Podcast
Questions and Answers
What does IP stand for and at which OSI layer does it operate?
What does IP stand for and at which OSI layer does it operate?
Internet Protocol - Layer 3
What does ISP stand for?
What does ISP stand for?
Internet Service Provider
What does TTL stand for in networking?
What does TTL stand for in networking?
Time to Live
What is the primary function of the Internet Protocol (IP)?
What is the primary function of the Internet Protocol (IP)?
Public IP addresses are assigned to devices within a local network, while private IP addresses are received from an ISP for accessing the internet.
Public IP addresses are assigned to devices within a local network, while private IP addresses are received from an ISP for accessing the internet.
What is the key difference between a public IP address and a private IP address?
What is the key difference between a public IP address and a private IP address?
Which of the following IP address ranges is reserved for private networks?
Which of the following IP address ranges is reserved for private networks?
IPv4 addresses are 128 bits long, while IPv6 addresses are 32 bits long.
IPv4 addresses are 128 bits long, while IPv6 addresses are 32 bits long.
Which characteristic primarily differentiates an Intranet from the Internet?
Which characteristic primarily differentiates an Intranet from the Internet?
An Intranet typically has more users and higher traffic than the global Internet.
An Intranet typically has more users and higher traffic than the global Internet.
What process allows multiple computers on a private network to share a single public IP address?
What process allows multiple computers on a private network to share a single public IP address?
What technology extends a private network across a public network, allowing secure data transmission?
What technology extends a private network across a public network, allowing secure data transmission?
What is the function of the Domain Name System (DNS)?
What is the function of the Domain Name System (DNS)?
Which protocol is used for secure remote command-line access and command execution?
Which protocol is used for secure remote command-line access and command execution?
What protocol is primarily used for transferring files between computers over a TCP/IP connection?
What protocol is primarily used for transferring files between computers over a TCP/IP connection?
What is the secure version of HTTP, used for encrypted communication over the internet?
What is the secure version of HTTP, used for encrypted communication over the internet?
Which protocol is specifically used for sending electronic mail (email)?
Which protocol is specifically used for sending electronic mail (email)?
Which protocol is primarily used for monitoring and managing network devices?
Which protocol is primarily used for monitoring and managing network devices?
What is Syslog used for in networking?
What is Syslog used for in networking?
What is the main difference in the mechanism between SNMP polling and Syslog messaging?
What is the main difference in the mechanism between SNMP polling and Syslog messaging?
Which protocol automates the assignment of IP addresses, subnet masks, and default gateways to network devices?
Which protocol automates the assignment of IP addresses, subnet masks, and default gateways to network devices?
What protocol is used by tools like ping
and traceroute
for network diagnostics?
What protocol is used by tools like ping
and traceroute
for network diagnostics?
What is a Distributed Denial-of-Service (DDoS) attack?
What is a Distributed Denial-of-Service (DDoS) attack?
What is the purpose of the ping
utility?
What is the purpose of the ping
utility?
What information does the traceroute
(or tracert
) utility provide?
What information does the traceroute
(or tracert
) utility provide?
What does the Time-to-Live (TTL) value in an IP packet signify?
What does the Time-to-Live (TTL) value in an IP packet signify?
What problem does the Address Resolution Protocol (ARP) solve?
What problem does the Address Resolution Protocol (ARP) solve?
In classful networking, what is the default subnet mask for a Class C network?
In classful networking, what is the default subnet mask for a Class C network?
The IP address range 127.0.0.0 to 127.255.255.255 is a standard private IP range used for large corporate networks.
The IP address range 127.0.0.0 to 127.255.255.255 is a standard private IP range used for large corporate networks.
What does CIDR stand for, and what does it enable?
What does CIDR stand for, and what does it enable?
Flashcards
Internet Protocol (IP)
Internet Protocol (IP)
The method by which data is sent from one computer to another over the Internet
IP address
IP address
A unique numerical label assigned to each device connected to a computer network, used for identification and location.
Public IP Addresses
Public IP Addresses
A public IP address is required for any publicly accessible network hardware, such as a home router and the servers that host websites.
Private IP Addresses
Private IP Addresses
Signup and view all the flashcards
Private IP address range
Private IP address range
Signup and view all the flashcards
Public IP address range
Public IP address range
Signup and view all the flashcards
NAT (Network Address Translation)
NAT (Network Address Translation)
Signup and view all the flashcards
VPN (Virtual Private Network)
VPN (Virtual Private Network)
Signup and view all the flashcards
DNS (Domain Name System)
DNS (Domain Name System)
Signup and view all the flashcards
SSH (Secure Shell)
SSH (Secure Shell)
Signup and view all the flashcards
FTP (File Transfer Protocol)
FTP (File Transfer Protocol)
Signup and view all the flashcards
HTTP (HyperText Transfer Protocol)
HTTP (HyperText Transfer Protocol)
Signup and view all the flashcards
HTTPS (Hypertext Transfer Protocol Secure)
HTTPS (Hypertext Transfer Protocol Secure)
Signup and view all the flashcards
SMTP (Simple Mail Transfer Protocol)
SMTP (Simple Mail Transfer Protocol)
Signup and view all the flashcards
SNMP (Simple Network Management Protocol)
SNMP (Simple Network Management Protocol)
Signup and view all the flashcards
Syslog
Syslog
Signup and view all the flashcards
DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)
Signup and view all the flashcards
ICMP (Internet Control Message Protocol)
ICMP (Internet Control Message Protocol)
Signup and view all the flashcards
DDoS attack
DDoS attack
Signup and view all the flashcards
Ping
Ping
Signup and view all the flashcards
Traceroute
Traceroute
Signup and view all the flashcards
TTL (Time to Live)
TTL (Time to Live)
Signup and view all the flashcards
ARP (Address Resolution Protocol)
ARP (Address Resolution Protocol)
Signup and view all the flashcards
Internet
Internet
Signup and view all the flashcards
Intranet
Intranet
Signup and view all the flashcards
Study Notes
Various Network Protocols
- Internet Protocol (IP) operates at Layer 3
- ISP stands for Internet Service Provider.
- NAT stands for Network Address Translation.
- VPN stands for Virtual Private Network.
- TCP and UDP are transport layer protocols.
- DNS stands for Domain Name System.
- SSH stands for secured Shell.
- FTP stands for File Transfer Protocol.
- HTTP stands for HyperText Transfer Protocol.
- SMTP stands for Simple Mail Transfer Protocol.
- SNMP stands for Simple Network Management Protocol.
- DHCP stands for Dynamic Host Configuration Protocol.
- ICMP stands for Internet Control Message Protocol.
- TTL stands for Time to Live.
- ARP stands for Address Resolution Protocol.
IP - Internet Protocol
- IP is the method or protocol by which data is sent across the Internet.
- A numerical label is assigned to each device connected to a network.
- Public IP addresses are used on the public internet.
- Example IPv4 address: 192.168.128.2
- Example IPv6 address: 200.7.149.50
- Private IP addresses are used within private networks.
- IP addresses can be static or dynamic.
- Public IP addresses are received from an ISP by a home or business router and are needed for publicly accessible network hardware.
- Public IP addresses distinguish devices connected to the public internet.
- Each device accessing the internet must have a unique IP address.
- Public IP address is sometimes called an Internet IP.
- Each Internet Service Provider uses the public IP address to forward internet requests to a specific home or business.
- Digital requests are sent to the correct network using the exclusivity of IP addresses.
- Private IP addresses uniquely identify devices behind a router or a device serving IP addresses.
- Devices within a home network can share the same private IP addresses as other devices globally.
- Private IP ranges are non-routable on the internet.
- 192.168.0.0 - 192.168.255.255 gives 65,536 IP addresses
- 172.16.0.0 - 172.31.255.255 gives 1,048,576 IP addresses
- 10.0.0.0 - 10.255.255.255 gives 16,777,216 IP addresses
- Each machine on the Internet needs a unique, routable public IPv4 address.
- Ipv4 theoretically holds only 4.3 billion machines
- IPv6- Consists of 128 bits
- IPv6 solves the problem of address limitation
- IPv6 brings autoconfiguration and improved security.
Internet and Intranet
- The internet is a global system of interconnected networks using TCP/IP protocol.
- The internet is a public network accessible to anyone.
- The intranet is a private network contained within an enterprise.
- The intranet is a private network accessible only to organization users and is more secure.
- More traffic is found on the internet as it is a global network, compared with the minimum traffic of an intranet.
NAT - Network Address Translation
- NAT assigns a public address to devices inside a private network, typically done by a firewall.
VPN - Virtual Private Network
- A VPN extends a private network across a public one.
- VPNs enable users to send and receive data across shared or public networks as if directly connected to the private network.
DNS - Domain Name System
- DNS translates IP addresses to domain names (and vice versa).
- Some consider DNS to be the "phonebook of the Internet".
- DNS translates domain names such as www.google.com to IP addresses.
- With DNS translations, web browsers can load internet resources using IP addresses.
SSH & Telnet
- Secure Shell (SSH) is a cryptographic network protocol.
- SSH operates network services securely over unsecured networks.
- SSH is used for remote command-line login and execution and secures any network service.
- Telnet provides a command-line interface for device communication.
- Telnet is used for remote management and initial setup of network hardware like switches and access points.
FTP - File Transfer Protocol
- FTP is a standard Internet protocol for file transmission between computers over TCP/IP.
- FTP operates on a client-server architecture, where a client requests a file from a local or remote server.
- FTP clients are used to upload, download, and manage server files.
- WinSCP is a Windows FTC client with FTP, SSH, and SFTP support.
HTTP and HTTPS
- HTTP is Hyper Text Transfer Protocol.
- WWW (World Wide Web) uses web clients and servers for communication.
- Client-server communication is done by sending HTTP Requests and receiving HTTP Responses.
- HTTPS (Hypertext Transfer Protocol Secure) is an HTTP extension for secure communication over a network.
- HTTPS is widely used on the Internet.
- In an HTTP request/response circle: a browser requests an HTML page from a server, which returns the HTML file.
- -The browser then requests a style sheet, and the server returns a CSS file, and so on.
- Communication between clients and servers requires requests and responses.
- A client sends an HTTP request to the web, then a web server receives the request.
- The server runs an application to process the request.
- The server returns response(output) to the browser which is then received by the client.
SMTP
- SMTP is a set of communication rules which allows software to send email over the internet.
- SMTP is a push protocol used in sending emails.
- IMAP or POP is used in retrieving emails at the receiver's end.
- SMTP operates under an application layer protocol.
- When an email is sent, a TCP connection to the SMTP server is started where user transmits the email.
- The SMTP server listens continually and transmits messages based on email addresses for message interchange between devices.
- SMTP can transmit a message to multiple recipients.
- SMTP can attach text, video, voice, or graphics.
- SMTP can transmit messages on networks external to the internet.
SNMP Syslog
- Simple Network Management Protocol (SNMP) is an application-layer protocol.
- SNMP Exchanges management information between network devices.
- Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite uses SNMP to manage and monitor network elements.
- Syslog sends event messages from network devices to a logging server.
- Syslog protocol logs wide range of device events.
- Examples of these events include: system reboots, port up/down status, login information, and system changes.
SNMP vs. Syslog
- SNMP facilitates remote monitoring of network devices.
- SNMP issues alerts on critical actions like HSRP state changes.
- SNMP uses a Poll-Response mechanism, with the SNMP Server polling devices.
- SNMP retrieves real-time information.
- End device configuration can be performed via SNMP set e.g reboot system
- SNMP traps are shared in binary format and are secure, which is in contrast to Syslog.
- SNMP is active and uses UDP ports 161 and 162.
- Syslog exchanges log messages indicating the severity to network device with the ability to receive syslog messages.
- Syslog is collected to dig deeper to figure out why the HSRP state change occurred.
- Syslog uses a PUSH mechanism where the end device sends logging information.
- Syslog acquires historical data and cannot perform end device configuration via syslog set.
- Syslog events are shared in plain text and are insecure,
- Syslog is passive and uses TCP/UDP port number 514.
DHCP - Dynamic Host Configuration Protocol
- DHCP provides quick, automatic, and central IP address distribution within a network.
- DHCP configures the subnet mask, default gateway, and DNS server information (Dynamic IPs).
- Static IP (no DHCP)
- Dynamic IP (DHCP)
ICMP - Internet Control Message Protocol
- ICMP is used by network devices to communicate.
- ICMP is used by network administrators to troubleshoot connections using ping and traceroute utilities.
- ICMP can execute Denial of Service attacks via oversized IP packets.
- A DDoS (distributed denial-of-service) attack overwhelms a targeted server with a flood of traffic.
- DDoS attacks use multiple compromised computer systems as attack traffic sources.
Ping and Traceroute
- Ping tests if a particular host is reachable on a network and confirms connection through returned data packets.
- Traceroute determines the path packets take from one IP address to another.
- To Ping, use: ping "IP address" e.g., ping 8.8.8.8
- Continuously Ping: ping 8.8.8.8 -t
- Constantly Ping with Packet Size: ping 8.8.8.8 –t –l 1024
- To Trace Route" tracet 8.8.8.8
TTL - Time To Live
- TTL indicates if a packet has been in a network for too long and should be discarded.
- Ping and traceroute utilities use TTL to reach a host or trace a route.
- TTL values control the scope in which a packet may be forwarded.
- 0 is restricted to the same host.
- 1 is restricted to the same subnet.
- 32 is restricted to the same site.
- 64 is restricted to the same region.
- 128 is restricted to the same continent.
- 255 is unrestricted.
ARP
- ARP finds the hardware address of a host, when the IP is known.
- ARP discovers the link layer address (MAC address) linked with the internet layer, IPv4 address.
- This mapping is a critical function in the Internet protocol suite.
Network Addressing
- Classfull networks are categorized into classes A, B, and C
- Example: Network address: 192.168.0.0/24.
- Router address: 192.168.0.1
- Host addresses include 192.168.0.2 (Switch), 192.168.0.3 (Wireless modem), 192.168.0.4 (Wireless router).
- Class A
- Format: Network.Node.Node.Node
- Subnet Mask: 255.0.0.0
- CIDR Value: /8
- Number of Networks: 126 (2^7 – 2)
- Number of Hosts: 16,777,214 (2^24 – 2)
- Class B
- Format: Network.Network.Node.Node
- Subnet Mask: 255.255.0.0
- CIDR Value: /16
- Number of Networks: 16,382 (2^14 – 2)
- Number of Hosts: 65,534 (2^16 – 2)
- Class C
- Format: Network.Network.Network.Node
- Subnet Mask: 255.255.255.0
- CIDR Value: /24
- Number of Networks: 2,097,150 (2^21 – 2)
- Number of Hosts: 254 (2^8 – 2)
Network Addressing - Private IP Addresses
- Class A
- Private Networks: 10.0.0.0
- Subnet Mask: 255.0.0.0
- Address Range: 10.0.0.0 to 10.255.255.255
- Class B
- Private Networks: 172.16.0.0 - 172.31.0.0
- Subnet Mask: 255.240.0.0
- Address Range: 172.16.0.0 - 172.31.255.255
- Class C
- Private Networks: 192.168.0.0
- Subnet Mask: 255.255.0.0
- Address Range: 192.168.0.0 - 192.168.255.255
- The Class A Addresses 127.0.0.0 to 127.255.255.255 are reserved for loopback and diagnostic functions.
Network Addressing - Classless interdomain routing (CIDR)
- Classless Inter-Domain Routing (CIDR) is a method for allocating IP addresses.
VLSM - Variable Length Subnet Mask
- VLSM refers to Variable Length Subnet Mask.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.