WGU C172 Network and Security - Foundations 4.5 (17 reviews) Students also studied Terms in this set (275) Western Governors UniversityIT C182 Save
WGU D315 - PRE-ASSESSMENT: NET...
205 terms Mira_PakPreview WGU C172 Network and Security - F...233 terms kamerasheree Preview CompTIA A+ 220-1101 Core 1 Study Fl...160 terms brendan_decker14 Preview Introdu Teacher chr protocolThe set of rules established for users to exchange information topologyThe network architecture used to interconnect the networking equipment deterministic networkEach station connected to the network is ensured access for transmission of its messages at regular or fixed time intervals bus topologyThe computers share the media (coaxial cable) for data transmission ThinNetThe coaxial cable used in a bus network.star topologyTwisted-pair cables connect the devices to a central hub or switch hubA multiport repeater device used at the center of a star topology multiport repeaterThe data it receives is broadcast and seen by all devices connected to its ports. A hub.broadcastTransmission of data by a hub to all devices connected to its ports switchDevice used at the center of a star topology that forwards a frame it receives directly out the port associated with its destination address mesh topologyAll networking devices are directly connected to each other, allows for full redundancy OSI modelThe seven layers describing network functions
Physical layerProvides the electrical and mechanical connection to the network (cabling, NICs).1st OSI layer Data link layerHandles error recovery, flow control (synchronization), and sequencing (MAC, Ethernet). 2nd OSI layer Network layerAccepts outgoing messages and combines messages or segments into packets, adding a header that includes routing information (IP, IPX). 3rd OSI layer Transport layerConcerned with message integrity between source and destination (TCP, UDP).4th OSI layer Session layerProvides the control functions necessary to establish, manage, and terminate the connections (NSF, SQL). 5th OSI layer Presentation layerAccepts and structures the messages for the application (ASCII, JPEG). 6th OSI layer Application layerInteracts with application programs that incorporate a communication component such as your Internet browser and email (HTTP, FTP, SMTP). 7th OSI layer
- basic steps to isolate network problemIs the connection to the machine down? (layer 1)
Is the network down? (layer 3) Is a service on a specific machine down? (layer 7) CSMA/CDThe Ethernet LAN media-access method, carrier sense multiple access with collision detection EthernetLAN protocol created in 1972 and standardized in 1980 using CSMA/CD.FrameContains the header, data, and trailer (the padding and 4-byte CRC frame check sequence) Frame headerConsists of the preamble, start frame delimiter, destination and source addresses, and length/type field 64 bytesMinimum length of an Ethernet frame 1518 bytesMaximum length of an Ethernet frame MAC addressA unique 6-byte/48-bit address assigned by the vendor of the network interface card displayed in 12 hex digits Organizationally unique identifier (OUI)The first 3 bytes of the MAC address that identifies the manufacturer of the network hardware ipconfig /allEnables the MAC address information to be displayed from the command prompt IANAThe agency that assigns IP addresses to computer networks
IP addressUnique 32-bit address that identifies on which network the computer is located as well as differentiates the computer from all other devices on the same network Class A networksGovernments, very large networks. Range from 0.0.0.0 to 126.255.255.255.
Example: 44.x.x.x
Class B networksMidsize companies, universities, and so on. Range from 128.0.0.0 to
191.255.255.255. Example: 128.123.x.x
Class C networksSmall networks. Range from 192.0.0.0 to 223.255.255.255 Example: 192.168.1.x Class D networksReserved for multicast groups. Range from 224.0.0.0 to 239.255.255.255. Example: 224.x.x.x Class E networksExperimental, not used on the Internet. Range from 240.0.0.0 to 254.255.255.255 Network numberThe portion of the IP address that defines which network the IP packet is originating from or being delivered to Host numberThe portion of the IP address that defines the location of the networking device connected to the network; also called the host address Host addressAnother name for the host number ipconfigCommand used to display the computer's address Private addressesIP addresses set aside for use in private intranets IntranetAn internal network that provides file and resource sharing but is not accessed from the Internet IP internetworkA network that uses IP addressing for identifying devices connected to the network
- blocks for private IP addresses10.0.0.0-10.255.255.255
172.16.0.0-172.31.255.255
192.168.0.0-192.168.255.255
Wired networkUses cables and connectors to establish the network connection Wireless networkUses radio signals to establish the network connection Wi-FiWi-Fi Alliance—an organization that tests and certifies wireless equipment for compliance with the 802.11x standards 802.11aWireless standard, 54Mbps, 75 ft, 5Ghz 802.11bWireless standard, 11Mbps, 100-150 ft, 2.4GHz
802.11gWireless standard, 54Mbps, 150 ft, 2.4GHz 802.11nWireless standard, 4 x 802.11g speeds (200+Mbps). 2.4GHz or 5GHz 802.11acLatest wireless standard, single-station data transfer rates of 500Mbps, 5Ghz wireless routerDevice used to interconnect wireless networking devices and to give access to wired devices and establish the broadband Internet connection to the ISP access pointA transceiver used to interconnect a wireless and a wired LAN Broadband gatewayCombines a modem and router in one unit. Also referred to as a broadband modem range extenderDevice that relays the wireless signals from an access point or wireless router into areas with a weak signal/no signal hotspotsA limited geographic area that provides wireless access for the public Service Set Identifier (SSID)Wireless network name Wi-fi Protected Setup (WPS)Simplifies Wi-Fi configuration but vulnerable to brute force attacks Stateful Packet Inspection (SPI)Firewall technique that inspects incoming data packets to make sure they correspond to an outgoing request Virtual Private Network (VPN)Establishes a secure network connection, a way to protect your LAN's data from being observed by outsiders OverloadingTechnique where NAT translates the home network's private IP addresses to a single public IP address Port Address Translation (PAT)A port number is tracked with the client computer's private address when translating to a public address CAT6Class E twisted-pair cables capable of up to 1000Mbps/1Gbps up to a length of 100 m RJ-45The 8-pin modular connector used with CAT6/5e/5 cable NumericsA numerical representation (used to describe the data rates for the twisted- pair/coaxial media) 10Base2ThinNet. 10Mbps over coax, up to 185 m 10Base5ThickNet. 10Mbps over coax, up to 500 m 10BaseT10Mbps over twisted-pair