Comptia A+ 220-1201 Core 1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/99

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

100 Terms

1
New cards

2.1 A series of moving vans

• Efficiently move large amounts of data

- Use a shipping truck

• The network topology is the road

- Ethernet, DSL, cable system

• The truck is the Internet Protocol (IP)

- We've designed the roads for this truck

• The boxes hold your data

- Boxes of TCP and UDP

• Inside the boxes are more things

- Application information

<p>• Efficiently move large amounts of data</p><p>- Use a shipping truck</p><p>• The network topology is the road</p><p>- Ethernet, DSL, cable system</p><p>• The truck is the Internet Protocol (IP)</p><p>- We've designed the roads for this truck</p><p>• The boxes hold your data</p><p>- Boxes of TCP and UDP</p><p>• Inside the boxes are more things</p><p>- Application information</p>
2
New cards

2.1 TCP and UDP

• Transported inside of IP

- Encapsulated by the IP protocol

• Two ways to move data from place to place

- Different features for different applications

• OSI Layer 4

- The transport layer

• Multiplexing

- Use many different applications at the same time

- TCP and UDP

3
New cards

2.1 TCP - Transmission Control Protocol Communication

knowt flashcard image
4
New cards

2.1 TCP - Transmission Control Protocol

• Connection-oriented

- A formal connection setup and close

• "Reliable" delivery

- Recovery from errors

- Manages out-of-order messages or retransmissions

• Flow control

- The receiver can manage how much data is sent

5
New cards

2.1 UDP - User Datagram Protocol Communication

knowt flashcard image
6
New cards

2.1 UDP - User Datagram Protocol

• Connectionless - No formal open/close to the connection

• "Unreliable" delivery

- No error recovery, no reordering of data or retransmissions

• No flow control

- Sender determines the amount of data transmitted

7
New cards

2.1 Why would you ever use UDP?

• Real-time communication

- There's no way to stop and resend the data

- Time doesn't stop for your network

• Connectionless protocols

- DHCP (Dynamic Host Configuration Protocol)

- TFTP (Trivial File Transfer Protocol)

• The data might not get through

- The application keeps track and decides what to do

- It might not do anything

8
New cards

2.1 Communication using TCP

• Connection-oriented protocols prefer a "return receipt"

- HTTPS (Hypertext Transfer Protocol Secure)

- SSH (Secure Shell)

• The application doesn't worry about

out of order frames or missing data

- TCP handles all of the communication overhead

- The application has one job

9
New cards

2.1 Speedy delivery

• The IP delivery truck delivers from one (IP) address to

another (IP) address

- Every house has an address, every computer

has an IP address

• Boxes arrive at the house / IP address

- Where do the boxes go? - Each box has a room name

• Port is written on the outside of the box

- Drop the box into the right room

10
New cards

2.1 Lots of ports

• IPv4 sockets

- Server IP address, protocol, server application port #

- Client IP address, protocol, client port number

• Non-ephemeral ports - permanent port numbers

- Ports 0 through 1,023 - Usually on a server or service

• Ephemeral ports - temporary port numbers

- Ports 1,024 through 65,535

- Determined in real-time by the client

11
New cards

2.1 Port number (how many)

• TCP and UDP ports can be any number between 0 and 65,535

• Most servers (services) use non-ephemeral

(not-temporary) port numbers

- This isn't always the case - it's just a number.

• Port numbers are for communication, not security

• Service port numbers need to be "well known"

• TCP port numbers aren't the same as UDP port numbers

12
New cards

2.1 Port numbers

• Well-known port number

- Client and server need to match

• Important for firewall rules

- Port-based security

• A bit of rote memorization

- Becomes second nature after a while

• Make sure you know port number, protocol,

and how the protocol is used

13
New cards

2.1 FTP - File Transfer Protocol

• tcp/20 (active mode data), tcp/21 (control)

- Transfers files between systems

• Authenticates with a username and password

- Some systems use a generic/anonymous login

• Full-featured functionality - List, add, delete, etc.

14
New cards

2.1 SSH - Secure Shell

• Encrypted communication link - tcp/22

• Looks and acts the same as Telnet

15
New cards

2.1 Telnet

• Telnet - Telecommunication Network - tcp/23

• Login to devices remotely

- Console access

• In-the-clear communication

- Not the best choice for production systems

16
New cards

2.1 SMTP - Simple Mail Transfer Protocol

• SMTP - Simple Mail Transfer Protocol

- Server to server email transfer

- tcp/25

• Also used to send mail from a device to a mail server

- Commonly configured on mobile devices and

email clients

• Other protocols are used for clients to receive email

- IMAP, POP3

17
New cards

2.1 DNS - Domain Name System

• Converts names to IP addresses - udp/53

- www.professormesser.com = 162.159.246.164

• These are very critical resources

- Usually multiple DNS servers are in production

18
New cards

2.1 DHCP - Dynamic Host Configuration Protocol

• Automated configuration of IP address, subnet mask and

other options

- udp/67, udp/68

- Requires a DHCP server

- Server, appliance, integrated into a SOHO router, etc.

• Dynamic / pooled

- IP addresses are assigned in real-time from a pool

- Each system is given a lease and must renew at set

intervals

• DHCP reservation

- Addresses are assigned by MAC address in the DHCP

server

- Manage addresses from one location

19
New cards

2.1 HTTP and HTTPS

• Hypertext Transfer Protocol

- Communication in the browser

- And by other applications

• In the clear or encrypted

- Supported by nearly all web servers and clients

20
New cards

2.1 POP3 / IMAP

• Receive emails from an email server

- Authenticate and transfer

• POP3 - Post office Protocol version 3

- tcp/110

- Basic mail transfer functionality

• IMAP4 - Internet Message Access Protocol v4

- tcp/143

- Includes email inbox management from multiple clients

• SMB - Server Message Block

• Protocol used by Microsoft Windows

- File sharing, printer sharing

- Also called CIFS (Common Internet File System)

• Using NetBIOS over TCP/IP

(Network Basic Input/Output System)

- udp/137 - NetBIOS name services (nbname)

- tcp/139 - NetBIOS session service (nbsession)

• Direct over tcp/445 (NetBIOS-less)

- Direct SMB communication over TCP without

the NetBIOS transport

21
New cards

2.1 LDAP/LADPS

• LDAP (Lightweight Directory Access Protocol)

- tcp/389

- Store and retrieve information in a network directory

- Commonly used in Microsoft Active Directory

22
New cards

2.1 RDP - Remote Desktop Protocol

• Share a desktop from a remote location over tcp/3389

• Remote Desktop Services on many Windows versions

• Can connect to an entire desktop or just an application

• Clients for Windows, macOS, Linux, Unix, iPhone, Android,

and others

23
New cards

2.1 Common Ports

knowt flashcard image
24
New cards

2.2 Wireless technologies

• IEEE standards

- Institute of Electrical and Electronics Engineers

- 802.11 committee

- Everyone follows these standards

• Also referenced as a generation

- 802.11ac is Wi-Fi 5

- 802.11ax is Wi-Fi 6 and Wi-Fi 6E (extended)

- 802.11be is Wi-Fi 7

- Future versions will increment accordingly

25
New cards

2.2 802.11 technologies

• Frequencies

- 2.4 GHz, 5 GHz, and 6 GHz - Sometimes a combination

• Channels

- Groups of frequencies, numbered by the IEEE

- Frequencies are managed by governing entities

- Using non-overlapping channels would be optimal

• Bandwidth

- Amount of frequency in use

- 20 MHz, 40 MHz, 80 MHz, 160 MHz, etc.

26
New cards

2.2 Bluetooth

• Remove the wires

- Headsets, speakers, keyboards / mice

• Uses the 2.4 GHz range

- Unlicensed ISM

(Industrial, Scientific and Medical) band

- Same as 802.11

• Short-range

- Most consumer devices operate to about 10 meters

27
New cards

2.2 RFID (Radio-frequency identification)

• It's everywhere

- Access badges

- Inventory/Assembly line tracking

- Pet/Animal identification

- Anything that needs to be tracked

• Radar technology

- Radio energy transmitted to the tag

- RF powers the tag, ID is transmitted back

- Bidirectional communication

- Some tag formats can be active/powered

28
New cards

2.2 NFC (Near field communication)

• Two-way wireless communication

- Builds on RFID, which is mostly one-way

• Payment systems - Major credit cards, online wallets

• Bootstrap for other wireless

- NFC helps with Bluetooth pairing

• Access token, identity "card"

- Short range with encryption support

29
New cards

2.2 Wireless Network Technologies

knowt flashcard image
30
New cards

2.3 DNS server

• Domain Name System

- Convert names to IP addresses

- And vice versa

• Distributed naming system

- The load is balanced across many different servers

• Usually managed by the ISP or IT department

- A critical resource

31
New cards

2.3 DHCP server

• Dynamic Host Configuration Protocol

- Automatic IP address configuration

• Very common service

- Available on most home routers

• Enterprise DHCP will be redundant

- Usually running on central servers

32
New cards

2.3 File share

• Centralized storage of documents,spreadsheets,

videos, pictures, and any other files

- A fileshare

• Standard system of file management

- SMB (Server Message Block),

Apple Filing Protocol (AFP), etc.

• The front-end hides the protocol

- Copy, delete, rename, etc.

33
New cards

2.3 Print server

• Connect a printer to the network

- Provide printing services for all network devices

• May be software in a computer

- Computer is connected to the printer

• May be built-in to the printer

- Network adapter and software

• Uses standard printing protocols

- SMB (Server Message Block), IPP (Internet

Printing Protocol), LPD (Line Printer Daemon)

34
New cards

2.3 Mail server

• Store your incoming mail

- Send your outgoing mail

• Usually managed by the ISP or the IT department

- A complex set of requirements

• Usually one of the most important services

- 24 x 7 support

35
New cards

2.3 Syslog

• Standard for message logging

- Diverse systems, consolidated log

• Usually a central logging receiver

- Integrated into the SIEM

• You're going to need a lot of disk space

- No, more. More than that.

36
New cards

2.3 Web server

• Respond to browser requests

- Using standard web browsing protocols - HTTP/HTTPS

- Pages are built with HTML, HTML5

• Web pages are stored on the server

- Downloaded to the browser

- Static pages or built dynamically in real-time

37
New cards

2.3 Authentication server

• Login authentication to resources

- Centralized management

• Almost always an enterprise service

- Not required on a home network

• Usually a set of redundant servers

- Always available

- Extremely important service

38
New cards

2.3 Database servers

• Database table storage

- Save information in columns and rows

- Similar to a spreadsheet

• Relational database

- Link tables together

- These links are relationships

- Flexible and fast

• Structured Query Language (SQL)

- Access data using a standard language

- Microsoft SQL Server, MySQL, etc.

39
New cards

2.3 NTP servers

• The time of day is more important than you might think

- Encryption, logins, backups, log timestamps

- Everything needs to work from the same clock

• NTP server

- Listens on udp/123

- Responds to time requests from NTP clients

• NTP client

- Requests time updates from NTP server

- Daily synchronization is common

40
New cards

2.3 Spam gateways

• Unsolicited messages

- Email, forums, etc.

• Various content

- Commercial advertising

- Non-commercial proselytizing

- Phishing attempts

• Significant technology issue

- Security concerns, resource utilization,

storage costs, managing the spam

• Unsolicited email

- Stop it at the gateway before it reaches the user

- On-site or cloud-based

41
New cards

2.3 All-in-one security appliance

• Next-generation firewall, Unified Threat

Management (UTM) / Web security gateway

• URL filter / Content inspection

• Malware inspection

• Spam filter

• CSU/DSU

• Router, Switch

• Firewall

• IDS/IPS

• Bandwidth shaper

• VPN endpoint

42
New cards

2.3 Load balancers

• Distribute the load

- Multiple servers - Invisible to the end-user

• Large-scale implementations

- Web server farms, database farms

• Fault tolerance

- Server outages have no effect - Very fast convergence

43
New cards

2.3 Proxy server

• An intermediate server

- Client makes the request to the proxy

- The proxy performs the actual request

- The proxy provides results back to the client

• Useful features

- Access control, caching, URL filtering, content scanning

44
New cards

2.3 SCADA / ICS

• Supervisory Control and Data Acquisition System

- Large-scale, multi-site Industrial Control Systems (ICS)

• PC manages equipment

- Power generation, refining,

manufacturing equipment

- Facilities, industrial, energy, logistics

• Distributed control systems

- Real-time information

- System control

• Requires extensive segmentation

- No access from the outside

45
New cards

2.3 Legacy and embedded systems

• Legacy systems

- Another expression for "really old"

- May also be "really important"

- Learning old things can be just as important as

learning the new things

• Embedded systems

- Purpose-built device

- Not usual to have direct access to

the operating system

- Alarm system, door security, time card system

46
New cards

2.3 IoT (Internet of Things) devices

• Appliances

- Refrigerators

• Smart devices

- Smart speakers respond to voice

• Air control

- Thermostats, temperature control

• Access

- Smart doorbells

• May require a segmented network

- Limit any security breaches

47
New cards

2.4 Domain Name System

• Translates human-readable names

into computer-readable IP addresses

- You only need to remember

www.ProfessorMesser.com

• Hierarchical

- Follow the path

• Distributed database

- Many DNS servers

- 13 root server clusters (over 1,000 actual servers)

- Hundreds of generic top-level domains (gTLDs) -

.com, .org, .net, etc.

- Over 275 country code top-level domains (ccTLDs) -

.us, .ca, .uk, etc.

48
New cards

2.4 DNS lookup

knowt flashcard image
49
New cards

2.4 The DNS hierarchy

knowt flashcard image
50
New cards

2.4 DNS records

• Resource Records (RR)

- The database records of domain name services

• Over 30 record types

- IP addresses, certificates, host alias names, etc.

• These are important and critical configurations

- Make sure to check your settings, backup, and test!

51
New cards

2.4 Address records (A) (AAAA)

• Defines the IP address of a host

- This is the most popular query

• A records are for IPv4 addresses

- Modify the A record to change the

host name to IP address resolution

• AAAA records are for IPv6 addresses

- The same DNS server, different records

52
New cards

2.4 Canonical name records (CNAME)

• A name is an alias of another, canonical name

- One physical server, multiple services

<p>• A name is an alias of another, canonical name</p><p>- One physical server, multiple services</p>
53
New cards

2.4 Mail exchanger record (MX)

• Determines the host name for the mail server - this isn't an IP address; it's a name

<p>• Determines the host name for the mail server - this isn't an IP address; it's a name</p>
54
New cards

2.4 Text records (TXT)

• Human-readable text information

- Useful public information

- Was originally designed for

informal information

• Can be used for verification purposes

- If you have access to the DNS,

then you must be the administrator

of the domain name

• Commonly used for email security

- External email servers validate

information from your DNS

<p>• Human-readable text information</p><p>- Useful public information</p><p>- Was originally designed for</p><p>informal information</p><p>• Can be used for verification purposes</p><p>- If you have access to the DNS,</p><p>then you must be the administrator</p><p>of the domain name</p><p>• Commonly used for email security</p><p>- External email servers validate</p><p>information from your DNS</p>
55
New cards

2.4 Domain Keys Identified Mail (DKIM)

• Digitally sign a domain's outgoing mail

- Validated by mail servers, not usually

seen by the end user

- The public key is in the DKIM TXT record

<p>• Digitally sign a domain's outgoing mail</p><p>- Validated by mail servers, not usually</p><p>seen by the end user</p><p>- The public key is in the DKIM TXT record</p>
56
New cards

2.4 Sender Policy Framework (SPF)

• SPF protocol

- A list of all servers authorized to send emails

for this domain

- Prevent mail spoofing

- Mail servers perform a check to see if incoming mail

really did come from an authorized host

<p>• SPF protocol</p><p>- A list of all servers authorized to send emails</p><p>for this domain</p><p>- Prevent mail spoofing</p><p>- Mail servers perform a check to see if incoming mail</p><p>really did come from an authorized host</p>
57
New cards

2.4 DMARC

• Domain-based Message Authentication, Reporting,

and Conformance (DMARC)

- Prevent unauthorized email use (spoofing)

- An extension of SPF and DKIM

• You decide what external email servers should do with

emails that don't validate through SPF or DKIM

- That policy is written into a DMARC TXT record

- Accept all, send to spam, or reject the email

- Compliance reports can be sent to the email administrator

<p>• Domain-based Message Authentication, Reporting,</p><p>and Conformance (DMARC)</p><p>- Prevent unauthorized email use (spoofing)</p><p>- An extension of SPF and DKIM</p><p>• You decide what external email servers should do with</p><p>emails that don't validate through SPF or DKIM</p><p>- That policy is written into a DMARC TXT record</p><p>- Accept all, send to spam, or reject the email</p><p>- Compliance reports can be sent to the email administrator</p>
58
New cards

2.4 DCHP

• IPv4 address configuration used to be manual

- IP address, subnet mask, gateway, DNS servers,

NTP servers, etc.

• Needed a more automatic method

- Scale to thousands of systems

- Hands-off IP configurations

• Dynamic Host Configuration Protocol (DHCP)

- Initially released in 1997, updated through the years

- Provides automatic address / IP configuration

- Used for almost all devices

59
New cards

2.4 DHCP leases

• DORA

- A four-step process

• Discover

- Find a DHCP server

• Offer

- Get an offer

• Request

- Lock in the offer

• Acknowledge

- DHCP server confirmation

60
New cards

2.4 DHCP scopes

• Configured on the DHCP server

• IP address range

- And excluded addresses

• Subnet mask

• Lease durations

• Other scope options

- DNS server

- Default gateway

- VOIP servers

61
New cards

2.4 DHCP pools

• Grouping of IP addresses

- Each subnet has its own scope

- 192.168.1.0/24

- 192.168.2.0/24

- 192.168.3.0/24

- ...

• A scope is generally a single contiguous

pool of IP addresses

- DHCP exceptions can be made inside of the scope

62
New cards

2.4 Address reservation

• Address reservation

- Administratively configured

• Table of MAC addresses

- Each MAC address has a matching IP address

• Other names

- Static DHCP Assignment

- Static DHCP

- IP Reservation

63
New cards

2.4 Address Reservation

knowt flashcard image
64
New cards

2.4 LANs

• Local Area Networks

• A group of devices in the same broadcast domain

<p>• Local Area Networks</p><p>• A group of devices in the same broadcast domain</p>
65
New cards

2.4 Virtual LANs

• Virtual Local Area Networks

- A group of devices in the same broadcast domain

- Separated logically instead of physically

<p>• Virtual Local Area Networks</p><p>- A group of devices in the same broadcast domain</p><p>- Separated logically instead of physically</p>
66
New cards

2.4 Configuring VLANs

• Virtual Local Area Networks

- A group of devices in the same

broadcast domain

<p>• Virtual Local Area Networks</p><p>- A group of devices in the same</p><p>broadcast domain</p>
67
New cards

2.4 VPNs

• Virtual Private Networks

- Encrypted (private) data traversing a public network

• Concentrator

- Encryption/decryption access device

- Often integrated into a firewall

• Many deployment options

- Specialized cryptographic hardware

- Software-based options available

• Used with client software

- Sometimes built into the OS

68
New cards

2.4 Client-to-Site VPN

• On-demand access from a remote device

- Software connects to a VPN concentrator

• Some software can be configured as always-on

69
New cards

2.4 Site-to-site VPN

• Always-on

- Or almost always

• Firewalls often act as VPN concentrators

- Probably already have firewalls in place

70
New cards

2..4 Client-to-Site VPN

knowt flashcard image
71
New cards

2.4 Site-to-site VPN

knowt flashcard image
72
New cards

2.5 Network devices

• Many different devices and components

- All have different roles

• Some of these functions are combined together

- Wireless router/switch/firewall

• Compare different devices

- Understand when they should be used

73
New cards

2.5 Routers

• Routes traffic between IP subnets

- Makes forwarding decisions based on IP address

- Routers inside of switches sometimes called

"layer 3 switches"

• Often connects diverse network types

- LAN, WAN, copper, fiber

74
New cards

2.5 Switches

• Bridging done in hardware

- Application-specific integrated circuit (ASIC)

- Forwards traffic based on data link address

• Many ports and features

- The core of an enterprise network

- May provide Power over Ethernet (PoE)

• Multilayer switch

- Includes routing functionality

75
New cards

2.5 Unmanaged switches

• Very few configuration options - plug and play

• Fixed configuration - no VLANs

• Very little integration with other devices

- No management protocols

• Low price point - simple is less expensive

76
New cards

2.5 Managed switches

• VLAN support

- Interconnect with other switches via 802.1Q

• Traffic prioritization

- Voice traffic gets a higher priority

• Redundancy support

- Spanning Tree Protocol (STP)

• Port mirroring

- Capture packets

• External management

- Simple Network Management Protocol (SNMP)

77
New cards

2.5 Access point

• Not a wireless router

- A wireless router is a router and an access point

in a single device

• An access point is a bridge

- Extends the wired network onto the wireless network

- Makes forwarding decisions based on MAC address

78
New cards

2.5 Patch Panels

• Combination of punch-down blocks and

RJ-45 connectors

• Runs from desks are made once

- Permanently punched down to patch panel

• Patch panel to switch can be easily changed

- No special tools - use existing cables

79
New cards

2.5 Firewalls

• Filters traffic by port number

- OSI layer 4 (TCP/UDP)

- Some firewalls can filter based on the application

• Can encrypt traffic into/out of the network

- Protect your traffic between sites

• Can proxy traffic

- A common security technique

• Most firewalls can be layer 3 devices (routers)

- Usually sits on the ingress/egress of the network

80
New cards

2.5 Power over Ethernet (PoE)

• Power provided on an Ethernet cable

- One wire for both network and electricity

- Phones, cameras, wireless access points

- Useful in difficult-to-power areas

• Power provided at the switch

- Built-in power - Endspans

- In-line power injector - Midspans

81
New cards

2.5 PoE switch

• Power over Ethernet

- Commonly marked on the switch or interfaces

82
New cards

2.5 PoE, PoE+, PoE++

• PoE

- The original PoE specification

- Now part of the 802.3 standard

- 15.4 watts DC power, 350 mA max current

• PoE+

- Now also part of the 802.3 standard

- 25.5 watts DC power, 600 mA max current

• PoE++

- 51 W (Type 3), 600 mA max current

- 71.3 W (Type 4), 960 mA max current

- PoE with 10GBASE-T

• Compare the device with the switch support

- PoE+ won't power a PoE++ device

83
New cards

2.5 Cable modem

• Broadband

- Transmission across multiple frequencies

- Different traffic types

• Data on the "cable" network

- DOCSIS (Data Over Cable Service Interface Specification)

• High-speed networking

- Speeds up to 1 Gigabit/s are available

• Multiple services - Data, voice, video

84
New cards

2.5 DSL modem

• Digital Subscriber Line - uses telephone lines

• Download speed is faster than

the upload speed (asymmetric)

- ~10,000 foot limitation from the central office (CO)

- Faster speeds may be possible if closer to the CO

85
New cards

2.5 ONT

• Optical network terminal - fiber to the premises

• Connect the ISP fiber network to the copper network

- Demarcation point (demarc) in the data center

- Terminal box on the side of the building

• Line of responsibility

- One side of the box is the ISP

- Other side of the box is your network

86
New cards

2.5 Network Interface Card (NIC)

• The fundamental network device

- Every device on the network has a NIC

- Computers, servers, printers, routers, switches,

phones, tablets, cameras, etc.

• Specific to the network type - Ethernet, WAN, wireless

• Often built-in to the motherboard

- Or added as an expansion card

• Contains the hardware address

- Media Access Control (MAC) address

- A unique hardware designation

87
New cards

2.6 IP addressing

• IPv4 is the primary protocol for everything we do

- You probably won't configure anything else

• IPv6 is now part of all major operating systems

- And the backbone of our Internet infrastructure

88
New cards

2.6 IPv4 addresses

• Internet Protocol version 4

- OSI Layer 3 address

89
New cards

2.6 Public IPv4 addresses

• Each IPv4 address on the Internet is unique

- 1.1.1.1 can communicate to 2.2.2.2

• It is estimated that there are over 20 billion devices

connected to the Internet (and growing)

- IPv4 supports around 4.29 billion addresses

- There's an obvious scalability issue

• We've found ways to manage the demand

- Network Address Translation (NAT)

90
New cards

2.6 IPv4 addresses format

knowt flashcard image
91
New cards

2.6 IPv6 addresses format

knowt flashcard image
92
New cards

2.6 Private IP address ranges

• Large private IP address ranges

- Properly design and scale large networks

• Private IP addresses are not Internet-routable

- But can be routed internally

- Use NAT for everything else

• Defined in RFC 1918

- Request for Comment

93
New cards

2.6 IPv6 addresses

• Internet Protocol v6 - 128-bit address

- 340,282,366,920,938,463,463,374,607,

431,768,211,456 addresses (340 undecillion)

- 6.8 billion people could each have

5,000,000,000,000,000,000,000,000,000 addresses

• Your DNS is very important!

• First 64 bits is generally the network prefix (/64)

• Last 64 bits is then the host network address

94
New cards

2.6 RFC 1918 private IP addresses

knowt flashcard image
95
New cards

2.6 Networking with IPv4

• IP Address, e.g., 192.168.1.165

- Every device needs a unique IP address

• Subnet mask, e.g., 255.255.255.0

- Used by the local device to determine

what subnet it's on

- The subnet mask isn't (usually) transmitted

across the network

- You'll ask for the subnet mask all the time

- What's the subnet mask of this network?

• Default gateway, e.g., 192.168.1.1

- The router that allows you to communicate

outside of your local subnet

- The default gateway must be an IP address

on the local subnet

96
New cards

2.6 Static IP addressing

• An IP address that doesn't change

- Without a manual configuration change

• Manually configure the IP address

- Type it from the keyboard on each device

• Can be difficult to manage

- If the address changes, you must visit the device

- This obviously does not scale

• Try to avoid using manual IP addressing

- There are better ways to assign addresses

- DHCP reservations

97
New cards

2.6 Turning dynamic into static

• DHCP assigns an IP address from the first available

from a large pool of addresses

- Your IP address will occasionally change

• You may not want your IP address to change

- Server, printer, or personal preference

• Disable DHCP on the device

- Configure the IP address information manually

- Requires additional administration

• Better: Configure an IP reservation on the DHCP server

- Associate a specific MAC address with an IP address

Automatic Private IP Addressing (APIPA)

• A link-local address - No forwarding by routers

• APIPA uses 169.254.0.0 through 169.254.255.255

- First and last 256 addresses are reserved

- Functional block of 169.254.1.0 through 169.254.254.255

• Randomly assigned in this block

- Uses ARP to confirm the address isn't currently in use

98
New cards

2.7 Satellite networking

• Communication to a satellite

- Non-terrestrial communication

• High cost relative to terrestrial networking

- 100 Mbit/s down, 5 Mbit/s up are common

- Remote sites, difficult-to-network sites

• High latency

- Some systems have 250 ms up, 250 ms down

- Starlink advertises 25 ms to 60 ms

• Not always a perfect option

- Line of sight, rain fade

99
New cards

2.7 Fiber

• High speed data communication

- Frequencies of light

• Higher installation cost than copper

- Equipment is more costly

- More difficult to repair

- Communicate over long distances

• Large installation in the WAN core

- Supports very high data rates

- SONET, wavelength division multiplexing

• Fiber is slowly approaching the premises

- Business and home use

100
New cards

2.7 Cable

• Broadband

- Transmission across multiple frequencies

- Different traffic types

• Data on the "cable" network

- DOCSIS (Data Over Cable Service Interface Specification)

• High-speed networking

- 50 Mbits/s through 1,000+ Mbit/s are common

• Multiple services

- Data, voice, video