Full Transcript

**Key Networking Terms and Definitions:** 1. **Forwarding Server: A server that passes on requests or queries to another server for processing.** 2. **Organizationally Unique Identifier (OUI): A 24-bit character sequence assigned by IEEE that appears at the beginning of a network int...

**Key Networking Terms and Definitions:** 1. **Forwarding Server: A server that passes on requests or queries to another server for processing.** 2. **Organizationally Unique Identifier (OUI): A 24-bit character sequence assigned by IEEE that appears at the beginning of a network interface's physical address and identifies the NIC's manufacturer.** 3. **IP Scanner: A tool used to gather information about all devices connected to a network, including hostnames, IP addresses, MAC addresses, and open ports.** 4. **DHCP (Dynamic Host Configuration Protocol): An application layer protocol in the TCP/IP suite that manages the dynamic distribution of IP addresses on a network.** 5. **Gateway: A device that provides connectivity and session management for accessing another network.** 6. **ICMP (Internet Control Message Protocol): A core protocol in the TCP/IP suite that notifies the sender when something goes wrong in transmission.** 7. **NTP (Network Time Protocol): A simple application layer protocol used to synchronize the clocks of computers on a network.** 8. **VDI (Virtual Desktop Infrastructure): A remote desktop implementation offering VM instances for remote access clients.** 9. **RDP (Remote Desktop Protocol): A Microsoft protocol allowing users to connect and control another computer remotely.** 10. **SSH (Secure Shell): A protocol providing secure command-line access to a remote computer.** 11. **Telnet: A protocol used for remote access to servers and networking devices, though it lacks encryption.** 12. **UDP (User Datagram Protocol): A connectionless protocol in the TCP/IP suite, used for time-sensitive transmissions like video streaming.** 13. **Digital Certificate: A small file containing verified identification information about the user and the user's public key.** 14. **GRE (Generic Routing Encapsulation): A tunneling protocol developed by Cisco that transmits IP and other messages through a tunnel.** 15. **IPsec (Internet Protocol Security): A layer 3 protocol that defines encryption, authentication, and key management for TCP/IP transmissions.** 16. **NDP (Neighbor Discovery Protocol): A data link layer protocol that works with ICMPv6 to detect neighboring devices on an IPv6 network.** 17. **FTPS (FTP Secure): A version of FTP that incorporates SSL/TLS protocols for added security.** 18. **SYN (Synchronize): A TCP flag used to initiate a three-way handshake and establish a connection.** **Key Concepts and Commands:** 1. **Networking Commands:** - **IP Link show, IP address show: Display network interfaces and addresses.** - **ipconfig: Display TCP/IP network configurations on Windows.** - **ping vs. ping -a: Test network connectivity; ping -a resolves addresses to hostnames.** - **arp: Display or modify the ARP table.** - **netstat: Display network connections, routing tables, and interface statistics.** 2. **Gateway Devices:** - **Router: Directs traffic between different networks, creating a broadcast domain.** - **Hub: A basic networking device that sends incoming traffic to all connected devices.** - **Switch: Directs traffic based on MAC addresses, creating separate collision domains.** 3. **Domain Names: Different domains such as.com,.edu,.mil indicate the type of organization behind the domain.** 4. **Common Ports:** - **Port 3389: Used for RDP (Remote Desktop Protocol) to provide secure, encrypted control of remote Windows computers.** - **Port 1433: SQL database access.** - **Port 443: HTTPS, secure web traffic.** - **Port 5061: SIP (Session Initiation Protocol) for VoIP communications.** - **Port 25: Used for outgoing email (SMTP).** - **Port 22: Used for SSH file transfers.** 5. **IPv4 Address Structure: A 32-bit address made up of four octets. Includes a network ID and host ID.** 6. **Troubleshooting TCP/IP Errors:** - **Use ping, traceroute, and netstat to identify network issues.** - **Check for duplicate IP addresses causing conflicts with messages like \"there is another device using the same IP.\"** 7. **Types of IPv6 Addresses:** - **Unicast: Represents a single node.** - **Multicast: Transmits to multiple nodes.** - **Anycast: Represents multiple interfaces; only the closest responds.** 8. **IP Address Conflicts: If another device uses the same IP, check the DHCP server and possibly release and renew IP addresses using ipconfig /release and ipconfig /renew.** 9. **Classful vs. Classless Addressing:** - **Classful Addressing: Divides IP addresses into classes (A, B, C, etc.), based on the first 8, 16, or 24 bits for network information.** - **Classless Addressing: Uses CIDR to allow more flexible subnetting.** 10. **APIPA (Automatic Private IP Addressing): If a device can\'t obtain an IP address, it will automatically assign itself one in the range of 169.254.x.x, indicating no connection to a DHCP server.** 11. **DNS Structure and Elements:** - **Namespace: The structured hierarchy of the domain name system.** - **Name Servers: Store DNS records.** - **TLD (Top-Level Domain): The highest level of domain hierarchy (e.g.,.com,.org).** - **Resolvers: The servers that query DNS records.** 12. **Assigned OUI: A manufacturer's OUI is assigned by IEEE.** 13. **DNS Resource Record Types:** - **A Record: Maps an IPv4 address to a domain name.** - **AAAA Record: Maps an IPv6 address to a domain name.** - **TXT Record: Holds free-form text, often used for verifying domain ownership.** - **MX Record: Points to the mail server responsible for receiving emails.** 14. **Acknowledgement Numbers: Used in TCP to confirm the successful receipt of packets.** 15. **VPN Types:** - **Site-to-site VPN: Connects two networks.** - **Client-to-site VPN: Connects individual clients to a remote network.** 16. **Terminal Emulation Software: Includes tools like Putty (for SSH) and HyperTerminal (for Telnet and serial communication).** 17. **Tracking Malfunctioning Routers: Use traceroute or tracert to identify router issues in a network path.** 18. **IP Address Identification Layer: The network layer (Layer 3) identifies the IP address of the destination host.** 19. **Remote Access Methods:** - **RDP: For Windows remote desktop access.** - **SSH: For secure command-line access.** 20. **Utilities:** - **tcpdump: A command-line packet sniffer to capture network traffic.** - **netstat: To display network statistics and connections.** 21. **Characteristics of TCP:** - **Connection-Oriented: Ensures reliable, ordered delivery of data.** - **Error Checking: Uses checksums and acknowledgments to confirm data integrity.** - **(IP needs TCP)** Know what each A,B,C,D,E class and what it does IPv6 Unicast, multipcast, anacast Know what happens when there are 2 conflicting IP addresses Know port information (Lecture 8) MAC address is a unique number to ID ur computer

Use Quizgecko on...
Browser
Browser