COSC 85 - Reviewer

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/47

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

48 Terms

1
New cards

Network Protocols

Standardized rules and procedures that govern how devices communicate and exchange data over a network

2
New cards

Network Protocols

They break down complex tasks into smaller functions, ensuring smooth, reliable, and secure communication for everything from web browsing to email and file transfers

3
New cards

Enable Communication
Define Data Handling
Manage Flow

What Network Protocols Do?

4
New cards

Enable Communication

This allow diverse devices (PCs, servers, phones) to talk, regardless of internal differences.

5
New cards

Define Data Handling

This specify data formatting, addressing, packaging, and error checking.

6
New cards

Manage Flow

This act like traffic signals to regulate data movement, preventing errors and ensuring delivery.

7
New cards

HTTP
HTTP/3
HTTPS
WebSocket
TCP
UDP
SMTP
FTP

Network Protocols

8
New cards

HTTP (Hypertext Transfer Protocol)

This is a protocol for fetching resources such as HTML documents. It is the foundation of any data exchange on the Web and it is a client-server protocol.

9
New cards

HTTP/3

This is the next major

revision of the HTTP. It runs on QUIC, a new transport protocol designed for mobile-heavy internet usage. It relies on UDP instead of TCP, which enables faster web page responsiveness.

10
New cards

HTTPS (HyperText Transfer Protocol Secure)

This extends HTTP and uses encryption for secure communications.

11
New cards

WebSocket

is a protocol that provides full-duplex communications over TCP. Clients establish this to receive real- time updates from the back-end services.

12
New cards

TCP (Transmission Control Protocol)

This is designed to send packets across the internet and ensure the successful delivery of data and messages over networks. Many application-layer protocols build on top of this.

13
New cards

UDP (User Datagram Protocol)

This sends packets directly to a target computer, without establishing a connection first. This is commonly used in time-sensitive communications where occasionally dropping packets is better than waiting. Voice and video traffic are often sent using this protocol.

14
New cards

SMTP (Simple Mail Transfer Protocol)

This is a standard protocol to transfer electronic mail from one user to another.

15
New cards

FTP (File Transfer Protocol)

This is used to transfer computer files between client and server. It has separate connections for the control channel and data channel.

16
New cards

Menu Bar

This part contains standard file, edit, options, view, tools, and help menus, providing access to basic commands like open, save, and print.

17
New cards

Main Tool Bar

This part offers shortcut icons for frequently used menu commands, including new, open, save, print, activity wizard, copy, paste, undo, and redo.

18
New cards

Logical/Physical Workspace Tabs

These tabs allow you to toggle between the Logical and Physical work areas.

19
New cards

Common Tools Bar

This part Offers access to primary workspace tools, including Select, Inspect, Delete, Resize Shape, Place Note, Drawing Palette, Add Simple PDU (packet icon), and Add Complex PDU.

20
New cards

Workspace

This is the area where topologies are created and simulations are displayed.

21
New cards

Realtime/Simulation tabs

These tabs are used to toggle between the real and simulation modes. Buttons are also provided to control the time, and to capture the packets.

22
New cards

Network component box

This component contains all of the network and end devices available with Packet Tracer, and is further divided into two areas

23
New cards

Network component box (Device-type selection box)

This area contains device categories

24
New cards

Network component box (Device-specific selection box)

When a device category is selected, this selection box displays the different device models within that category

25
New cards

User-created packet box

In this part, users can create highly-customized packets to test their topology from this area, and the results are displayed as a list.

26
New cards

Router > - User EXEC Mode
Router # - Privileged EXEC Mode
Router(Config) # - Global Configuration Mode
Router(Config-if) # - Interface Mode
Router(Config Router) # - Routing Engine Mode
Router(Config-Line) # - Line Mode

User Levels and Modes in Cisco Packet Tracer

27
New cards

Router > - User EXEC Mode

This mode is primarily for read-only monitoring. Users can check basic hardware and software status using limited show commands. You can also perform basic connectivity tests like ping and traceroute.

28
New cards

Router # - Privileged EXEC Mode

Often called "Enable Mode," this level grants full administrative visibility. It is the "hub" for advanced troubleshooting and management.

29
New cards

Router(Config) # - Global Configuration Mode

This is where you implement system-wide changes that affect the entire device

30
New cards

Router(Config-if) # - Interface Mode

Used to configure individual physical or virtual ports. Here you assign IP addresses, set link speeds, or enable/disable ports with no shutdown.

31
New cards

Router(Config Router) # - Routing Engine Mode

Used for setting up routing protocols. Inside this mode, you define which networks a protocol like OSPF or RIP should advertise to other devices.

32
New cards

Router(Config-Line) # - Line Mode

Used to secure access points. You enter this mode to set passwords for the console (physical access) or vty (remote Telnet/SSH access) lines

33
New cards

Start Up Configuration
Running Configuration
Configuration Register

Other Cisco Packet Tracer Necessity

34
New cards

Running Configuration

This is also known as the "current configuration" or "active configuration" is the configuration that is currently active and operational on the network device. Changes made here take effect immediately.

35
New cards

Startup Configuration

Also known as the "saved configuration" or "boot configuration" is the configuration that is saved on the device's non-volatile memory. It represents the configuration that will be loaded and applied to the device when it boots up or is restarted.

36
New cards

Configuration Register

This is a 16-bit software value stored in a Cisco device's non-volatile RAM (NVRAM) that acts as a set of boot instructions.

37
New cards

Configuration Register (0x2142) - Password Recovery Mode

This setting is specifically used when you need to bypass existing security settings.

38
New cards

Configuration Register (0x2102) – Default Mode

This is the factory-default setting for most Cisco routers. The router boots normally by loading the Cisco IOS software from Flash memory and the startup-config from NVRAM. The router loads the IOS from Flash but completely ignores the startup-config in NVRAM.

39
New cards

Mitigation of Data Breaches
Maintaining Brand Trust and Reputation
Prevention of Credential Stuffing
Protection Against Future Threats
Regulatory and Legal Compliance
Defending Against Insider Threats

Why Password Encryption is Important?

40
New cards

Slow Network
Weak Wi-Fi Signal
Physical Connectivity Issues
Excessive CPU Usage
Slow DNS Lookups
Duplicate and Static IP Addresses
Exhausted IP Address
Virtual LAN and VPN problems

Common Network Issues

41
New cards

Slow Network

High bandwidth usage from activities like 4K streaming or large file downloads saturates the connection, often exacerbated by outdated hardware that cannot handle modern internet speeds.

42
New cards

Weak Wi-Fi Signal

Signal strength degrades due to physical distance from the router or interference from thick walls, metal objects, and other electronic devices operating on the same frequency.

43
New cards

Physical Connectivity Issues

Sudden outages or intermittent connections are frequently caused by loose connectors, damaged Ethernet cables, or faulty hardware ports.

44
New cards

Excessive CPU Usage

Routers and switches may become sluggish or unresponsive when their processors are overwhelmed by high traffic volumes, malware, or complex encryption tasks.

45
New cards

Slow DNS Lookups

When an ISP’s DNS server is slow or non-responsive, the time it takes to translate a website name into an IP address increases, leading to long loading delays.

46
New cards

Duplicate and Static IP Addresses

Connectivity fails for one or more devices when two pieces of hardware are assigned the same IP address, causing a conflict on the network.

47
New cards

Exhausted IP Address

This occurs when the DHCP server has no more available addresses to hand out, preventing new devices from joining the network.

48
New cards

Virtual LAN and VPN problems

These issues typically involve incorrect VLAN tagging on network switches or authentication and encryption failures within a VPN tunnel.