CSCI 291 Quiz 2a
Study Guide for Networking Topics
1. Common Cable Types
Household Cables:
RJ-45: Used for Ethernet networking (LAN, WAN). Connects routers, computers, and switches.
RJ-11: Used for telephone lines and low-speed DSL connections.
UTP (Unshielded Twisted Pair): Used for LAN connections. Characteristics include twisted copper wires to minimize electromagnetic interference (EMI), less expensive, and flexible.
Coaxial Cable: Used for cable TV and some internet connections. Provides higher bandwidth than UTP.
Business Cables (Medium to Large):
Fiber Optic Cables: Used for high-speed internet connections (e.g., T3, OC3, OC12). Characteristics include high bandwidth, long-distance transmission, and immunity to EMI.
Ethernet Cables (Cat 5e, Cat 6, Cat 7): Used for high-speed LAN connections. Cat 6 supports up to 10 Gbps, while Cat 7 supports up to 10 Gbps with higher bandwidth.
DSL/Cable: Used for smaller businesses. DSL uses telephone lines, while cable uses coaxial cables.
2. Characteristics of Network Devices
Hub:
Connects multiple devices on a LAN.
Broadcasts data to all ports, leading to potential data collisions.
Inexpensive but inefficient for large networks.
Repeater:
Amplifies signals to extend network range.
Used to strengthen signals in both wired and wireless networks.
Switch:
Connects multiple devices on a LAN.
Sends data only to the intended recipient, reducing collisions.
More efficient than hubs.
Router:
Connects multiple networks (e.g., LAN to the internet).
Routes data packets between networks using IP addresses.
Provides security features like firewalls and encryption.
3. Wireless Technologies
Wi-Fi:
Used for wireless internet access in homes, offices, and public spaces.
Operates on 2.4 GHz and 5 GHz frequencies.
Standards include 802.11a/b/g/n/ac/ax (Wi-Fi 6).
Bluetooth:
Used for short-range wireless communication between devices (e.g., headphones, keyboards).
Operates on 2.4 GHz frequency.
Low energy consumption, suitable for IoT devices.
ZigBee:
Used for smart home automation (e.g., lights, security systems).
Operates on low-energy radio frequencies.
Forms mesh networks for reliable communication.
4. Common Communication Protocols
FTP (File Transfer Protocol): Used for transferring files between a client and server (port 21).
Telnet: Used for remote access to devices (insecure, replaced by SSH).
SSH (Secure Shell): Secure remote access and file transfer (port 22).
SMTP (Simple Mail Transfer Protocol): Used for sending emails (port 25).
DNS (Domain Name System): Translates domain names to IP addresses (port 53).
HTTP (Hypertext Transfer Protocol): Used for web browsing (port 80).
HTTPS (HTTP Secure): Secure version of HTTP (port 443).
POP3 (Post Office Protocol): Used for retrieving emails from a server (port 110).
IRC (Internet Relay Chat): Used for real-time text messaging (ports 6660-6669).
5. Ports and IP Addresses
Number of Ports: 65,536 ports (0-65535).
Well-known ports: 0-1023 (e.g., HTTP on port 80).
Registered ports: 1024-49151.
Dynamic/Private ports: 49152-65535.
Public vs. Private IP Addresses:
Public IP: Visible on the internet, assigned by ISPs.
Private IP: Used within local networks (e.g., 192.168.x.x).
IPv4:
32-bit address (e.g., 192.168.1.1).
Limited address space (4.3 billion addresses).
CIDR (Classless Inter-Domain Routing):
Allows efficient allocation of IP addresses.
Replaces classful addressing (A, B, C).
Example: 192.168.1.0/24.
6. Packets and Headers
Packet: A small segment of data sent over a network.
Header: Contains metadata (source/destination IP, error-checking, sequencing).
Payload: The actual data being transmitted.
Trailer: Contains error-checking information (e.g., CRC).
7. Network Utility Commands
ipconfig: Displays network configuration (IP address, subnet mask, default gateway).
ping: Tests connectivity to a host by sending ICMP Echo Request packets.
tracert: Maps the path packets take to reach a destination.
netstat: Displays active connections, listening ports, and network statistics.
nslookup: Queries DNS to resolve domain names to IP addresses.
8. Security Concepts
VPN (Virtual Private Network):
Encrypts internet traffic and masks the user's IP address.
Used for secure remote access and bypassing geo-restrictions.
Firewall:
Monitors and controls incoming/outgoing network traffic.
Protects against unauthorized access and cyber threats.
Proxy Server:
Acts as an intermediary between a user and the internet.
Used for anonymity, content filtering, and caching.
9. OSI Model
7 Layers:
Physical: Transmits raw bits over a physical medium (e.g., cables, Wi-Fi).
Data Link: Defines the format of data on the network (e.g., MAC addresses).
Network: Routes data between devices using IP addresses.
Transport: Ensures reliable data transfer (e.g., TCP, UDP).
Session: Manages connections between applications.
Presentation: Translates data between applications and the network (e.g., encryption).
Application: Provides network services to end-users (e.g., HTTP, FTP).
10. Cloud Computing
Definition: Delivery of computing services (e.g., storage, servers) over the internet.
AWS Cloud Security Foundations Course Objectives:
Understand cloud security concepts.
Learn to secure AWS resources.
Implement identity and access management (IAM).
11. Cyberattack Uses of Commands
ipconfig/ifconfig: Can be used to gather network information for reconnaissance.
traceroute: Can map network topology for potential attacks.
nslookup: Can be used for DNS spoofing or reconnaissance.
ping: Can be used for ICMP flood attacks (ping of death).
This study guide covers the key topics from the PDF, providing a concise overview of networking concepts, protocols, and tools.