Basic Networking | Finals Long Quiz Reviewer

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/97

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

98 Terms

1
New cards

Dynamic Host Configuration Protocol (DHCP)

  • It is a network management protocol used on Internet Protocol (IP) networks.

  • It automatically assigns IP addresses and other communication parameters to devices connected to the network using a client–server architecture

  • Every device on a TCP/IP-based network must have a unique

    unicast IP address to access the network and its resources.

  • Without this, IP addresses for new computers or computers that are moved from one subnet to another must be configured manually; IP addresses for computers that are removed from the network must be manually reclaimed.

2
New cards
  • Valid TCP/IP configuration parameters for all clients on the

    network.

  • Valid IP addresses, maintained in a pool for assignment to clients, as well as excluded addresses.

  • Reserved IP addresses associated with particular DHCP clients. This allows consistent assignment of a single IP address to a single DHCP client.

  • The lease duration, or the length of time for which the IP address can be used before a lease renewal is required.

The DHCP server stores the configuration information in a database that includes:

3
New cards
  • Client-Server Model

  • Client Requests

  • Server Response

  • Dynamic IP Configuration

How DHCP Works:

4
New cards

Client-Server Model

Consists of a centrally installed network DHCP server and client instances on each device.

5
New cards

Client Requests

When a device connects to the network, it requests parameters (e.g., IP address) from the DHCP server.

6
New cards

Server Response

The DHCP server provides the requested parameters to the client.

7
New cards

Dynamic IP Configuration

Eliminates manual configuration of network devices.

8
New cards

Scopes

Determine which IP addresses are provided to clients.

9
New cards

DHCP Scope

A pool of IP addresses on a subnetwork that the DHCP server can lease to clients.

10
New cards

Lease Duration

The period the DHCP server holds a leased IP address for a client.

11
New cards
  • Network ID

  • Subnet Mask

  • Router Option

Scope Properties

12
New cards

Network ID

Defines the range of IP addresses.

13
New cards

Subnet Mask

Specifies the subnet for the network.

14
New cards

Router Option

Allows DHCP clients to access remote networks.

15
New cards

Security Considerations

  • DHCP can be secured to prevent unauthorized devices from obtaining IP addresses.

  • Use DHCP snooping and port security to enhance security.

16
New cards
  • Simplified IP Address Management

  • Reduced Configuration Errors

  • Improved Network Scalability

  • Centralized Control

  • Resource Optimization

  • Simplified Troubleshooting

  • Security Enchancements

Benefits of DHCP:

17
New cards

Simplified IP Address Management

DHCP automatically assigns and manages IP addresses, making it easier for network administrators to keep track of devices and their associated addresses, says a blog post on Medium.

18
New cards

Reduced Configuration Errors

By automating IP address assignment, DHCP minimizes the risk of manual errors like typos or conflicts, according to Learn Microsoft.

19
New cards

Improved Network Scalability

DHCP allows for easy addition or removal of devices without requiring changes to the network configuration, says a blog post on Park Place Technologies.

20
New cards

Centralized Control

DHCP provides a central point for managing IP address allocation, making it easier to implement changes and updates across the network.

21
New cards

Resource Optimization

DHCP allows for efficient use of IP addresses by automatically releasing them when devices disconnect from the network, according to an article on LinkedIn.

22
New cards

Simplified Troubleshooting

DHCP logs DHCP transactions, making it easier to troubleshoot network issues related to IP addresses.

23
New cards

Security Enhancements

DHCP servers can be configured to assign IP addresses only to authorized devices based on MAC address filtering, enhancing network security.

24
New cards

Physical Connection

  • Before any network communications can occur, a physical connection to a local network must be established.

  • This connection could be wired or wireless, depending on the setup of the network.

  • This generally applies whether you are considering a corporate office or a home.

  • A Network Interface Card (NIC) connects a device to the network.

  • Some devices may have just one NIC, while others may have multiple NICs (Wired and/or Wireless, for example).

  • Not all physical connections offer the same level of performance.

25
New cards

Physical Layer

  • Transports bits across the network media

  • Accepts a complete frame from the Data Link Layer and encodes it as a series of signals that are transmitted to the local media

  • This is the last step in the encapsulation process.

  • The next device in the path to the destination receives the bits and re-encapsulates the frame, then decides what to do with it.

26
New cards

TCP/IP standards

Are implemented in software and governed by the IETF.

27
New cards

Physical Layer Standards

Are implemented in hardware and are governed by many organizations including:

  • ISO

  • EIA/TIA

  • ITU-T

  • ANSI

  • IEEE

28
New cards
  • Physical Components

  • Encoding

  • Signaling

Physical Layer Standards Address Three (3) Functional Areas:

29
New cards

Physical Components

  • Are the hardware devices, media, and other connectors that transmit the signals that represent the bits.

  • Hardware components like NICs, interfaces and connectors, cable materials, and cable designs are all specified in standards associated with the physical layer.

30
New cards

Encoding

  • It converts the stream of bits into a format recognizable by the next device in the network path.

  • This ‘coding’ provides predictable patterns that can be recognized by the next device.

  • Examples of encoding methods include:

    • Manchester;

    • 4B/5B, and

    • 8B/10B.

31
New cards

Signaling

  • This method is how the bit values, “1” and “0” are represented on the physical medium.

  • The method of signaling will vary based on the type of medium being used

32
New cards

Bandwidth

  • It is the capacity at which a medium can carry data.

  • Digital bandwidth measures the amount of data that can flow from one place to another in a given amount of time; how many bits can be transmitted in a second.

  • Physical media properties, current technologies, and the laws of physics play a role in determining available bandwidth.

33
New cards

Latency

Amount of time, including delays, for data to travel from one given point to another

34
New cards

Throughtput

The measure of the transfer of bits across the media over a given period of time

35
New cards

Goodput

  • The measure of usable data transferred over a given period of time

  • Goodput = Throughput - traffic overhead

36
New cards

Cooper Cabling

  • It is the most common type of cabling used in networks today.

  • It is inexpensive, easy to install, and has low resistance to electrical current flow.

  • Limitations:

    • Attenuationthe longer the electrical signals have to travel, the weaker they get.

    • The electrical signal is susceptible to interference from two sources, which can distort and corrupt the data signals (Electromagnetic Interference (EMI) and Radio Frequency Interference (RFI) and Crosstalk).

  • Mitigation:

    • Strict adherence to cable length limits will mitigate attenuation.

    • Some kinds of copper cable mitigate EMI and RFI by using metallic shielding and grounding.

    • Some kinds of copper cable mitigate crosstalk by twisting opposing circuit pair wires together.

37
New cards
  1. Unshielded Twisted-Pair (UTP) Cable

  2. Shielded Twisted-Pair (STP) Cable

  3. Coaxial Cable

Types of Copper Cabling:

38
New cards

Unshielded Twisted Pair (UTP)

  • The most common networking media.

  • Terminated with RJ-45 connectors

  • Interconnects hosts with intermediary network devices.

  • Key Characteristics:

    1. The outer jacket protects the copper wires from physical damage.

    2. Twisted pairs protect the signal from interference.

    3. Color-coded plastic insulation electrically isolates the wires from each other and identifies each pair.

  • Properties:

    • It has four pairs of color-coded copper wires

      twisted together and encased in a flexible plastic

      sheath.

    • No shielding is used.

    • UTP relies on the following properties to limit crosstalk:

      • Cancellation - Each wire in a pair of wires uses opposite polarity. One wire is negative, the other wire is positive. They are twisted together and the magnetic fields effectively cancel each other and outside EMI/RFI.

      • Variation in twists per foot in each wire - Each wire is twisted a different amount, which helps prevent crosstalk amongst the wires in the cable.

39
New cards

Shielded Twisted Pair (STP)

  • Better noise protection than UTP

  • More expensive than UTP

  • Harder to install than UTP

  • Terminated with RJ-45 connectors

  • Interconnects hosts with intermediary network devices.

  • Key Characteristics:

    1. The outer jacket protects the copper wires from physical damage

    2. Braided or foil shield provides EMI/RFI protection

    3. Foil shield for each pair of wires provides EMI/RFI protection

    4. Color-coded plastic insulation electrically isolates the wires from each other and identifies each pair

40
New cards

Coaxial Cable

  • There are different types of connectors used with coax

    cable.

  • Commonly used in the following situations:

    • Wireless installations - attach antennas to wireless devices

    • Cable internet installations - customer premises wiring.

  • Consists of the following:

    1. Outer cable jacket to prevent minor physical damage

    2. A woven copper braid, or metallic foil, acts as the second wire in the circuit and as a shield for the inner conductor.

    3. A layer of flexible plastic insulation

    4. A copper conductor is used to transmit the electronic signals.

41
New cards

Properties of Fiber-Optic Cabling

  • Not as common as UTP because of the expense involved

  • Ideal for some networking scenarios

  • Transmits data over longer distances at higher bandwidth than any other networking media

  • Less susceptible to attenuation, and completely immune to EMI/RFI

  • Made of flexible, extremely thin strands of very pure glass

  • Uses a laser or LED to encode bits as pulses of light

  • The fiber-optic cable acts as a wave guide to transmit light between the two ends with minimal signal loss

42
New cards
  • Single-Mode Fiber

  • Multimode

Types of Fiber Media

43
New cards

Single-Mode Fiber

  • Very small core

  • Uses expensive lasers

  • Long-distance application

44
New cards

Multimode

  • Larger core

  • Uses less expensive LEDs

  • LEDs transmit at different angles

  • Up to 10 Gbps over 550 meter

45
New cards

Dispersion

  • Refers to the spreading out of a light pulse over time.

  • Increased dispersion means increased loss of signal strength.

  • MMF has greater dispersion than SMF, with a the maximum cable distance for MMF is 550 meters.

46
New cards
  1. Enterprise Networks

  2. Fiber-to-the-Home (FTTH)

  3. Long-Haul Networks

  4. Submarine Cable Networks

Fiber-optic cabling is now being used in Four (4) types of industry:

47
New cards

Enterprise Networks

Used for backbone cabling applications and interconnecting infrastructure devices

48
New cards

Fiber-to-the-Home

Used to provide always-on broadband services to homes and small businesses

49
New cards

Long Haul Networks

Used by service providers to connect countries and cities

50
New cards

Submarine Cable Networks

Used to provide reliable high-speed, high-capacity solutions capable of surviving in harsh undersea environments at up to transoceanic distances.

51
New cards

Wireless Media

  • It carries electromagnetic signals representing binary digits using radio or microwave frequencies.

  • This provides the greatest mobility option.

  • Wireless connection numbers continue to increase.

  • Some of the limitations:

    • Coverage area- Effective coverage can be significantly impacted by the physical characteristics of the deployment location.

    • Interference- Wireless is susceptible to interference and can be disrupted by many common devices.

    • Security- Wireless communication coverage requires no access to a physical strand of media, so anyone can gain access to the transmission.

    • Shared medium- WLANs operate in half-duplex, which means only one device can send or receive at a time. Many users accessing the WLAN simultaneously results in reduced bandwidth for each user.

52
New cards

Wireless Standards

  • The IEEE and telecommunications industry standards for wireless data communications cover both the data link and physical layers.

  • In each of these standards, physical layer specifications dictate:

    • Data to radio signal encoding methods

    • Frequency and power of transmission

    • Signal reception and decoding requirements

    • Antenna design and construction

53
New cards
  • Wi-Fi (IEEE 802.11)

  • Bluetooth (IEEE 802.15)

  • WiMAX (IEEE 802.16)

  • Zigbee (IEEE 802.15.4)

Types of Wireless Standards:

54
New cards

Wi-Fi (IEEE 802.11)

Wireless LAN (WLAN) technology

55
New cards

Bluetooth (IEEE 802.15)

Wireless Personal Area network (WPAN) standard

56
New cards

WiMAX (IEEE 802.16)

Uses a point-to-multipoint topology to provide broadband wireless access

57
New cards

Zigbee (IEEE 802.15.4)

  • Low data-rate

  • Low power-consumption communications

  • Primarily for Internet of Things (IoT) applications

58
New cards

Wireless LAN

  • In general, a Wireless LAN (WLAN) requires the following devices:

    • Wireless Access Point (AP)

    • Wireless NIC Adapters

  • There are a number of WLAN standards.

    • When purchasing WLAN equipment, ensure compatibility, and interoperability.

  • Network Administrators must develop and apply stringent security policies and processes to protect WLANs from unauthorized access and damage.

59
New cards

Wireless Access Point (AP)

Concentrate wireless signals from users and connect to the existing copper-based network infrastructure

60
New cards

Wireless NIC Adapters

Provide wireless communications capability to network hosts

61
New cards

Data Link Layer

  • It is responsible for communications between end-device network interface cards.

  • It allows upper layer protocols to access the physical layer media and encapsulates Layer 3 packets (IPv4 and IPv6) into Layer 2 Frames.

  • It also performs error detection and rejects corrupts frames.

62
New cards

Providing Access to Media

  • Packets exchanged between nodes may experience numerous data link layers and media transitions.

  • At each hop along the path, a router performs four basic Layer 2 functions:

    • Accepts a frame from the network medium.

    • De-encapsulates the frame to expose the encapsulated packet.

    • Re-encapsulates the packet into a new frame.

    • Forwards the new frame on the medium of the next network segment.

63
New cards

  • Institute for Electrical and Electronic Engineers (IEEE).

  • International Telecommunications Union (ITU).

  • International Organizations for Standardization (ISO).

  • American National Standards Institute (ANSI)

Data link layer protocols are defined by engineering organizations:

64
New cards

Topology of a Network

It is the arrangement and relationship of the network devices and the interconnections between them.

65
New cards
  • Physical topology

  • Logical topology

There are two types of topologies used when describing networks:

66
New cards

Physical topology

It shows physical connections and how devices are interconnected.

67
New cards

Logical topology

It identifies the virtual connections between devices using device interfaces and IP addressing schemes.

68
New cards
  1. Point-to-point

  2. Hub and spoke

  3. Mesh

There are three (3) common physical WAN topologies:

69
New cards

Point-to-Point WAN Topology

  • The simplest and most common WAN topology.

  • Consists of a permanent link between two endpoints.

  • Physical point-to-point topologies directly connect two nodes.

  • The nodes may not share the media with other hosts.

  • Because all frames on the media can only travel to or from the two nodes, Point-to-Point WAN protocols can be very simple.

70
New cards

Hub and spoke

It’s similar to a star topology where a central site interconnects branch sites through point-to-point links.

71
New cards

Mesh

It provides high availability but requires every end system to be connected to every other end system.

72
New cards

LAN Topologies

  • End devices on LANs are typically interconnected using a star or extended star topology.

73
New cards
  1. Bus

  2. Ring

Early Ethernet and Legacy Token Ring technologies provide two (2) additional topologies:

74
New cards

Bus

All end systems chained together and terminated on each end.

75
New cards

Ring

Each end system is connected to its respective neighbors to form a ring.

76
New cards

Star and extended star topologies

Topologies that are easy to install, very scalable and easy to troubleshoot.

77
New cards

Half-duplex communication

  • Only allows one device to send or receive at a time on a shared medium.

  • Used on WLANs and legacy bus topologies with Ethernet hubs.

78
New cards

Full-duplex communication

  • Allows both devices to simultaneously transmit and receive on a shared medium.

  • Ethernet switches operate in full-duplex mode.

79
New cards
  1. Contention-based access

  2. Controlled access

Access Control Methods:

80
New cards

Contention-based access

  • All nodes operating in half-duplex, competing for use of the medium.

  • Examples are:

    • Carrier sense multiple access with collision detection (CSMA/CD) as used on legacy bus-topology Ethernet.

    • Carrier sense multiple access with collision avoidance (CSMA/CA) as used on Wireless LANs.

81
New cards

Controlled access

  • Deterministic access where each node has its own time on the medium.

  • Used on legacy networks such as Token Ring and ARCNET

82
New cards

Contention-Based Access – CSMA/CD

  • CSMA/CD

    • Used by legacy Ethernet LANs.

    • Operates in half-duplex mode where only one device sends or receives at a time.

      Uses a collision detection process to govern when a device can send and what happens if multiple devices send at the same time.

  • CSMA/CD collision detection process:

    • Devices transmitting simultaneously will result in a signal collision on the shared media.

    • Devices detect the collision.

    • Devices wait a random period of time and retransmit data.

83
New cards

Contention-Based Access – CSMA/CA

  • CSMA/CA

    • Used by IEEE 802.11 WLANs.

    • Operates in half-duplex mode where only one device sends or receives at a time.

    • Uses a collision avoidance process to govern when a device can send and what happens if multiple devices send at the same time.

  • CSMA/CA collision avoidance process:

    • When transmitting, devices also include the time duration needed for the transmission.

    • Other devices on the shared medium receive the time duration information and know how long the medium will be unavailable.

84
New cards

Data Link Frame

  • Data is encapsulated by the data link layer with a header and a trailer to form a frame.

  • The fields of the header and trailer vary according to data link layer protocol.

  • The amount of control information carried with in the frame varies according to access control information and logical topology.

85
New cards
  1. Header

  2. Data

  3. Trailer

A data link frame has three (3) parts:

86
New cards

Layer 2 Addresses

  • Also referred to as a physical address.

  • Contained in the frame header.

  • Used only for local delivery of a frame on the link.

  • Updated by each device that forwards the frame.

87
New cards

LAN and WAN Frames

  • The logical topology and physical media determine the data link

    protocol used:

    • Ethernet

    • 802.11 Wireless

    • Point-to-Point (PTP)

    • High-Level Data Link Control (HDLC)

    • Frame-Relay

  • Each protocol performs media access control for specified logical topologies.

88
New cards

VLAN

  • Stands for Virtual Local Area Network.

  • It is a technology used in networking to segment a physical network into multiple isolated broadcast domains logically.

  • Allows you to group devices together even if they are not physically connected to the same switch, as if they were in the same room or office.

  • Benefits:

    1. Security - Isolate sensitive data (e.g., HR or Finance).

    2. Performance - Reduces broadcast traffic by limiting broadcast domains.

    3. Flexibility - Users can be grouped logically, not physically.

    4. Manageability - Easier to manage and troubleshoot large networks.

89
New cards

Trunking

  • It is used to carry multiple VLANs across a single link between switches or between a switch and a router.

  • It allows devices on different VLANs (across switches) to communicate as if they're on the same VLAN.

90
New cards

IPv6 (Internet Protocol version 6)

  • The newest version of Internet Protocol, designed to replace IPv4

  • Designed by the Internet Engineering Task Force (IETF)

  • Has a 128-bit address length

  • Has no subnet mask

91
New cards

IPv6 Address Compression

  • Consists of eight groups of four hexadecimal digits separated by a ‘:’

  • Leading zeros can be omitted (trailing zeros cannot)

  • A single instance of continuous zeros can be replaced with a double colon (::)

  • There are supposed to be 8 hextets of 4 hexadecimal characters each.

92
New cards

Network Portion

2001:0db8:0000:0000:a111:b222:c333:abcd/64

  • The highlighted part of the IPv6 address is the _______

93
New cards

Host Portion

2001:0db8:0000:0000:a111:b222:c333:abcd/64

  • The highlighted part of the IPv6 address is the _______

94
New cards

Global Unicast

  • It is a publicly routable address like the IPv4 public IPs.

  • The prefix to identify these address is 2000::/3

    • This means the first 3 bits identify a global unicast address.

    • It will start with either a 2 or a 3.

95
New cards

Unique Local

  • Its like an IPv4 private IPs

  • Not globally routable

  • The prefix to identify these address is FC00::/7

    • Using the first seven bits, a unique local address will always start with an F followed by either a C or D.

96
New cards

Link Local

  • Quick automatic private IP addresses that are not routable over a network.

  • Designed to communicate only within a single area of network.

97
New cards

Multicast

  • Are addresses that are sent to a group of computers or devices listening for that particular multicast.

  • IPv4, also same as broadcast addresses, these were sent to all computers within a network, these have now been scrapped with IPv6

98
New cards

Anycast

  • IPv6 allows us to assign the same IP address to multiple devices.

  • The data is then sent to the closest device with that address.

  • No specific IP range for anycast.

  • Used the same range to unicast.