Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
85 Cards in this Set
- Front
- Back
Client/Server Network |
Servers run the network services, and clients must request permission for delivery of network resources |
|
Peer-to-Peer (PTP) Network |
There are no dedicated servers, each computer acts as both a client and a server |
|
Client/Server Model Advantages |
1. Centralized security 2. Dedicated servers 3. Easy accessibility and configuration control 4. Easy to backup |
|
Client/Server Model Disadvantages |
1. Dependency upon Administration 2. Complicated Set Up and Maintenance 3. Expensive Servers |
|
Peer-to-Peer (PTP) Model Advantages |
1. Small networks 2. Inexpensive 3. Easy Setup 4. Low Maintenance |
|
Peer-to-Peer (PTP) Model Disadvantages |
1. Scattered Data 2. Weak Security 3. No Central Administration or Control 4. User training |
|
Hyper Text Transfer Protocol (HTTP) |
Contains all of the text, graphics, and animations that will display on a client computer when the web page is downloaded. Resides on web servers and contains the information required to render web pages on client computers.
|
|
HTTP port |
Port 80 |
|
File Transfer Protocol (FTP) |
An unsecure protocol. There is no encryption of this protocol, and the traffic can be easily monitored. |
|
FTP port |
Ports 20 and 21 |
|
Simple Mail Transfer Protocol (SMTP) |
Used to transfer emails from client computers to email servers and to transfer mail between two email servers. |
|
SMTP port |
Port 25 |
|
Post Office Protocol 3 (POP3) |
Used to pull messages from an email server |
|
POP3 port |
Port 110 |
|
Internet Message Access Protocol (IMAP) |
The third message delivery type from the server to client. More advanced than POP3 |
|
IMAP port |
Port 143 |
|
Exchange/Outlook client Messaging Application Programming Interface (MAPI) Protocol |
The fourth email delivery protocol, is a Microsoft proprietary protocol used between Microsoft Outlook and Exchange |
|
MAPI port |
Port 135, then the server and outlook client dynamically assign another port number |
|
Domain Naming Service (DNS) |
Resolves IP addresses to fully qualified domain names |
|
DNS port |
Port 53 |
|
Dynamic Host Control Protocol (DHCP) |
Allows client computers to automatically pull their IP address configuration from a centrally managed server |
|
DHCP port |
Ports 67 and 68 |
|
Server Message Block (SMB) Protocol |
Is used by clients to access shared resources |
|
SMB port |
Port 445 |
|
Telecomunications Network (TelNet) |
Is software that allows you to remotely access network systems, allows access to the CLI in Cisco IOS. The client connection is called a Virtual Terminal (VTY) session. |
|
TelNet port |
Port 23 |
|
User Datagram Protocol (UDP) |
Is a very low overhead protocol that works well with higher bandwidth applications like voice and video because of the volume of data being sent across the network. Provides fro a simple, connectionless delivery method. |
|
Transmission Control Protocol (TCP) |
Is a connection oriented protocol that incurs over twice the overhead of the other protocol in order to gain additional functionality. |
|
UDP provides |
1. Unreliable delivery 2. No error recovery 3. No Flow control 4. No congestion control 5. No ordered delivery 6. No connection establishment |
|
TCP provides |
1. Reliable delivery 2. Error recovery 3. Flow control 4. Congestion control 5. Ordered delivery 6. Connection establishment |
|
The command used to view ports being used on a PC |
netstat |
|
Well known ports |
Ports 0-1023, are reserved for commonly used services and applications |
|
Registered ports |
Ports 1024-49151, are primarily ports assigned to applications that a user might decide to install |
|
Dynamic, or private ports |
Ports 49152-65535, are usually assigned dynamically to client applications as they initiate connections |
|
How ports are used to establish a Transmission Control Protocol (TCP) |
The client computer will use a unique and random port number as the source port (a dynamic port) and request a web page from a server with the destination of a well-known port. The server will establish a connection with its source port and the destination port being the same random port that originated the request for a web page. |
|
Ordered Deliver in relation to the functions of TCP |
Provides reliable delivery. |
|
Step one of the Three-Way Handshake |
Computer A sends SYNCH, and Computer B receives SYNCH. |
|
Step two of the Three-Way Handshake |
Computer B sends ACK and SYNCH, and Computer A ACK received. |
|
Step three of the Three-Way Handshake |
Computer A Established, and sends SYNCH. |
|
Reliable Delivery in relation to the functions of TCP |
This connection establishment enables it in the three step process known as the TCP three-way handshake. |
|
Port 20 |
FTP Data, TCP |
|
Port 21 |
FTP Control, TCP |
|
Port 22 |
SSH, TCP |
|
Port 23 |
TelNet, TCP |
|
Port 25 |
SMTP, TCP |
|
Port 53 |
DNS, UDP/TCP |
|
Port 67/68 |
DHCP, UDP |
|
Port 69 |
TFTP, UDP |
|
Port 80 |
HTTP, TCP |
|
Port 110 |
POP3, TCP |
|
Port 161 |
SNMP, UDP |
|
Port 443 |
SSL, TCP |
|
Port 16,384-32,767 |
RTP-Based Voice and Video, UDP |
|
Window Size |
Is the amount of data that a source can transmit before an acknowledgment must be received |
|
How TCP dynamically changes to overcome network congestion |
The Window Size will flex to fit the quality of the connection and the bandwidth available |
|
Flow Control |
Together with Window Size, accounts for congestion control |
|
TCP header size |
20 Bytes long |
|
UDP header size |
8 Bytes long |
|
Intermediary devices that operate at the Network Layer of the OSI Model |
Routers and layer-3 switches |
|
The Three Basic Characteristics of Internet Protocol Version 4 (IPv4) |
1. Connectionless 2. A best effort 3. Media independent protocol |
|
Actions a router can take with a packet |
1. Forward the packet out the proper interface 2. Send the packet out to its default route if one is programmed 3. Drop the packet |
|
Maximum Transmission Unit (MTU) |
Limits the size of the PDU, determined by the data link layer |
|
Valid IPv4 addresses |
1. Binary: 11001000.00010100.00010000.00010001 2. Decimal: 200.20.16.17 3. Minimum value for IP 0.0.0.0 4. Maximum value for IP 255.255.255.255 |
|
Routing |
The process of moving packets through the network |
|
Default Gateway |
IP address used by a host to forward IP packets that have destination addresses outside of the local network. Address of the router interface connected to the same local network as the source host. If the computer does not know the destination, it routes the packet through this. |
|
Routing Table |
Contains the destination networks, the metric, and the address of the next hop. |
|
Static Routing |
Are a way of manually configuring the routing table in routers. Programming of routers by a network administrator with all of the routes that it needs to know about in order to do its job.
|
|
Dynamic Routing |
Allow routers to learn about other networks from other routers automatically. The routers share their networks with other routers to automatically build and complete topology of the network, and automatically adjust to traffic changes. |
|
Time-to-Live (TTL) |
Describes the maximum number of hops the packet can take before it is considered "lost" or undeliverable. This keeps the internet from becoming cluttered by lost packets and creating such issues as routing loops. |
|
Metric |
Is a calculated number that is used to determine which route to a destination network is best in the event that a router knows about multiple paths to the same network |
|
Network Address |
The first available IP address in the network range. Used to represent the network as a whole. Also known as the Net ID. |
|
Broadcast Address |
The last available IP address in the network range. Used to send traffic to all of the devices in the network. |
|
Host Addresses |
The rest of the IP addresses that fall between the network and broadcast ID. Usable IP addresses that you can assign to devices within your network. |
|
Class A |
1.X.X.X - 126.X.X.X |
|
Class B |
128.X.X.X - 191.X.X.X |
|
Class C |
191.X.X.X - 223.X.X.X |
|
Class D |
225.X.X.X - 239.X.X.X |
|
Private Address |
Must rely on Network Address Translation to be routable on the internet. Do not need to be globally unique. IP addresses that are designated for use within a private network. |
|
Public Address |
Addresses designated for use in networks that are accessible on the internet. This means that routers will route these outside of your internal network.
|
|
Unicast |
Point to point communications from one host to another over the network. Most of the IP traffic you will encounter. "one-to-one" |
|
Broadcast |
If a computer or network device sends IP traffic to this address, all of the computers and network devices on that IP network will receive the traffic. "one-to-many" |
|
Multicast |
When a host sends out a data stream that multiple hosts can receive. "one-to-many" |
|
Ping |
Used to test whether or not a path through the network exists to a destination network or computer |
|
Network Address Translation (NAT) |
Changes the private space addresses in the IPv4 packet header to a public space address. Regardless of how many devices you have on your private LAN, the internet sees all of your traffic as the (1) public IP address your ISP provided.
|
|
Valid Internet Protocol Version 6 (IPv6) addresses |
8 fields of 4 hexadecimal numbers per field |