer for the packet to not clog up your network if it never manages to reach a host or escape

Checksum - this field provides integrity checking for protocols such as TCP/IP. If any data is changed, this value will be different from what was expected and therefore corrupt

Source Address - The IP Address of the device that the packet is being sent from so that data knows where to return to

Destination Address - The device’s IP Address the packet is being sent to so that data knows where to travel next

New cards
39

TCP/IP Three-Way Handshake

SYN - a SYN message is the initial packet sent by a client during the handshake. This packet is used to indicate a connection and synchronize the two devices together.

SYN/ACK - This packet is sent by the receiving device (server) to acknowledge the synchronization attempt from the client

ACK - The acknowledgement packet can be used by either the client or server to acknowledge that a series of messages/packets have been successfully received

DATA - Once a connection has been established, data (such as bytes of a file) is sent via the “DATA” message

FIN - This packet is used to cleanly close the connection after it has been complete

RST - This packet abruptly ends all communication. This is the last resort and indicates there was a problem during the process.

New cards
40

ISN

Initial Number Sequence. Any sent data is given a random number sequence and is reconstructed using this numbers sequence and incrementing by 1

New cards
41

Ports

An essential point in which data can be exchanged. These ports enforce what can park and where, as well as enforce strict rules when communicating with one another. Ports contain a numerical value between 0 and 65535

New cards
42

Important Protocol Ports

File Transfer Protocol (FTP) - Port 21

Secure Shell (SSH) - Port 22

HyperText Transfer Protocol (HTTP) - Port 80

HyperText Transfer Protocol Secure (HTTPS) - Port 443

Server Message Block (SMB) - Port 445

Remote Desktop Protocol (RDP) - Port 3389

New cards
43

Port Forwarding

An essential component in connecting applications and services to the internet. Without port forwarding, applications and services such as web servers are only available to devices within the same direct network.

New cards
44

Firewall

A device within a network responsible for determining what traffic is allowed to enter and exit. Can be configured by an admin to permit or deny traffic from entering or exiting through packet inspection

New cards
45

Stateful Firewall

This type of firewall uses the entire information from a connection; rather than inspecting an individual packet, this firewall determines the behavior of a device based upon the entire connection. Consumes many resources as the decision making is dynamic.

New cards
46

Stateless Firewall

This firewall type uses a static set of rules to determine whether ornate individual packets are acceptable or not. Whilst these firewalls use much fewer resources, they are not as smart.

New cards
47

VPN

Virtual Private Network. A technology that allows devices on separate networks to communicate securely by creating a dedicated path (tunnel) between each other over the internet. Devices connected within this tunnel form their own private network.

New cards
48

VPN Technology

PPP - used by PPTP to allow for authentication and provide encryption of data. VPN’s work by using a private key and public certificate. A private key and certificate must match for you to connect.

PPTP - Point to Point Tunneling Protocol is the technology that allows data from PPP to travel and leave a network.

IPSec - Internet Protocol Security encrypts data using the existing IP framework.

New cards
49

VLAN

Virtual Local Area Network allows specific devices within a network to be virtually split up. This split allows them to all benefit from things such as Internet connection but are treated separately.

New cards
50

DNS

Domain Name System provides a simple way for us to communicate with devices on the Internet without remembering complex numbers. Rather than remembering IP addresses, we can remember a DNS. instead.

New cards
51

TLD

Top-Level Domain is the most righthand part of a domain name.

New cards
52

gTLD

Generic Top Level - meant to tell the user the domain’s name purpose.

.com - commercial purposes

.org - organisation

.edu - education

.gov - government

etc

New cards
53

ccTLD

Country Code Top Level Domain - used for geographical purposes

.ca - Canadian based sites

.co.uk - UK based sites

etc

New cards
54

Second Level Domain

The middle part of the domain name. When registering a domain name, the second-level domain is limited to 63 characters + the TLD, and can only use a-z, 0-9, and hyphens (cannot start/end/have consecutive hyphens)

New cards
55

Subdomain

A subdomain sits on the left-hand side of the domain name using a period to separate it from the second-level domain. Has the same restrictions as the second-level domain.

ex) in admin.tryhackme.com —→ admin is the subdomain

New cards
56

A Record

These records resolve to IPv4 addresses

ex) 104.26.10.229

New cards
57

AAAA Record

These records resolve to IPv6 addresses

ex) 2606:4700:20::681a:be5

New cards
58

CNAME Record

These records resolve to another domain name

ex) store.tryhackme.com —→ returns a CNMA record shops.shopify.com

New cards
59

MX Record

These records resolve to the address of the servers that handle the email for the domain you are querying. They also come with a priority flag that tells the client in which order to try the servers

New cards
60

TXT Record

Free text fields where any text-based data can be stored. TXT records have multiple uses, but some common ones can be to list servers that have the authority to send an email on behalf of the domain, and verify ownership of the domain name when signing up for third party services

New cards
61

DNS Request Step 1

When you request a domain name, your computer first checks its local cache to see if you’ve previously looked up the address recently, if not move to your recursive DNS server

New cards
62

DNS Request Step 2

A recursive DNS server searches locally for domain names. If the request cannot be found locally, move to the internet’s root DNS server

New cards
63

DNS Request Step 3

The root servers act as the DNS backbone of the internet, their job is to redirect you to the correct TLD server, depending on your request.

ex) tryhackme.com —> the root server recognizes .com and refers you to the TLD server that deals with .com addresses

New cards
64

DNS Request Step 4

The TLD server holds records for where to find the authoritative server to answer the DNS request.

New cards
65

DNS Request Step 5

Depending on the record type, the DNS record is then sent back to the Recursive DNS Server, where a local copy will be cached for future requests and then relayed back to the original client that made the request.

New cards
66

Authoritative DNS Server

This type of server is responsible for storing the DNS records for a particular domain name and where any updates to your domain name DNS records would be made.

New cards
67

DNS TTL

DNS records all come with a TTL (Time To Live) value. This value is a number represented in seconds that the response should be saved for locally until you have to look it up again.

New cards
68

HTTP

HyperText Transfer Protocol - the set of rules used for communicating with web servers for the transmitting of webpage data, whether that is HTML, images, videos, etc

New cards
69

HTTPS

the secure version of HTTP. It is data encrypted, so it not only stops people from seeing the data you are receiving and sending, but it also gives you assurances that you’re talking to the correct web server.

New cards
70

URL

Uniform Resource Locator - an instruction on how to access a resource on the internet. Made up of a scheme, user, host/domain, port, path, query string, and fragment

New cards
71

URL Scheme

This instructs on what protocol to use for accessing the resource

New cards
72

URL User

Some services require authentication to log in, you can put a username and password into the URL to do so

New cards
73

URL Host

The domain name or IP address of the server you wish to access

New cards
74

URL Port

The port you are going to connect to, usually 80 for HTTP or 443 for HTTPS

New cards
75

URL Path

The file name or location of the resource you are trying to access

New cards
76

Query String

Extra bits of information that can be sent to the requested path

New cards
77

URL Fragment

This is a reference to a location on the actual page requested. This is commonly used for pages with long content and can have a certain part of the page directly linked to it

New cards
78

GET Request

This is used for getting information from a web server

New cards
79

POST Request

This is used for submitting data to the web server and potentially creating new records

New cards
80

PUT Request

This is used for submitting data to a web server to update information

New cards
81

DELETE Request

This is used for deleting information/records from a web server

New cards
82

Common HTTP Status Codes

200 = OK - The request was completed successfully

201 = Created - A resource has been created

301 = Moved Permanently - This redirects the client’s browser to a new webpage or tells search engines that the page has moved somewhere else

302 = Found - Similar to the above permanent redirect, but only a temporary change

400 = Bad Request - Tells the browser that something was either wrong or missing in their request

401 = Not Authorized - You are not currently allowed to view this resource until you have authorized with the web application (usually with username/password)

403 = Forbidden - You do not have permission to view this resource whether you are logged in or not

404 = Page Not Found - The page/resource you requested does not exist

405 = Method Not Allowed - The resource does not allow this method request

500 = Internal Service Error - The server has encountered some kind of error with your request that it doesn't know how to handle properly

503 = Service Unavailable - This server cannot handle your request as it’s either overloaded or down for maintenance

New cards
83

Headers

Additional bits of data you can send to the web server when making requests

New cards
84

Common Request Headers

Host - Some web servers host multiple websites, this specifies which one you require

User-Agent: This is your browser software and version number, helping software format the website properly for your browser

Content-Length: Tells the web server how much data to expect in the web request

Accept-Encoding: Tells the server what types of compression methods the browser supports

Cookie: Data sent to the web server to help remember your information

New cards
85

Common Response Headers

Set-Cookie - Information to store which gets sent back to the web server on each request

Cache-Control - How long to store the content of the response in the browser’s cache before it requests it again

Content-Type - Tells the client what type of data is being returned

Content-Encoding: - What method has been used to compress the data to make it smaller when sending it over the Internet

New cards
86

Cookies

Small piece of data that is stored on your computer. Can be used to remind the web server who you are, some personal settings for the website or whether you’ve been to the site before. Usually stored in a token

New cards
87

HTML

HyperText Markup Language - the language websites are written in. Elements (also known as tags) are the building blocks of HTML pages and tells the browser how to display content.

New cards
88

<html> Element

The root element of the HTML page, all other elements come after this element

New cards
89

<head> Element

Contains information about the page

New cards
90

<body> Element

Defines the HTML document’s body, only content inside of the body is shown in the browser

New cards
91

<h1> Element

Defines a large heading

New cards
92

<p> Element

Defines a paragraph

New cards
93

JavaScript

Used to control the functionality of the webpages and make them interactive. Dynamically updates the page in real-time.

New cards
94

HTML Injection

A vulnerability that occurs when unfiltered user input is displayed on the page. If a website fails to sanitize user input, an attacker can inject HTML code into a vulnerable website.

New cards
95

Load Balancers

Provide the ability to ensure high traffic websites can handle the load and provide a failover if a server becomes unresponsive. Uses different algorithms to decide which server is best suited to deal with a request.

New cards
96

Health Check

Periodic checks preformed by load balancers to ensure servers are running correctly

New cards
97

CDN

Content Delivery Networks - allows one to host static files from a website, and host them across thousands of servers all over the world

New cards
98

Databases

Web servers can communicate with databases to store and recall data from them.

New cards
99

WAF

Web Application Firewall - sits between your web requests and the web server; its primary purpose is to protect the web server from hacking or DDOS attacks.

New cards
100

Rate Limiting

Allowing only a certain amount of requests from an IP per second

New cards
robot